Free Delivery Over $100
4195 books were found.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on... Read More >>
This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management,... Read More >>
Read More >>
This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec... Read More >>
Smart card transaction times will increase as the number of bits used in the algorithms protecting the cards to... Read More >>
If you have a question about Cryptography this is the book with the answers. Cryptography: Questions and Answers... Read More >>
This book constitutes the refereed proceedingsof the 14th International Conference on Cryptology and Network Security,... Read More >>
This bookconstitutes the refereed proceedings of the Second International Conference onSecurity Standardisation... Read More >>
This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC... Read More >>
He takes a modern approach, where defining what is meant by ""secure"" is as important as creating something that... Read More >>
Schnelle und einfache Schutzmaßnahmen gegen NSA , BN D, kriminelle Hacker und kommerzielle Datenkraken Sie möchten... Read More >>
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts... Read More >>
This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop)... Read More >>
Thisbook constitutes the proceedings of the 20th Nordic Conference on Secure ITSystems, held in Stockholm, Sweden,... Read More >>
Based on the research experience of the authors, this book provides a theoretical structure of fundamental number... Read More >>
Shishi is an implementation of the Kerberos 5 network authentication system, as specified in RFC 4120. Shishi can... Read More >>
GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used... Read More >>
GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them.... Read More >>