Electronic Books

Total Books: 21 - 40 /93
978-3-540-31998-6
Computer Network Security (vol. # 3685)

This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...

Continue reading
978-3-540-88313-5
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...

Continue reading
978-3-540-44605-7
Computer Security – ESORICS 2006

This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...

Continue reading
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Continue reading
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Continue reading
978-0-387-48742-7
Cryptanalytic Attacks on RSA

RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...

Continue reading
978-3-540-31940-5
Cryptographic Hardware and Embedded Systems - CHES 2005

Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...

Continue reading
978-3-540-46561-4
Cryptographic Hardware and Embedded Systems - CHES 2006

These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...

Continue reading
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

Continue reading
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

Continue reading
978-3-540-32418-8
Cryptography and Coding

Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...

Continue reading
1119582423
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, 2nd Edition / Aiden A. Bruen, Mario A. Forcinito, James M. McQuillan

A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...

Continue reading
978-3-540-76969-9
Cryptology and Network Security

This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...

Continue reading
978-3-540-76969-9
Cryptology and Network Security

This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...

Continue reading
978-3-540-49463-8
Cryptology and Network Security (vol. # 4301)

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...

Continue reading
978-3-540-89641-8
Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...

Continue reading
978-981-19-4017-0
Deep Learning for Computational Problems in Hardware Security : Modeling Attacks on Strong Physically Unclonable Function Circuits / Pranesh Santikellur, Rajat Subhra Chakraborty

Discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...

Continue reading
NoIMG
Designing & Implementing an IDS in SDN / Waseem Al-Kurdi ; Yaman Dukmak ; Taiseer Al-zaim

Solving the problem of the various type of unknown attacks that are hitting not only companies but also high level business ...

Continue reading
978-3-540-36017-9
Detection of Intrusions and Malware, and Vulnerability Assessment

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...

Continue reading
978-3-540-70542-0
Detection of Intrusions and Malware, and Vulnerability Assessment : 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...

Continue reading
Total Books: 21 - 40 /93