Electronic Books

Total Books: 61 - 80 /97
Information Systems Security (vol. # 4332)

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS ...

Lire la suite
Information Theoretic Security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...

Lire la suite
Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...

Lire la suite
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

Lire la suite
Number Theory in Science and Communication

"Number Theory in Science and Communication" is a well-known introduction for non-mathematicians to this fascinating and ...

Lire la suite
Optical and Digital Techniques for Information Security

Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...

Lire la suite
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...

Lire la suite
Pairing-Based Cryptography – Pairing 2007

Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...

Lire la suite
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

Lire la suite
Progress in Cryptology - INDOCRYPT 2005

Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...

Lire la suite
Progress in Cryptology - INDOCRYPT 2006

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, ...

Lire la suite
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

Lire la suite
Provable Security

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, ...

Lire la suite
Provable and Practical Security

This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...

Lire la suite
Public Key Cryptography - PKC 2005

Constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...

Lire la suite
Public Key Cryptography - PKC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...

Lire la suite
Public Key Cryptography - PKC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...

Lire la suite
Public Key Cryptography - PKC 2008 : 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...

Lire la suite
Random Curves : Journeys of a Mathematician

These autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital ...

Lire la suite
Secure Data Management

Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...

Lire la suite
Total Books: 61 - 80 /97