Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...
اقرأ المزيد
Constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...
اقرأ المزيد
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
اقرأ المزيد
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
اقرأ المزيد
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
اقرأ المزيد
Foundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on High Performance ...
اقرأ المزيد
Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
اقرأ المزيد
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
اقرأ المزيد
This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...
اقرأ المزيد
Constitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...
اقرأ المزيد
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...
اقرأ المزيد
This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...
اقرأ المزيد
The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...
اقرأ المزيد