الكتب الالكترونية

عدد الكتب: 1 - 20 /25
978-3-540-48184-3
Advances in Cryptology - CRYPTO -87

Zero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably ...

اقرأ المزيد
978-3-540-46877-6
Advances in Cryptology - EUROCRYPT 90

Eurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the ...

اقرأ المزيد
978-3-540-47721-1
Advances in Cryptology — CRYPTO’ 86

This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...

اقرأ المزيد
978-3-540-35482-6
Coding and Cryptography

This volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...

اقرأ المزيد
978-3-030-34142-8
Cryptography Arithmetic : Algorithms and Hardware Architectures

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...

اقرأ المزيد
978-3-540-48121-8
Decrypted Secrets

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...

اقرأ المزيد
978-3-540-48121-8
Decrypted Secrets

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...

اقرأ المزيد
978-3-540-33355-5
Information Security and Cryptology - ICISC 2005

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...

اقرأ المزيد
978-3-540-31684-8
Information Security and Privacy (vol. # 3574)

Constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...

اقرأ المزيد
978-3-540-35459-8
Information Security and Privacy (vol. # 4058)

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...

اقرأ المزيد
978-3-540-70500-0
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-540-77086-2
Information Systems Security

This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...

اقرأ المزيد
978-0-387-26090-7
Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...

اقرأ المزيد
978-0-387-36946-4
Multivariate Public Key Cryptosystems

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...

اقرأ المزيد
978-3-540-30556-9
Progress in Cryptology - INDOCRYPT 2004

The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...

اقرأ المزيد
978-3-540-32278-8
Progress in Cryptology - INDOCRYPT 2005

Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...

اقرأ المزيد
978-3-540-89754-5
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

اقرأ المزيد
978-3-540-68800-6
Progress in Cryptology - VIETCRYPT 2006

The papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...

اقرأ المزيد
978-3-540-77026-8
Progress in Cryptology – INDOCRYPT 2007

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...

اقرأ المزيد
978-3-540-30580-4
Public Key Cryptography - PKC 2005

Constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...

اقرأ المزيد
عدد الكتب: 1 - 20 /25