Free Delivery Over $100
4215 books were found.
Im Gegenteil: Man übermittelt die Nachricht über einen unsicheren Ka nal, aber so ""chiffriert"", daß niemand -... Read More >>
Read More >>
‘I’he int,ernational Association for Cryptologic Research (IACK) organizes two inter- tioilill coiifcrcnces every... Read More >>
During a short visit to Bremen in December 1989 John Rosenberg had several discussions with me about computer architecture.... Read More >>
The papers in this voluriic were presented at the CHYP'I'O 'SS conf- ence on theory and applications of cryptography,... Read More >>
Originally presented as the author's thesis (doctoral)--Universit'at Karlsruhe, 1989. Read More >>
Presents an agenda for developing policies and practices for computer security. Recommendations are provided for... Read More >>
<p>Details how intrusion detection works in network security with comparisons to traditional methods such as firewalls... Read More >>
This book contains a selection of papers presented at a Symposium on coding theory: 3 Journees sur le Codage, held... Read More >>
In der vorliegenden Arbeit werden die Einsatzmöglichkeiten approximativer Verfahren für Public-Key-Kryptosysteme... Read More >>
The 1992 edition of the German Yearbook on Business History . Read More >>
Since its publication,Security Analysis by Graham and Dodd has been the investment bible and has sold more than... Read More >>
Provides a survey of principles and techniques for secure group communications (SGC) over data networks. This book... Read More >>
This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research.... Read More >>
This book contains the proceedings of EUROCRYPT 85, held in Paris in 1984, April 9-11, at the University of Paris,... Read More >>
Der Arbeitskreis ""Datenschutz und Datensicherung"" des Präsidiums der Gesellschaft für In formatik sieht es als... Read More >>