Free Delivery Over $100
4195 books were found.
This book constitutes the refereed proceedings of three workshops colocated with NETWORKING 2012, held in Prague,... Read More >>
Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security... Read More >>
""Cryptographic Protocol: Security Analysis Based on Trusted Freshness"" mainly discusses how to analyze and design... Read More >>
The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement,... Read More >>
Public key cryptography is a major interdisciplinary subject with many real-world applications. This book has been... Read More >>
What every computer scientist ought to know about cryptographic systems, security protocols, and secure information... Read More >>
This book outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities... Read More >>
This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel... Read More >>
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to... Read More >>
The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols,... Read More >>
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure... Read More >>
The papers are organized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential... Read More >>
Read More >>
Financial identity theft is well understood with clear underlying motives. The emergence of medical identity theft... Read More >>
Written by leaders in the field of IT security higher education, the new edition of this full-color text covers... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International... Read More >>
""Machine Learning and Data Mining for Computer Security"" provides an overview of the current state of research... Read More >>
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009,... Read More >>
Digital watermarking is one of the widely used techniques used in the world in the area of information security.This... Read More >>
The first book to offer a comprehensive view of the LLL algorithm, this text surveys computational aspects of Euclidean... Read More >>
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP... Read More >>
An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen... Read More >>