Data encryption books

4195 books were found.

New Stream Cipher Designs

New Stream Cipher Designs

Author: Matthew Robshaw ,  Olivier Billet
ISBN: 9783540864011
Format: Undefined
$65.87

<p>This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part...  Read More >>

Privacy, Security and Trust Within the Context of Pervasive Computing

Privacy, Security and Trust Within the Context of Pervasive...

Author: Philip Robinson ,  Harald Vogt
ISBN: 9780387503271
Format: Undefined
$65.87

Based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April...  Read More >>

Brute Force

Brute Force

Author: Matt Curtin
ISBN: 9780387500799
Format: Undefined
$65.87

<p>In 1996, the supposedly uncrackable US federal encryption system was broken. In this captivating and intriguing...  Read More >>

Information Security Applications

Information Security Applications

Author: Chae Hoon Lim ,  Moti Yung
ISBN: 9783540805762
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA...  Read More >>

Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers

Fast Software Encryption: 15th International Workshop,...

Author: Kaisa Nyberg
ISBN: 9783540710387
Format: Paperback
$237.47

The papers address all current aspects of fast and secure primitives for symmetric cryptology and are organized...  Read More >>

UNIX and Linux Forensic Analysis DVD Toolkit

UNIX and Linux Forensic Analysis DVD Toolkit

Author: Chris Pogue (Member of IBM Ethical Hacking Team) ,  Cory Altheide
ISBN: 9781597492690
Format: Paperback
$166.19

Addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which...  Read More >>

Information Theoretic Security: Third International Conference, ICITS 2008, Calgary, Canada,  August 10-13, 2008, Proceedings

Information Theoretic Security: Third International...

Author: Reihaneh Safavi-Naini
ISBN: 9783540850922
Format: Paperback
$184.67

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held...  Read More >>

Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems

Security and Survivability: Analyzing, Modeling, and...

Author: Roy H. Campbell (University of Illinois) ,  Prasad G. Naldurg (University of Illinois)
ISBN: 9780387276274
Format: Hardback
$237.47

Presents research on the emerging discipline of design and analysis of security systems that are survivable. This...  Read More >>

Cryptographic Hardware and Embedded Systems – CHES 2008: 10th International Workshop, Washington, D.C., USA, August 10-13, 2008, Proceedings

Cryptographic Hardware and Embedded Systems – CHES 2008:...

Author: Elisabeth Oswald ,  Pankaj Rohatgi
ISBN: 9783540850526
Format: Paperback
$237.47

This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and...  Read More >>

Advances in Computer Science - Asian 2004, Higher Level Decision Making

Advances in Computer Science - Asian 2004, Higher Level...

Author: Michael J Maher
ISBN: 9783540806059
Format: Undefined
$65.87

<p>This book constitutes the refereed proceedings of the 9th Asian Computing Science Conference, ASIAN 2004, dedicated...  Read More >>

Progress in Cryptology - Indocrypt 2004

Progress in Cryptology - Indocrypt 2004

Author: Anne Canteaut ,  Kapaleeswaran Viswanathan
ISBN: 9783540806226
Format: Undefined
$65.87

<p>This book constitutes the refereed proceedings of the 5th International Conference on Cryptology in India, INDOCRYPT...  Read More >>

Public Key Cryptography - Pkc 2005

Public Key Cryptography - Pkc 2005

Author: Serge Vaudenay
ISBN: 9783540807261
Format: Undefined
$65.87

<p>This book constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public...  Read More >>

Topics in Cryptology -- CT-Rsa 2005

Topics in Cryptology -- CT-Rsa 2005

Author: Alfred John Menezes
ISBN: 9783540807063
Format: Undefined
$65.87

<p>This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2005, CT-RSA...  Read More >>

Secure Data Management

Secure Data Management

Author: Willem Jonker ,  Milan Petkovic
ISBN: 9783540815402
Format: Undefined
$65.87

A book that constitutes the proceedings of the 7th VLDB Workshop on Secure Data Management that was held in Singapore...  Read More >>

Information Systems Security

Information Systems Security

Author: Sushil Jajodia ,  Chandan Mazumdar
ISBN: 9783540818458
Format: Undefined
$65.87

<p>This book constitutes the refereed proceedings of the First International Conference on Information Systems Security,...  Read More >>

Public Key Infrastructure

Public Key Infrastructure

Author: Andrea S Atzeni ,  Antonio Lioy
ISBN: 9783540825418
Format: Undefined
$65.87

<p>This book constitutes the refereed proceedings of the Third European Public Key Infrastructure Workshop: Theory...  Read More >>

Secure Data Management

Secure Data Management

Author: Willem Jonker ,  Milan Petkovic
ISBN: 9783540844334
Format: Undefined
$65.87

A book that constitutes the proceedings of the 7th VLDB Workshop on Secure Data Management that was held in Singapore...  Read More >>

Cryptology and Network Security

Cryptology and Network Security

Author: Feng Bao ,  San Ling
ISBN: 9783540846185
Format: Undefined
$65.87

<p>This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network...  Read More >>

Information and Communications Security

Information and Communications Security

Author: Sihan Qing ,  Hideki Imai
ISBN: 9783540846369
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security,...  Read More >>

Transactions on Data Hiding and Multimedia Security III

Transactions on Data Hiding and Multimedia Security...

Author: Yun Q Shi
ISBN: 9783540848257
Format: Undefined
$65.87

<p>Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,...  Read More >>

Applied Cryptography and Network Security

Applied Cryptography and Network Security

Author: Steven M Bellovin ,  Rosario Gennaro
ISBN: 9783540848226
Format: Undefined
$65.87

<p>This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and...  Read More >>

Security in Communication Networks

Security in Communication Networks

Author: Carlo Blundo ,  Stelvio Cimato
ISBN: 9783540806769
Format: Undefined
$65.87

<p>This book constitutes the thoroughly refereed postproceedings of the 4th International Conference on Security...  Read More >>

Theory of Cryptography

Theory of Cryptography

Author: Joe Kilian
ISBN: 9783540807728
Format: Undefined
$65.87

<p>This book constitutes the refereed proceedings of the Second Theory of Cryptography Conference, TCC 2005, held...  Read More >>

Information Security Practice and Experience

Information Security Practice and Experience

Author: Robert H Deng ,  Feng Bao
ISBN: 9783540809944
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience,...  Read More >>

Security Protocols

Security Protocols

Author: Bruce Christianson ,  Bruno Crispo
ISBN: 9783540814542
Format: Undefined
$65.87

Constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List