Electronic Books

Total Books: 41 - 60 /263
Arithmetic of Finite Fields

This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic ...

Lee mas
Arithmetic of Finite Fields : 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings

This book constitutes the refereed proceedings of the Second International Workshop on the Arithmetic of Finite Fields, WAIFI ...

Lee mas
Artificial Intelligence and Security

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...

Lee mas
Artificial Intelligence and Security : 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...

Lee mas
Artificial Intelligence and Security : 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...

Lee mas
Automata, Languages and Programming : 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II

The two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th International Colloquium on Automata, ...

Lee mas
Autonomic and Trusted Computing : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings

This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC ...

Lee mas
Binary Quadratic Forms : An Algorithmic Approach

This book deals with algorithmic problems concerning binary quadratic forms 2 2 f(X,Y)= aX +bXY +cY with integer coe?cients ...

Lee mas
Brute Force

In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces ...

Lee mas
Cellular Automata : 8th International Conference on Cellular Aotomata for Reseach and Industry, ACRI 2008, Yokohama, Japan, September 23-26, 2008. Proceedings

This book constitutes the refereed proceedings of the 8th International Conference on Cellular Automata for Research and ...

Lee mas
Codes: An Introduction to Information Communication and Cryptography

Information is an important feature of the modern world. Mathematical techniques underlie the devices that we use to handle ...

Lee mas
Coding and Cryptography

This volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...

Lee mas
Communications and Multimedia Security (vol. # 175)

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields ...

Lee mas
Communications and Multimedia Security (vol. # 4237)

Scientists, managers, and politicians all over the world havedesignedandarecurrently implementing systematicapproachesto ...

Lee mas
Complexity Theory and Cryptology

Modern cryptology employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research ...

Lee mas
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation : 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers

This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...

Lee mas
Computer Network Security

As society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...

Lee mas
Computer Safety, Reliability, and Security

This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...

Lee mas
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lee mas
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lee mas
Total Books: 41 - 60 /263