Electronic Books

Total Books: 181 - 195 /195
The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden, August 4–10, 2007

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The ...

Weiterlesen
Topics in Cryptology - CT-RSA 2008 : The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings

This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...

Weiterlesen
Topics in Cryptology -- CT-RSA 2006

This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...

Weiterlesen
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...

Weiterlesen
Trusted Computing Platforms

Trusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...

Weiterlesen
Trustworthy Global Computing

Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, ...

Weiterlesen
Turbo Code Applications

Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...

Weiterlesen
NoIMG
Turbo-like Codes

A major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several ...

Weiterlesen
Variable-length Codes for Data Compression

Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...

Weiterlesen
Vulnerability Analysis and Defense for the Internet

This book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...

Weiterlesen
NoIMG
Wind Effects on Buildings and Design of Wind-Sensitive Structures

The articles in this book, written by seven internationally known experts, present the fundamentals and practical applications ...

Weiterlesen
Wireless Communications 2007 CNIT Thyrrenian Symposium

Wireless Communications: 2007 CNIT Thyrrhenian Symposium compiles the papers presented at the 2007 Thyrrenian International ...

Weiterlesen
Wireless Systems and Mobility in Next Generation Internet

The Internet is subject to permanent modi?cations and to continuous restr- turing. This is primarily due to the tremendous ...

Weiterlesen
Wireless Systems and Mobility in Next Generation Internet

This book It covers WLAN characterization, vehicular networks, WLAN and sensor networks protocols, QoS and routing in ad-hoc ...

Weiterlesen
Women and the Mafia

The book introduces us to the professional women of the Argentine "mafia state", Albanian human traffickers, spies for ...

Weiterlesen
Total Books: 181 - 195 /195