 
                This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
اقرأ المزيد 
                This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
اقرأ المزيد 
                This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, ...
اقرأ المزيدThe rapid development of communication technology, is bringing many technological conveniences with it and simplifying our ...
اقرأ المزيد 
                This book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...
اقرأ المزيد 
                Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
اقرأ المزيد 
                Provides an insight about various techniques used in multimedia security and identifies its progress in both technological ...
اقرأ المزيد 
                Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC ...
اقرأ المزيد 
                This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
اقرأ المزيد 
                The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
اقرأ المزيد 
                Numbers have fascinated people for centuries. They are familiar to everyone, forming a central pillar of our understanding ...
اقرأ المزيد 
                This book provides an introduction and overview of number theory based on the distribution and properties of primes. This ...
اقرأ المزيد 
                Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...
اقرأ المزيد 
                This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...
اقرأ المزيد 
                Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...
اقرأ المزيد 
                The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...
اقرأ المزيد 
                This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...
اقرأ المزيد 
                Prime numbers beckon to the beginner, as the basic notion of primality is accessible even to children. Yet, some of the simplest ...
اقرأ المزيد 
                This volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...
اقرأ المزيد