Free Delivery Over $100
4195 books were found.
th The 8 International Workshop on Digital Watermarking (IWDW 2009) was hosted by the University of Surrey, Guildford,... Read More >>
Negli ultimi decenni il rapido sviluppo delle tecnologie IT ha influito in maniera determinante nella vita dell’uomo,... Read More >>
<p>This volume constitutes the proceedings of the Second International Conference on E-Voting and Identity, VOTE-ID... Read More >>
<p>This book constitutes the thoroughly refereed post-proceedings of the7th International Workshop on Information... Read More >>
Read More >>
<p>This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference,... Read More >>
Cybercriminals have reportedly made alliances with drug traffickers in Afghanistan, the Middle East, and elsewhere... Read More >>
This volume contains the proceedings of the 13th International Conference on Financial Cryptography and Data Security,... Read More >>
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally... Read More >>
This book constitutes the refereed proceedings of the 29th Annual International Cryptology Conference, CRYPTO 2009,... Read More >>
This year, 76 papers were submitted to FSE including a large portion of papers on hash functions, following the... Read More >>
Udo Bub, Klaus-Dieter Wolfenstetter Angesichts der Dynamik des technologischen Wandels und der umfassenden Verbreitung... Read More >>
This book constitutes the refereed proceedings of the Third International Conference on Pairing-Based Cryptography,... Read More >>
<p>This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Automated... Read More >>
A book that constitutes the proceedings of the 7th VLDB Workshop on Secure Data Management that was held in Singapore... Read More >>
<p>This book constitutes the refereed proceedings of the 11th International Workshop on Cryptographic Hardware and... Read More >>
<p>This volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information... Read More >>
<p>This volume constitutes the selected papers of the 15th Annual International Workshop on Selected Areas in Cryptography,... Read More >>
Constitutes the refereed proceedings of the 6th International Conference, ICGS3, that was held in Braga, Portugal,... Read More >>
<p>This book constitutes the refereed proceedings of the 16th String Processing and Information Retrieval Symposium,... Read More >>
<p>This book constitutes the refereed proceedings of the 29th Annual International Cryptology Conference, CRYPTO... Read More >>
<p>This book is one of the first to cover SAT-solvers and how they can be used in cryptanalysis. It includes chapters... Read More >>
<p>Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
<p>This book constitutes the refereed proceedings of the Third International Conference on Pairing-Based Cryptography,... Read More >>