الكتب الالكترونية

عدد الكتب: 61 - 80 /117
978-3-540-31481-3
Information Hiding (vol. # 3727)

Constitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...

اقرأ المزيد
978-3-540-88961-8
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

اقرأ المزيد
978-3-030-65299-9
Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...

اقرأ المزيد
978-3-540-33355-5
Information Security and Cryptology - ICISC 2005

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...

اقرأ المزيد
978-3-540-76788-6
Information Security and Cryptology - ICISC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...

اقرأ المزيد
978-3-030-55304-3
Information Security and Privacy

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-540-70500-0
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-540-77086-2
Information Systems Security

This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...

اقرأ المزيد
978-3-540-32422-5
Information Systems Security (vol. # 3803)

The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...

اقرأ المزيد
978-3-540-68963-8
Information Systems Security (vol. # 4332)

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS ...

اقرأ المزيد
978-3-540-85093-9
Information Theoretic Security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...

اقرأ المزيد
978-3-540-49244-3
Introduction to Cryptography

In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital ...

اقرأ المزيد
NoIMG
Messages security application / Bilal Al-Hamwia ; Kinan Al-Awa ; Rama Al-Hamwi ; Shiraz Naji ; Abd Al-Hadi Nofal

The rapid development of communication technology, is bringing many technological conveniences with it and simplifying our ...

اقرأ المزيد
978-0-387-26090-7
Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...

اقرأ المزيد
978-3-540-68351-3
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

اقرأ المزيد
978-3-540-26598-6
Number Theory in Science and Communication

"Number Theory in Science and Communication" is a well-known introduction for non-mathematicians to this fascinating and ...

اقرأ المزيد
978-0-387-28001-1
Optical Imaging Sensors and Systems for Homeland Security Applications

Optical and photonic systems and devices have significant potential for homeland security. Optical Imaging Sensors and Systems ...

اقرأ المزيد
978-0-387-25096-0
Optical and Digital Techniques for Information Security

Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...

اقرأ المزيد
978-3-540-85538-5
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...

اقرأ المزيد
978-3-540-73489-5
Pairing-Based Cryptography – Pairing 2007

Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...

اقرأ المزيد
عدد الكتب: 61 - 80 /117