Free Delivery Over $100
4195 books were found.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in... Read More >>
In the second edition the authors added a complete description of the AES, an extended section on cryptographic... Read More >>
The 3rd International Conference on Cloud Security Management (ICCSM-2015) invites researchers, practitioners and... Read More >>
Almost every day sees new reports of information systems that have been hacked, broken into, compromised, and sometimes... Read More >>
Read More >>
GNU Privacy Guard (GnuPG or GPG) is a free software replacement for the Symantec's PGP cryptographic software suite.... Read More >>
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium... Read More >>
A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel... Read More >>
This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and... Read More >>
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on... Read More >>
This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy... Read More >>
This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara,... Read More >>
This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security... Read More >>
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on E-Voting... Read More >>