الكتب الالكترونية

عدد الكتب: 161 - 180 /263
978-3-030-62223-7
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

اقرأ المزيد
978-981-15-6318-8
Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...

اقرأ المزيد
978-3-540-89994-5
Mathematical Methods in Computer Science : Essays in Memory of Thomas Beth

This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, ...

اقرأ المزيد
NoIMG
Messages security application / Bilal Al-Hamwia ; Kinan Al-Awa ; Rama Al-Hamwi ; Shiraz Naji ; Abd Al-Hadi Nofal

The rapid development of communication technology, is bringing many technological conveniences with it and simplifying our ...

اقرأ المزيد
978-3-030-62205-3
Mobile Wireless Middleware, Operating Systems and Applications

This book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...

اقرأ المزيد
978-0-387-26090-7
Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...

اقرأ المزيد
978-981-15-8711-5
Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems) /

Provides an insight about various techniques used in multimedia security and identifies its progress in both technological ...

اقرأ المزيد
978-0-387-36946-4
Multivariate Public Key Cryptosystems

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...

اقرأ المزيد
978-3-540-88140-7
Network and Parallel Computing : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings

This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC ...

اقرأ المزيد
978-3-540-71641-9
Networked RFID Systems and Lightweight Cryptography : Raising Barriers to Product Counterfeiting

This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...

اقرأ المزيد
978-3-540-68351-3
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

اقرأ المزيد
978-1-84800-001-8
Number Story : From Counting to Cryptography

Numbers have fascinated people for centuries. They are familiar to everyone, forming a central pillar of our understanding ...

اقرأ المزيد
978-0-8176-4541-0
Number Theory : An Introduction via the Distribution of Primes

This book provides an introduction and overview of number theory based on the distribution and properties of primes. This ...

اقرأ المزيد
978-0-387-25096-0
Optical and Digital Techniques for Information Security

Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...

اقرأ المزيد
978-3-540-85538-5
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...

اقرأ المزيد
978-3-540-73489-5
Pairing-Based Cryptography – Pairing 2007

Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...

اقرأ المزيد
978-3-540-88403-3
Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...

اقرأ المزيد
978-0-387-38162-6
Power Analysis Attacks

This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...

اقرأ المزيد
978-0-387-28979-3
Prime Numbers

Prime numbers beckon to the beginner, as the basic notion of primality is accessible even to children. Yet, some of the simplest ...

اقرأ المزيد
978-3-319-89722-6
Principles of Security and Trust

This volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...

اقرأ المزيد
عدد الكتب: 161 - 180 /263