Electronic Books

Total Books: 1 - 20 /47
A Classical Introduction to Cryptography

This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra ...

Lire la suite
Advanced Web and Network Technologies, and Applications

The QOS evaluating model for computational grid nodes put forward can help greatly improving the self-adaptability of resource ...

Lire la suite
Applied Cryptography and Network Security (vol. # 3531)

The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...

Lire la suite
Basal Implantology

This manual will help oral implantologists to understand the principles that underlie the use of basal implants as a means ...

Lire la suite
Blockchain, Artificial Intelligence, and the Internet of Things : Possibilities and Opportunities / PPethuru Raj, Ashutosh Kumar Dubey, Abhishek Kumar, Pramod Singh

Provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain ...

Lire la suite
Blockchain: Empowering Secure Data Sharing

The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, ...

Lire la suite
Certification and Security in Inter-Organizational E-Services

This collection of papers offers real-life application experiences, research results and methodological proposals of direct ...

Lire la suite
Communications and Multimedia Security (vol. # 3677)

This book constitutes the refereed proceedings of the 9th IFIP Ti6 Ti11 International Conference on Communications and Multimedia ...

Lire la suite
Computer Network Security (vol. # 3685)

This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...

Lire la suite
Computer Security - ESORICS 2005

These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...

Lire la suite
Computer Security – ESORICS 2006

This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...

Lire la suite
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lire la suite
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lire la suite
Cryptographic Hardware and Embedded Systems - CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings

This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...

Lire la suite
Data and Applications Security XIX

Constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...

Lire la suite
Data and Applications Security XX

For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...

Lire la suite
Embedded Security in Cars

Lemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive ...

Lire la suite
Financial Cryptography

Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...

Lire la suite
Guide to Efficient Software Design

This classroom-tested textbook presents an active-learning approach to the foundational concepts of software design. These ...

Lire la suite
High Performance Embedded Architectures and Compilers

The ProgramCommittee received a total of 84 submissions; only 17 were selected for presentation as full-length papers and ...

Lire la suite
Total Books: 1 - 20 /47