Electronic Books

Total Books: 181 - 195 /195
The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden, August 4–10, 2007

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The ...

Lee mas
Topics in Cryptology - CT-RSA 2008 : The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings

This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...

Lee mas
Topics in Cryptology -- CT-RSA 2006

This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...

Lee mas
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...

Lee mas
Trusted Computing Platforms

Trusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...

Lee mas
Trustworthy Global Computing

Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, ...

Lee mas
Turbo Code Applications

Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...

Lee mas
NoIMG
Turbo-like Codes

A major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several ...

Lee mas
Variable-length Codes for Data Compression

Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...

Lee mas
Vulnerability Analysis and Defense for the Internet

This book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...

Lee mas
NoIMG
Wind Effects on Buildings and Design of Wind-Sensitive Structures

The articles in this book, written by seven internationally known experts, present the fundamentals and practical applications ...

Lee mas
Wireless Communications 2007 CNIT Thyrrenian Symposium

Wireless Communications: 2007 CNIT Thyrrhenian Symposium compiles the papers presented at the 2007 Thyrrenian International ...

Lee mas
Wireless Systems and Mobility in Next Generation Internet

The Internet is subject to permanent modi?cations and to continuous restr- turing. This is primarily due to the tremendous ...

Lee mas
Wireless Systems and Mobility in Next Generation Internet

This book It covers WLAN characterization, vehicular networks, WLAN and sensor networks protocols, QoS and routing in ad-hoc ...

Lee mas
Women and the Mafia

The book introduces us to the professional women of the Argentine "mafia state", Albanian human traffickers, spies for ...

Lee mas
Total Books: 181 - 195 /195