Free Delivery Over $100
4195 books were found.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014,... Read More >>
The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box... Read More >>
While the deployment of large-scale biometric systems in both commercial and government applications has increased... Read More >>
The papers are organized in topical sections such as authorization and delegation, certificates management, cross... Read More >>
David Kahn is universally regarded as the dean of intelligence historians. Recounting the desperate efforts to gather... Read More >>
What Is Computer Science? Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference... Read More >>
This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block... Read More >>
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect... Read More >>
Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines... Read More >>
This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for... Read More >>
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers,... Read More >>
Most books in cryptography deal with theory, generally introducing mathematically expressed algorithms without taking... Read More >>
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital... Read More >>
This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC... Read More >>
This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security,... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 21st International Workshop on Security... Read More >>
Read More >>
If you have some experience with the BeagleBone or similar embedded systems and want to learn more about security... Read More >>
Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact?... Read More >>
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today,... Read More >>
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted... Read More >>
This book is the 7th volume in the annual series produced by the International Federation for Information Processing... Read More >>
This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered... Read More >>