Free Delivery Over $100
4195 books were found.
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted... Read More >>
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS... Read More >>
This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications... Read More >>
Alexander Tsolkas und Friedrich Wimmer erklären anhand von Beispielen, welche Informationen aus diesen im Wirtschaftskreislauf... Read More >>
They are organized in topical sections on signature schemes, stream ciphers, applications of information theory,... Read More >>
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy,... Read More >>
Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT... Read More >>
Constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security,... Read More >>
This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security... Read More >>
A quick and easy to use guide on creating your own cipher. This book covers several historic ciphers and builds... Read More >>
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing,... Read More >>
Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public... Read More >>
This book constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing,... Read More >>
Constitutes the refered proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012,... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Sequences and Their Applications,... Read More >>
This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization,... Read More >>
The first volume includes 32 papers and is organized in topical sections on content-centric networking, social networks,... Read More >>
Constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography,... Read More >>
The papers feature innovative research in the areas of network architecture, applications and services, next generation... Read More >>
Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal... Read More >>
Describes original research results and innovative applications in the discipline of digital forensics. This book... Read More >>
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital... Read More >>
This book presents the state of the art of quantum cryptography and details how it can be implemented in standard... Read More >>