Data encryption books

4195 books were found.

Public Key Infrastructures, Services and Applications: 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers

Public Key Infrastructures, Services and Applications:...

Author: Fabio Martinelli ,  Bart Preneel
ISBN: 9783642164408
Format: Paperback
$219.12

Constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications...  Read More >>

Algebraic Aspects of Cryptography

Algebraic Aspects of Cryptography

Author: A.J. Menezes ,  Neal Koblitz
ISBN: 9783642083327
Format: Paperback
$366.96

This book is intended as a text for a course on cryptography with emphasis on algebraic methods. A novel feature...  Read More >>

Complexity Theory and Cryptology: An Introduction to Cryptocomplexity

Complexity Theory and Cryptology: An Introduction to...

Author: Jörg Rothe
ISBN: 9783642060540
Format: Paperback
$287.76

Modern cryptology increasingly employs mathematically rigorous concepts and methods from complexity theory. Starting...  Read More >>

Advances in Information Technology: 4th International Conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010, Proceedings

Advances in Information Technology: 4th International...

Author: Borworn Papasratorn ,  Kittichai Lavangnananda
ISBN: 9783642166983
Format: Paperback
$221.76

It was our intention to organize IAIT 2010 as the place where researchers and ind- trial practitioners could share...  Read More >>

Introduction to Modern Number Theory: Fundamental Problems, Ideas and Theories

Introduction to Modern Number Theory: Fundamental Problems,...

Author: Yu. I. Manin ,  Alexei A. Panchishkin
ISBN: 9783642057977
Format: Paperback
$419.76

""Introduction to Modern Number Theory"" surveys from a unified point of view both the modern state and the trends...  Read More >>

Radiation Effects on Embedded Systems

Radiation Effects on Embedded Systems

Author: Raoul Velazco ,  Pascal Fouillat
ISBN: 9789048174171
Format: Paperback
$446.16

Radiation Effects on Embedded Systems aims at providing the reader with the major guidelines for coping with radiation...  Read More >>

Web Application Security: Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers

Web Application Security: Iberic Web Application Security...

Author: Carlos Serrao ,  Vicente Aguilera
ISBN: 9783642161193
Format: Paperback
$221.76

IBWAS 2009, the Iberic Conference on Web Applications Security, was the first international conference organized...  Read More >>

Security in Computing Systems: Challenges, Approaches and Solutions

Security in Computing Systems: Challenges, Approaches...

Author: Joachim Biskup
ISBN: 9783642097195
Format: Paperback
$261.36

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying...  Read More >>

Post-Quantum Cryptography

Post-Quantum Cryptography

Author: Daniel J. Bernstein ,  Johannes Buchmann
ISBN: 9783642100192
Format: Paperback
$237.47

Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based...  Read More >>

Gröbner Bases, Coding, and Cryptography

Gröbner Bases, Coding, and Cryptography

Author: Massimiliano Sala ,  Teo Mora
ISBN: 9783642101007
Format: Paperback
$340.56

Gröbner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in...  Read More >>

Smart Cards, Tokens, Security and Applications

Smart Cards, Tokens, Security and Applications

Author: Keith Mayes ,  Konstantinos Markantonakis
ISBN: 9781441944269
Format: Paperback
$261.36

Smart Cards, Tokens, Security and Applications provides a broad overview of the many card systems and solutions...  Read More >>

Reliable Face Recognition Methods: System Design, Implementation and Evaluation

Reliable Face Recognition Methods: System Design, Implementation...

Author: Harry Wechsler
ISBN: 9781441935489
Format: Paperback
$261.36

One of the challenges for computational intelligence and biometrics is to understand how people process and recognize...  Read More >>

Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting

Networked RFID Systems and Lightweight Cryptography:...

Author: Peter H. Cole ,  Damith C. Ranasinghe
ISBN: 9783642090790
Format: Paperback
$237.47

This book consists of a collection of works on utilizing the automatic identification technology provided by Radio...  Read More >>

Coding for Data and Computer Communications

Coding for Data and Computer Communications

Author: David Salomon
ISBN: 9781441935465
Format: Paperback
$261.36

Details the most important techniques used to make the storage and transmission of data fast, secure, and reliable....  Read More >>

Grid Computing Security

Grid Computing Security

Author: Anirban Chakrabarti
ISBN: 9783642079436
Format: Paperback
$237.47

Together with a brief introduction into grid computing in general and underlying security technologies, this book...  Read More >>

Long-Term Preservation of Digital Documents: Principles and Practices

Long-Term Preservation of Digital Documents: Principles...

Author: Uwe M. Borghoff ,  Peter Rödig
ISBN: 9783642070174
Format: Paperback
$287.76

A rated survey list of available systems and tools completes the book.With this broad overview, the authors address...  Read More >>

Embedded Security in Cars: Securing Current and Future Automotive IT Applications

Embedded Security in Cars: Securing Current and Future...

Author: Kerstin Lemke ,  Christof Paar
ISBN: 9783642066597
Format: Paperback
$237.47

""Embedded Security Technologies"" details security technologies relevant for automotive applications, e.g., symmetric...  Read More >>

Linguistisches Identity Matching: Paradigmenwechsel in der Suche und im Abgleich von Personendaten

Linguistisches Identity Matching: Paradigmenwechsel...

Author: Bertrand Lisbach
ISBN: 9783834813718
Format: Paperback
$47.49

Identity Matching ist die Grundlage für die Suche mit und nach Personendaten. Und die betreibt heutzutage die ganze...  Read More >>

Embedded Java Security: Security for Mobile Devices

Embedded Java Security: Security for Mobile Devices...

Author: Mourad Debbabi ,  Mohamed Saleh
ISBN: 9781849966238
Format: Paperback
$171.47

 Read More >>

Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

Security with Noisy Data: On Private Biometrics, Secure...

Author: Pim Tuyls ,  Boris Škoric
ISBN: 9781849966931
Format: Paperback
$314.16

 Read More >>

Foundations of Computer Security

Foundations of Computer Security

Author: David Salomon
ISBN: 9781849965606
Format: Paperback
$116.41

 Read More >>

Forensic Computing

Forensic Computing

Author: Anthony Sammes ,  Brian Jenkinson
ISBN: 9781849965965
Format: Paperback
$168.16

The second edition of this successful book shows how the contents of computer systems can be recovered for criminal...  Read More >>

Preserving Privacy in Data Outsourcing

Preserving Privacy in Data Outsourcing

Author: Sara Foresti
ISBN: 9781441976581
Format: Hardback
$261.36

To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to...  Read More >>

Information Hiding: 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers

Information Hiding: 12th International Conference, IH...

Author: Rainer Böhme ,  Philip W. L. Fong
ISBN: 9783642164347
Format: Paperback
$190.08

IH 2010 was the 12th Information Hiding Conference, held in Calgary, Canada, June 28–30, 2010.  Read More >>

Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010, Revised Selected Papers

Automated Reasoning for Security Protocol Analysis and...

Author: Alessandro Armando ,  Gavin Lowe
ISBN: 9783642160738
Format: Paperback
$190.08

Constitutes the proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List