Free Delivery Over $100
4195 books were found.
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications... Read More >>
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography... Read More >>
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference... Read More >>
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013,... Read More >>
This text provides a classroom-tested, practical introduction to software design and implementation, cryptographic... Read More >>
This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI... Read More >>
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed... Read More >>
Offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the realm... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on... Read More >>
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When... Read More >>
The papers feature both theoretical research and real-world case studies from academia, business and government... Read More >>
This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded... Read More >>
A guide that provides readers with comprehensive coverage of the technology used in e-discovery in civil and criminal... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on... Read More >>
Although several books cover the coding theory of wireless communications and the hardware technologies and coding... Read More >>
Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE... Read More >>
This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies,... Read More >>
This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications... Read More >>
The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying... Read More >>
New in the Secure Beginner’s Guide series, this complete, practical resource for security and IT professionals presents... Read More >>
Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits—from... Read More >>
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security... Read More >>