الكتب الالكترونية

عدد الكتب: 21 - 40 /81
978-3-540-31940-5
Cryptographic Hardware and Embedded Systems - CHES 2005

Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...

اقرأ المزيد
978-3-540-46561-4
Cryptographic Hardware and Embedded Systems - CHES 2006

These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...

اقرأ المزيد
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

اقرأ المزيد
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

اقرأ المزيد
978-3-540-32418-8
Cryptography and Coding

Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...

اقرأ المزيد
978-3-540-77272-9
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

اقرأ المزيد
978-3-540-77272-9
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

اقرأ المزيد
978-1-4842-8105-5
Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 / Stefania Loredana Nita, Marius Iulian Mihailescu

Includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction ...

اقرأ المزيد
1119582423
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, 2nd Edition / Aiden A. Bruen, Mario A. Forcinito, James M. McQuillan

A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...

اقرأ المزيد
978-3-540-89641-8
Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...

اقرأ المزيد
978-3-540-48121-8
Decrypted Secrets

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...

اقرأ المزيد
978-3-540-48121-8
Decrypted Secrets

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...

اقرأ المزيد
978-3-540-31669-5
Fast Software Encryption (vol. # 3557)

The Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...

اقرأ المزيد
978-3-540-36598-3
Fast Software Encryption (vol. # 4047)

Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...

اقرأ المزيد
978-3-540-46251-4
Fault Diagnosis and Tolerance in Cryptography

The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...

اقرأ المزيد
978-3-540-31936-8
Foundations of Security Analysis and Design III

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...

اقرأ المزيد
978-3-540-74810-6
Foundations of Security Analysis and Design IV

This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...

اقرأ المزيد
978-3-540-69403-8
Global E-Security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings

This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...

اقرأ المزيد
978-3-540-85886-7
Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...

اقرأ المزيد
978-3-540-77535-5
Information Security Applications

Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...

اقرأ المزيد
عدد الكتب: 21 - 40 /81