Free Delivery Over $100
3712 books were found.
In the digital world, the need to protect communications increases every day. While traditional digital encryption... Read More >>
This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing,... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and... Read More >>
Simulation results of Algebraic-geometric codes bit error rate performance using quadrature amplitude modulation... Read More >>
This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies,... Read More >>
To understand the power of distributed systems, it is necessary to understand their inherent limitations: what problems... Read More >>
Unifying information theory and digital communication through the language of lattice codes, this book provides... Read More >>
Read More >>
Constitutes the refered proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012,... Read More >>
This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC... Read More >>
This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check... Read More >>
The volume “Storing and Transmitting Data” is based on Rudolf Ahlswede's introductory course on ""Information Theory... Read More >>
This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of... Read More >>
This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application... Read More >>
Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary... Read More >>
Introducing both the probabilistic and algebraic aspects of the subject, this book provides relevant background... Read More >>
Financial identity theft is well understood with clear underlying motives. The emergence of medical identity theft... Read More >>
This book contains extended and revised versions of the best papers presented at the 18th IFIP WG 10.5/IEEE International... Read More >>
This book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication... Read More >>