Free Delivery Over $100
4195 books were found.
Whereas classical cryptography was confined to the art of designing and breaking encryption schemes (or ""secrecy... Read More >>
Data Mining for Design and Manufacturing: Methods and Applications is the first book that brings together research... Read More >>
Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but... Read More >>
2.1 E-Government: e-Governance and e-Democracy The term Electronic Government (e-Government), as an expression,... Read More >>
Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security,... Read More >>
Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection... Read More >>
It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability... Read More >>
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop... Read More >>
This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations... Read More >>
A reference for both academic and professional researchers in the field of security and trust. The papers presented... Read More >>
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key... Read More >>
This is an overview of key establishment protocols. Read More >>
Read More >>
As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand... Read More >>
Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide... Read More >>
ThecreationofpublickeycryptographybyDi?eandHellmanin1976andthe subsequent invention of the RSA public key cryptosystem... Read More >>
Studies modern concepts of Computer Security. This book introduces the basic mathematical background necessary to... Read More >>
Modern cryptography depends heavily on number theory, with primality test ing, factoring, discrete logarithms (indices),... Read More >>
It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses... Read More >>
The theory of algebraic function fields over finite fields has its origins in number theory. Read More >>
The second edition contains corrections, revisions and new material, including a complete description of the AES,... Read More >>
To help in closing this communication gap between the group of protocol verifiers and the group of protocol implementors,... Read More >>
One aspect of homeland security issues with wide-ranging implications is information security. This book presents... Read More >>
Face recognition has been actively studied over years. This work provides a comprehensive review of this biometric,... Read More >>
This is especially so for video conferencing, thin-client computing and Internet cafes.CryptoGraphics: Exploiting... Read More >>