Electronic Books

Total Books: 21 - 40 /80
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Continue reading
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Continue reading
978-0-387-48742-7
Cryptanalytic Attacks on RSA

RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...

Continue reading
978-3-540-31940-5
Cryptographic Hardware and Embedded Systems - CHES 2005

Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...

Continue reading
978-3-540-46561-4
Cryptographic Hardware and Embedded Systems - CHES 2006

These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...

Continue reading
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

Continue reading
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

Continue reading
978-3-540-32418-8
Cryptography and Coding

Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...

Continue reading
1119582423
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, 2nd Edition / Aiden A. Bruen, Mario A. Forcinito, James M. McQuillan

A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...

Continue reading
978-3-540-76969-9
Cryptology and Network Security

This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...

Continue reading
978-3-540-76969-9
Cryptology and Network Security

This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...

Continue reading
978-3-540-49463-8
Cryptology and Network Security (vol. # 4301)

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...

Continue reading
978-3-540-89641-8
Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...

Continue reading
978-981-19-4017-0
Deep Learning for Computational Problems in Hardware Security : Modeling Attacks on Strong Physically Unclonable Function Circuits / Pranesh Santikellur, Rajat Subhra Chakraborty

Discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...

Continue reading
978-3-540-36017-9
Detection of Intrusions and Malware, and Vulnerability Assessment

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...

Continue reading
978-3-540-31805-7
Digital Watermarking (vol. # 3304)

We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since ...

Continue reading
978-3-540-48827-9
Digital Watermarking (vol. # 4283)

IWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was “Meet the Challenges in this ...

Continue reading
978-3-540-77493-8
E-Voting and Identity

Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...

Continue reading
978-3-540-77493-8
E-Voting and Identity

Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...

Continue reading
978-3-540-32296-2
Embedded and Ubiquitous Computing - EUC 2005 Workshops

This book constitutes the refereed proceedings of the EUC 2005 workshops held in conjunction with the IFIP International ...

Continue reading
Total Books: 21 - 40 /80