الكتب الالكترونية

عدد الكتب: 1 - 20 /74
978-3-540-89255-7
Advances in Cryptology - ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...

اقرأ المزيد
978-3-540-48184-3
Advances in Cryptology - CRYPTO -87

Zero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably ...

اقرأ المزيد
978-3-540-31870-5
Advances in Cryptology - CRYPTO 2005

This book constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held ...

اقرأ المزيد
978-3-540-74143-5
Advances in Cryptology - CRYPTO 2007

The book address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis.

اقرأ المزيد
978-3-540-74143-5
Advances in Cryptology - CRYPTO 2007

The book address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis.

اقرأ المزيد
978-3-540-34547-3
Advances in Cryptology - EUROCRYPT 2006

The 2006 edition of the Eurocrypt conference was held in St. Petersburg,Russia from May 28 to June 1, 2006. It was the 25th ...

اقرأ المزيد
978-3-540-46877-6
Advances in Cryptology - EUROCRYPT 90

Eurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the ...

اقرأ المزيد
978-3-540-49476-8
Advances in Cryptology -- ASIACRYPT 2006

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology ...

اقرأ المزيد
978-3-540-76900-2
Advances in Cryptology – ASIACRYPT 2007

The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...

اقرأ المزيد
978-3-540-76900-2
Advances in Cryptology – ASIACRYPT 2007

The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...

اقرأ المزيد
978-3-540-75651-4
Advances in Information and Computer Security

The book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...

اقرأ المزيد
978-3-540-75651-4
Advances in Information and Computer Security

The book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...

اقرأ المزيد
978-3-540-77255-2
Advances in Multimedia Information Processing – PCM 2007

This book is organized in topical sections on image classification and retrieval, the AVS china national standard - technology, ...

اقرأ المزيد
978-3-540-77255-2
Advances in Multimedia Information Processing – PCM 2007

This book is organized in topical sections on image classification and retrieval, the AVS china national standard - technology, ...

اقرأ المزيد
978-0-387-77994-2
An Introduction to Mathematical Cryptography

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...

اقرأ المزيد
978-3-030-78372-3
Applied Cryptography and Network Security

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...

اقرأ المزيد
978-1-78561-874-1
Blockchains For Network Security : Principles, technologies and applications

Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...

اقرأ المزيد
978-3-540-31981-8
Computer Security - ESORICS 2005

These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...

اقرأ المزيد
978-3-540-44605-7
Computer Security – ESORICS 2006

This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...

اقرأ المزيد
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

اقرأ المزيد
عدد الكتب: 1 - 20 /74