Free Delivery Over $100
4597 books were found.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on... Read More >>
This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management,... Read More >>
In diesem Buch geht es um den AKS-Algorithmus, den ersten deterministischen Primzahltest mit polynomieller Laufzeit.... Read More >>
This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec... Read More >>
Smart card transaction times will increase as the number of bits used in the algorithms protecting the cards to... Read More >>
It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational... Read More >>
If you have a question about Cryptography this is the book with the answers. Cryptography: Questions and Answers... Read More >>
This book constitutes the refereed proceedingsof the 14th International Conference on Cryptology and Network Security,... Read More >>
This bookconstitutes the refereed proceedings of the Second International Conference onSecurity Standardisation... Read More >>
This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC... Read More >>
He takes a modern approach, where defining what is meant by ""secure"" is as important as creating something that... Read More >>
This bookconstitutes the refereed proceedings of the 16th International Conference onCryptology in India, INDOCRYPT... Read More >>
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts... Read More >>
This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security,... Read More >>
Read More >>
This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop)... Read More >>
Thisbook constitutes the proceedings of the 20th Nordic Conference on Secure ITSystems, held in Stockholm, Sweden,... Read More >>
Based on the research experience of the authors, this book provides a theoretical structure of fundamental number... Read More >>
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When... Read More >>
Shishi is an implementation of the Kerberos 5 network authentication system, as specified in RFC 4120. Shishi can... Read More >>
GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used... Read More >>
GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them.... Read More >>
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in... Read More >>
In the second edition the authors added a complete description of the AES, an extended section on cryptographic... Read More >>
The 3rd International Conference on Cloud Security Management (ICCSM-2015) invites researchers, practitioners and... Read More >>