This book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...
Weiterlesen
Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
Weiterlesen
Provides an insight about various techniques used in multimedia security and identifies its progress in both technological ...
Weiterlesen
Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...
Weiterlesen
This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC ...
Weiterlesen
This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Weiterlesen
The theory of formal languages is widely recognized as the backbone of theoretical computer science, originating from mathematics ...
Weiterlesen
The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Weiterlesen
Gathers selected, peer-reviewed original contributions presented at the International Conference on Computational Vision ...
Weiterlesen
Every day, we use our computers to perform remarkable feats. A simple web search picks out a handful of relevant needles ...
Weiterlesen
Numbers have fascinated people for centuries. They are familiar to everyone, forming a central pillar of our understanding ...
Weiterlesen
This book provides an introduction and overview of number theory based on the distribution and properties of primes. This ...
Weiterlesen
Number Theory is one of the most classic fields of Mathematics. The numbers he deals with are those that are called natural ...
Weiterlesen
Number Theory is one of the most classic fields of Mathematics. The numbers he deals with are those that are called natural ...
Weiterlesen
Optical scanning holography (OSH) is an emerging area of interest with many potential novel applications, such as 3-D pattern ...
Weiterlesen
Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...
Weiterlesen
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...
Weiterlesen
Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...
Weiterlesen
The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...
Weiterlesen
This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...
Weiterlesen