 
                This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra ...
Weiterlesen 
                Compressing data is an option naturally selected when faced with problems of high costs or restricted space. Written by a ...
Weiterlesen 
                The sixth international conference on AD-HOC NetwOrks and Wireless was held in the city of Morelia, Michoacan State, Mexico. ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 4th International Conference on Ad-Hoc Networks and Wireless, ADHOiNOW ...
Weiterlesen 
                This book presents a comprehensive treatment of biometrics and offers coverage of the entire gamut of topics in the field, ...
Weiterlesen 
                Zero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held ...
Weiterlesen 
                This book constitutes the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International ...
Weiterlesen 
                This book constitutes the proceedings of the 11th International Conference on the Theory and Application of Cryptology and ...
Weiterlesen 
                This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
Weiterlesen 
                The series of International Conferences on Extending Database Technology (EDBT) is an established and prestigious forum for ...
Weiterlesen 
                Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Weiterlesen 
                These volume on Information Systems Development examine the exchange of ideas between academia and industry and aims to explore ...
Weiterlesen 
                These volume on Information Systems Development examine the exchange of ideas between academia and industry and aims to explore ...
Weiterlesen 
                This volume contains the proceedings of the 3rd International Conference on AdvancesinInformationSystems (ADVIS)heldinIzmir,Turkey, ...
Weiterlesen 
                The book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Weiterlesen 
                The book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Weiterlesen 
                This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Agent-Mediated Electronic ...
Weiterlesen