Free Delivery Over $100
4195 books were found.
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT... Read More >>
Johannes Buchmann is internationally recognized as one of the leading figures in areas of computational number theory,... Read More >>
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference... Read More >>
An Elementary Introduction. Historical and mathematical tour of cryptography, from classical ciphers to quantum... Read More >>
This book presents several novel approaches to model the interaction between the attacker and the defender and assess... Read More >>
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers.... Read More >>
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security,... Read More >>
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews... Read More >>
This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications... Read More >>
The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security... Read More >>
This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC... Read More >>
This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure... Read More >>
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage... Read More >>
Presents the benefits of the synergetic effect of combination of coding and cryptography. This book introduces directions... Read More >>
The areas of coverage include: Themes and Issues, Forensic Models, Forensic Techniques, File system Forensics, Network... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec... Read More >>
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied... Read More >>
The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based... Read More >>
This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on... Read More >>
Read More >>