الكتب الالكترونية

عدد الكتب: 1 - 20 /21
978-3-540-89255-7
Advances in Cryptology - ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...

اقرأ المزيد
978-3-540-72540-4
Advances in Cryptology - EUROCRYPT 2007

This book address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis ...

اقرأ المزيد
978-3-540-72540-4
Advances in Cryptology - EUROCRYPT 2007

This book address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis ...

اقرأ المزيد
978-3-540-78967-3
Advances in Cryptology - EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings

Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic ...

اقرأ المزيد
978-3-540-76900-2
Advances in Cryptology – ASIACRYPT 2007

The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...

اقرأ المزيد
978-3-540-76900-2
Advances in Cryptology – ASIACRYPT 2007

The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...

اقرأ المزيد
978-3-030-78372-3
Applied Cryptography and Network Security

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...

اقرأ المزيد
978-3-540-70760-8
E-Business and Telecommunication Networks :Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papers

This book constitutes the best papers of the Third International Conference on E-business and Telecommunication Networks, ...

اقرأ المزيد
978-3-540-74619-5
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

اقرأ المزيد
978-3-540-74619-5
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

اقرأ المزيد
978-3-540-31669-5
Fast Software Encryption (vol. # 3557)

The Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...

اقرأ المزيد
978-3-540-71039-4
Fast Software Encryption : 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers

Constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...

اقرأ المزيد
978-3-540-85886-7
Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...

اقرأ المزيد
978-3-540-73458-1
Information Security and Privacy

The book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...

اقرأ المزيد
978-3-540-70500-0
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-540-68351-3
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

اقرأ المزيد
978-3-540-88403-3
Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...

اقرأ المزيد
978-3-540-68164-9
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

اقرأ المزيد
978-3-540-75670-5
Provable Security

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, ...

اقرأ المزيد
978-3-540-74462-7
Selected Areas in Cryptography ; 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers

These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...

اقرأ المزيد
عدد الكتب: 1 - 20 /21