Free Delivery Over $100
3712 books were found.
Read More >>
This book focuses specifically on physical layer security, a burgeoning topic in security. It consists of contributions... Read More >>
This book is one of the first to cover SAT-solvers and how they can be used in cryptanalysis. It includes chapters... Read More >>
Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly... Read More >>
As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I... Read More >>
It is intended mainly for beginners to the field of information security, written in a way that makes it easy for... Read More >>
This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE... Read More >>
In the frequency domain, MRRs can be used to generate optical millimetre-wave solitons with a broadband frequency... Read More >>
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution:... Read More >>
Interference Cancellation Using Space-Time Processing and Precoding Design introduces original design methods to... Read More >>
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the... Read More >>
Unifying information theory and digital communication through the language of lattice codes, this book provides... Read More >>
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital... Read More >>
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in... Read More >>
In some cases, certain coherent structures can exist in stochastic dynamic systems almost in every particular realization... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics... Read More >>
The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International... Read More >>
The papers are organized in topical sections on block ciphers, lightweight block ciphers, tweakable block ciphers,... Read More >>
Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT... Read More >>
This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on... Read More >>