Free Delivery Over $100
4195 books were found.
Constitutes the papers of the Third International Conference on E-business and Telecommunication Networks, ICETE... Read More >>
Constitutes the refereed proceedings of the 24th IFIP TC 11 International Information Security Conference, SEC 2009,... Read More >>
Constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security,... Read More >>
A how-to guide for implementing algorithms and protocols. Addressing real-world implementation issues, it emphasizes... Read More >>
Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security... Read More >>
Read More >>
Offers an approach to developing and implementing relevant security metrics essential for effective security management.... Read More >>
Internet Telephony is one of the most important and fastest growing technologies for emerging mobile networks, as... Read More >>
This book constitutes the refereed proceedings of the 11th International Conference on Information Security and... Read More >>
The papers are organized in topical sections on identity-based encryption, protocol analysis, two-party protocols,... Read More >>
<p>This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and... Read More >>
<p>This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA... Read More >>
Today, society is faced with numerous internet schemes, fraudulent scams, and means of identity theft that threaten... Read More >>
Heute entsteht Software meist auf der Basis von Frameworks, die bereits Sicherheitstechniken enthalten. Darüber... Read More >>
Constitutes the proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, held in Lausanne,... Read More >>
Constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary,... Read More >>
Constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in... Read More >>
Constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and... Read More >>
Constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience,... Read More >>
<p>This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference... Read More >>
Constitutes the refereed post-workshop proceedings of the 5th International Workshop on Formal Aspects in Security... Read More >>
TCC 2009, the 6th Theory of Cryptography Conference, was held in San Fr- cisco, CA, USA, March 15–17, 2009. The... Read More >>
The papers are organized in topical sections on number theory, applications and protocols, multi-party protocols,... Read More >>