Free Delivery Over $100
4195 books were found.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on... Read More >>
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily... Read More >>
This book constitutes the refereed proceedings of the 8th FIRA International Conference on Secure and Trust Computing,... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols,... Read More >>
This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy,... Read More >>
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and... Read More >>
The papers address all technical and practical aspects of security and its applications for wired and wireless networks... Read More >>
Read More >>
The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models,... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information... Read More >>
This book constitutes the refereed proceedings of the 4th International Conference on the Theory and Application... Read More >>
Visual Cryptography and Secret Image Sharing Read More >>
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields,... Read More >>
The papers feature both theoretical research and real-world case studies from academia, business and government... Read More >>
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing,... Read More >>
This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network... Read More >>
A book covering theoretical and algorithmic design for digital content/data security. Read More >>
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to... Read More >>
The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network... Read More >>
Provides a comprehensive framework of practices for assuring information security, told through a real-world story... Read More >>
They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography... Read More >>
This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security,... Read More >>
This book constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC... Read More >>