Electronic Books

Total Books: 201 - 220 /315
Mobile Wireless Middleware, Operating Systems and Applications

This book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...

Lire la suite
Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...

Lire la suite
Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems) /

Provides an insight about various techniques used in multimedia security and identifies its progress in both technological ...

Lire la suite
Multivariate Public Key Cryptosystems

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...

Lire la suite
Network and Parallel Computing : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings

This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC ...

Lire la suite
Networked RFID Systems and Lightweight Cryptography : Raising Barriers to Product Counterfeiting

This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...

Lire la suite
New Developments in Formal Languages and Applications

The theory of formal languages is widely recognized as the backbone of theoretical computer science, originating from mathematics ...

Lire la suite
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

Lire la suite
New Trends in Computational Vision and Bio-inspired Computing

Gathers selected, peer-reviewed original contributions presented at the International Conference on Computational Vision ...

Lire la suite
Nine Algorithms That Changed The Future: The Ingenious Ideas That Drive Today’s Computers / John MacCormick

Every day, we use our computers to perform remarkable feats. A simple web search picks out a handful of relevant needles ...

Lire la suite
Number Story : From Counting to Cryptography

Numbers have fascinated people for centuries. They are familiar to everyone, forming a central pillar of our understanding ...

Lire la suite
Number Theory : An Introduction via the Distribution of Primes

This book provides an introduction and overview of number theory based on the distribution and properties of primes. This ...

Lire la suite
Numeri e Crittografia

Number Theory is one of the most classic fields of Mathematics. The numbers he deals with are those that are called natural ...

Lire la suite
Numeri e Crittografia

Number Theory is one of the most classic fields of Mathematics. The numbers he deals with are those that are called natural ...

Lire la suite
Optical Scanning Holography with MATLAB

Optical scanning holography (OSH) is an emerging area of interest with many potential novel applications, such as 3-D pattern ...

Lire la suite
Optical and Digital Techniques for Information Security

Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...

Lire la suite
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...

Lire la suite
Pairing-Based Cryptography – Pairing 2007

Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...

Lire la suite
Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...

Lire la suite
Power Analysis Attacks

This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...

Lire la suite
Total Books: 201 - 220 /315