Electronic Books

Total Books: 161 - 180 /263
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

Lee mas
Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...

Lee mas
Mathematical Methods in Computer Science : Essays in Memory of Thomas Beth

This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, ...

Lee mas
NoIMG
Messages security application / Bilal Al-Hamwia ; Kinan Al-Awa ; Rama Al-Hamwi ; Shiraz Naji ; Abd Al-Hadi Nofal

The rapid development of communication technology, is bringing many technological conveniences with it and simplifying our ...

Lee mas
Mobile Wireless Middleware, Operating Systems and Applications

This book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...

Lee mas
Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...

Lee mas
Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems) /

Provides an insight about various techniques used in multimedia security and identifies its progress in both technological ...

Lee mas
Multivariate Public Key Cryptosystems

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...

Lee mas
Network and Parallel Computing : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings

This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC ...

Lee mas
Networked RFID Systems and Lightweight Cryptography : Raising Barriers to Product Counterfeiting

This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...

Lee mas
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

Lee mas
Number Story : From Counting to Cryptography

Numbers have fascinated people for centuries. They are familiar to everyone, forming a central pillar of our understanding ...

Lee mas
Number Theory : An Introduction via the Distribution of Primes

This book provides an introduction and overview of number theory based on the distribution and properties of primes. This ...

Lee mas
Optical and Digital Techniques for Information Security

Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...

Lee mas
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...

Lee mas
Pairing-Based Cryptography – Pairing 2007

Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...

Lee mas
Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...

Lee mas
Power Analysis Attacks

This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...

Lee mas
Prime Numbers

Prime numbers beckon to the beginner, as the basic notion of primality is accessible even to children. Yet, some of the simplest ...

Lee mas
Principles of Security and Trust

This volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...

Lee mas
Total Books: 161 - 180 /263