Free Delivery Over $100
4195 books were found.
Constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications... Read More >>
This book is intended as a text for a course on cryptography with emphasis on algebraic methods. A novel feature... Read More >>
Modern cryptology increasingly employs mathematically rigorous concepts and methods from complexity theory. Starting... Read More >>
It was our intention to organize IAIT 2010 as the place where researchers and ind- trial practitioners could share... Read More >>
""Introduction to Modern Number Theory"" surveys from a unified point of view both the modern state and the trends... Read More >>
Radiation Effects on Embedded Systems aims at providing the reader with the major guidelines for coping with radiation... Read More >>
IBWAS 2009, the Iberic Conference on Web Applications Security, was the first international conference organized... Read More >>
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying... Read More >>
Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based... Read More >>
Gröbner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in... Read More >>
Smart Cards, Tokens, Security and Applications provides a broad overview of the many card systems and solutions... Read More >>
One of the challenges for computational intelligence and biometrics is to understand how people process and recognize... Read More >>
This book consists of a collection of works on utilizing the automatic identification technology provided by Radio... Read More >>
Details the most important techniques used to make the storage and transmission of data fast, secure, and reliable.... Read More >>
Together with a brief introduction into grid computing in general and underlying security technologies, this book... Read More >>
A rated survey list of available systems and tools completes the book.With this broad overview, the authors address... Read More >>
""Embedded Security Technologies"" details security technologies relevant for automotive applications, e.g., symmetric... Read More >>
Identity Matching ist die Grundlage für die Suche mit und nach Personendaten. Und die betreibt heutzutage die ganze... Read More >>
Read More >>
The second edition of this successful book shows how the contents of computer systems can be recovered for criminal... Read More >>
To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to... Read More >>
IH 2010 was the 12th Information Hiding Conference, held in Calgary, Canada, June 28–30, 2010. Read More >>
Constitutes the proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues... Read More >>