Free Delivery Over $100
4195 books were found.
<p>This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part... Read More >>
Based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April... Read More >>
<p>In 1996, the supposedly uncrackable US federal encryption system was broken. In this captivating and intriguing... Read More >>
Constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA... Read More >>
The papers address all current aspects of fast and secure primitives for symmetric cryptology and are organized... Read More >>
Addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which... Read More >>
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held... Read More >>
Presents research on the emerging discipline of design and analysis of security systems that are survivable. This... Read More >>
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and... Read More >>
<p>This book constitutes the refereed proceedings of the 9th Asian Computing Science Conference, ASIAN 2004, dedicated... Read More >>
<p>This book constitutes the refereed proceedings of the 5th International Conference on Cryptology in India, INDOCRYPT... Read More >>
<p>This book constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public... Read More >>
<p>This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2005, CT-RSA... Read More >>
A book that constitutes the proceedings of the 7th VLDB Workshop on Secure Data Management that was held in Singapore... Read More >>
<p>This book constitutes the refereed proceedings of the First International Conference on Information Systems Security,... Read More >>
<p>This book constitutes the refereed proceedings of the Third European Public Key Infrastructure Workshop: Theory... Read More >>
<p>This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network... Read More >>
Constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security,... Read More >>
<p>Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
<p>This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and... Read More >>
<p>This book constitutes the thoroughly refereed postproceedings of the 4th International Conference on Security... Read More >>
<p>This book constitutes the refereed proceedings of the Second Theory of Cryptography Conference, TCC 2005, held... Read More >>
Constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience,... Read More >>
Constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held... Read More >>