Electronic Books

Total Books: 11/11
Advances in Cryptology - CRYPTO 2007

The book address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis.

Lee mas
Advances in Cryptology - CRYPTO 2007

The book address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis.

Lee mas
Advances in Cryptology - CRYPTO 2008 : 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings

This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held ...

Lee mas
Digital Rights Management

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...

Lee mas
Information Systems Security

This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...

Lee mas
Information Systems Security (vol. # 4332)

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS ...

Lee mas
Information Theoretic Security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...

Lee mas
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...

Lee mas
Pairing-Based Cryptography – Pairing 2007

Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...

Lee mas
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

Lee mas
Transactions on Data Hiding and Multimedia Security II

This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

Lee mas
Total Books: 11/11