الكتب الالكترونية

عدد الكتب: 61 - 80 /97
978-3-540-68963-8
Information Systems Security (vol. # 4332)

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS ...

اقرأ المزيد
978-3-540-85093-9
Information Theoretic Security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...

اقرأ المزيد
978-0-387-26090-7
Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...

اقرأ المزيد
978-3-540-68351-3
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

اقرأ المزيد
978-3-540-26598-6
Number Theory in Science and Communication

"Number Theory in Science and Communication" is a well-known introduction for non-mathematicians to this fascinating and ...

اقرأ المزيد
978-0-387-25096-0
Optical and Digital Techniques for Information Security

Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...

اقرأ المزيد
978-3-540-85538-5
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...

اقرأ المزيد
978-3-540-73489-5
Pairing-Based Cryptography – Pairing 2007

Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...

اقرأ المزيد
978-3-540-68164-9
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

اقرأ المزيد
978-3-540-32278-8
Progress in Cryptology - INDOCRYPT 2005

Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...

اقرأ المزيد
978-3-540-49769-1
Progress in Cryptology - INDOCRYPT 2006

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, ...

اقرأ المزيد
978-3-540-89754-5
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

اقرأ المزيد
978-3-540-75670-5
Provable Security

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, ...

اقرأ المزيد
978-3-030-62576-4
Provable and Practical Security

This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...

اقرأ المزيد
978-3-540-30580-4
Public Key Cryptography - PKC 2005

Constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...

اقرأ المزيد
978-3-540-33852-9
Public Key Cryptography - PKC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...

اقرأ المزيد
978-3-540-71677-8
Public Key Cryptography - PKC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...

اقرأ المزيد
978-3-540-78440-1
Public Key Cryptography - PKC 2008 : 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...

اقرأ المزيد
978-3-540-74078-0
Random Curves : Journeys of a Mathematician

These autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital ...

اقرأ المزيد
978-3-540-75248-6
Secure Data Management

Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...

اقرأ المزيد
عدد الكتب: 61 - 80 /97