Free Delivery Over $100
3712 books were found.
Read More >>
The papers have been organized into topical sections on privacy and identity management, anonymous credentials,... Read More >>
The papers are organized in topical sections on privacy, web security, access control, trust and identity management,... Read More >>
This book explores a range of topics in Semantic Systems, from underlying universal principles to representation... Read More >>
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the... Read More >>
This is the revised edition of Berlekamp's famous book, 'Algebraic Coding Theory', originally published in 1968,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on... Read More >>
This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on... Read More >>
This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic... Read More >>
The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference... Read More >>
This book provides an overview on various methodologies and procedures of cryptography. In the times of escalating... Read More >>
This book constitutes the refereed proceedings of the 5th International Workshop on the Arithmetic of Finite Field,... Read More >>
This book presents some critical security challenges that are faced in today's computing world. It discusses, in... Read More >>
This book is the study of all codes of life with the standard methods of science. What is really new in this field... Read More >>
Cryptohistories is a collection of essays which provides a meeting ground for historians and cultural scholars analysing... Read More >>
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software... Read More >>
Steganography involves the art of concealing one message or data file within another. Stenographic technologies... Read More >>