This book introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The ...
اقرأ المزيدThis book introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The ...
اقرأ المزيدLemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive ...
اقرأ المزيدAn encyclopedia that contains information on various aspects of cryptography and security. It covers subject areas such as: ...
اقرأ المزيدThis volume presents details of the lecture series that were given at the school. Across the broad panorama of topics that ...
اقرأ المزيدFostering and disseminating high quality research results focused on the experimental analysis of algorithms the papers are ...
اقرأ المزيدFostering and disseminating high quality research results focused on the experimental analysis of algorithms the papers are ...
اقرأ المزيدThe Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...
اقرأ المزيدConstitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...
اقرأ المزيدThe sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
اقرأ المزيدThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيدThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيدConstitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...
اقرأ المزيدThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
اقرأ المزيدThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
اقرأ المزيدThis book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...
اقرأ المزيدFoundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
اقرأ المزيدFoundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art ...
اقرأ المزيد