The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Continue readingThis book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
Continue readingThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Continue readingTrusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...
Continue readingConstitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, ...
Continue readingTurbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...
Continue readingA major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several ...
Continue readingMost data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...
Continue readingThis book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...
Continue readingThe articles in this book, written by seven internationally known experts, present the fundamentals and practical applications ...
Continue readingWireless Communications: 2007 CNIT Thyrrhenian Symposium compiles the papers presented at the 2007 Thyrrenian International ...
Continue readingThe Internet is subject to permanent modi?cations and to continuous restr- turing. This is primarily due to the tremendous ...
Continue readingThis book It covers WLAN characterization, vehicular networks, WLAN and sensor networks protocols, QoS and routing in ad-hoc ...
Continue readingThe book introduces us to the professional women of the Argentine "mafia state", Albanian human traffickers, spies for ...
Continue reading