Electronic Books

Total Books: 561 - 580 /774
Programming Languages and Systems (vol. # 3924)

This volume contains the proceedings of the ETAPS 2006 was the ninth instance of the European Joint Conferences on Theory ...

Lee mas
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

Lee mas
Progress in Cryptology - AFRICACRYPT 2020 : 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...

Lee mas
Progress in Cryptology - INDOCRYPT 2004

The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...

Lee mas
Progress in Cryptology - INDOCRYPT 2005

Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...

Lee mas
Progress in Cryptology - INDOCRYPT 2006

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, ...

Lee mas
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

Lee mas
Progress in Cryptology – Mycrypt 2005

Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized ...

Lee mas
Provable Security : Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...

Lee mas
Provable and Practical Security

This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...

Lee mas
Provenance and Annotation of Data

This book constitutes the thoroughly referred post-proceedings of the International Provenance and Annotation Workshops, ...

Lee mas
Public Administration in Germany

This book presents a topical, comprehensive and differentiated analysis of Germany’s public administration and reforms. ...

Lee mas
Public Key Cryptography - PKC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...

Lee mas
Python for Cybersecurity: Using Python for Cyber Offense and Defense / Howard E. Poston

Delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework ...

Lee mas
Quality Of Protection

Information security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...

Lee mas
Quality of Information and Communications Technology

This book constitutes the refereed proceedings of the 13th International Conference on the Quality of Information and Communications ...

Lee mas
Quality of Software Architectures

Although the quality of a system’s software architecture is one of the critical factors in its overall quality, the architecture ...

Lee mas
Quantum Magnetism

This bookis based on some of the lectures duringthe Paci?c Institute of Theoretical Physics (PITP) summer school on “Quantum ...

Lee mas
RFID Security and Privacy : Concepts, Protocols, and Architectures

The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...

Lee mas
Radiation Detectors for Medical Applications

This book about The "NATO Advanced Research Workshop on radiation detectors for medical imaging" The talks of 14 keynote ...

Lee mas
Total Books: 561 - 580 /774