Electronic Books

Total Books: 21 - 40 /148
978-3-540-76900-2
Advances in Cryptology – ASIACRYPT 2007

The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...

Continue reading
978-3-540-47721-1
Advances in Cryptology — CRYPTO’ 86

This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...

Continue reading
978-0-387-36842-9
Algebraic Aspects of the Advanced Encryption Standard

The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology ...

Continue reading
978-3-540-79456-1
Algorithmic Number Theory : 8th International Symposium, ANTS-VIII Banff, Canada, May 17-22, 2008 Proceedings

This book constitutes the refereed proceedings of the 8th International Algorithmic Number Theory Symposium, ANTS 2008, held ...

Continue reading
978-0-387-77994-2
An Introduction to Mathematical Cryptography

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...

Continue reading
978-3-540-68914-0
Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings

This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ...

Continue reading
978-3-540-69499-1
Arithmetic of Finite Fields : 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings

This book constitutes the refereed proceedings of the Second International Workshop on the Arithmetic of Finite Fields, WAIFI ...

Continue reading
978-3-540-70583-3
Automata, Languages and Programming : 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II

The two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th International Colloquium on Automata, ...

Continue reading
978-3-540-69295-9
Autonomic and Trusted Computing : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings

This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC ...

Continue reading
978-3-540-46368-9
Binary Quadratic Forms : An Algorithmic Approach

This book deals with algorithmic problems concerning binary quadratic forms 2 2 f(X,Y)= aX +bXY +cY with integer coe?cients ...

Continue reading
978-3-030-77637-4
Blockchain, Artificial Intelligence, and the Internet of Things : Possibilities and Opportunities / PPethuru Raj, Ashutosh Kumar Dubey, Abhishek Kumar, Pramod Singh

Provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain ...

Continue reading
978-0-387-68768-1
Botnet Detection : Countering the Largest Security Threat

Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based ...

Continue reading
NoIMG
Building the Infrastructure for Cloud Security : A Solutions view

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security ...

Continue reading
978-0-387-29773-6
Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government

This book constitutes the refereed proceedings of the5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E’2005), ...

Continue reading
978-3-540-87448-5
Coding Theory and Applications : Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings

This book constitutes the refereed proceedings of the 2nd International Castle Meeting, ISMCTA 2008. The papers cover network ...

Continue reading
978-3-540-35482-6
Coding and Cryptography

This volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...

Continue reading
978-3-540-28520-5
Complexity Theory and Cryptology

Modern cryptology employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research ...

Continue reading
978-3-540-88313-5
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...

Continue reading
978-2-287-28099-3
Computer Viruses: from theory to applications

The purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...

Continue reading
978-3-7643-7394-8
Contemporary Cryptology / Public key encription / Random functions / computational complexity / cryptography / cryptology

The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent ...

Continue reading
Total Books: 21 - 40 /148