Electronic Books

Total Books: 681 - 700 /920
Progress in Cryptology - INDOCRYPT 2005

Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...

Lire la suite
Progress in Cryptology - INDOCRYPT 2006

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, ...

Lire la suite
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

Lire la suite
Progress in Cryptology – INDOCRYPT 2007

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...

Lire la suite
Progress in Cryptology – Mycrypt 2005

Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized ...

Lire la suite
NoIMG
Property protection register ماسة نزار سيروان ؛ أحمد منيف شاهين ؛ حنان محمد عزيز موالدي ؛ محمد أكرم محمد خيري دولاتي ؛ ليث خلدون الحليبي ؛ إشراف د.أبي صندوق

The aim of our project is to prevent the loss of items whether they have a monetary or an emotional value to their owner ...

Lire la suite
Provable Security : Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...

Lire la suite
Provable and Practical Security

This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...

Lire la suite
Provenance and Annotation of Data

This book constitutes the thoroughly referred post-proceedings of the International Provenance and Annotation Workshops, ...

Lire la suite
Public Administration in Germany

This book presents a topical, comprehensive and differentiated analysis of Germany’s public administration and reforms. ...

Lire la suite
Public Key Cryptography - PKC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...

Lire la suite
Public Key Infrastructure

These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held ...

Lire la suite
Public Key Infrastructure (vol. # 3545)

This book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city ...

Lire la suite
Public Key Infrastructure (vol. # 4043)

To discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...

Lire la suite
Python for Cybersecurity: Using Python for Cyber Offense and Defense / Howard E. Poston

Delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework ...

Lire la suite
Quality Of Protection

Information security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...

Lire la suite
Quality of Information and Communications Technology

This book constitutes the refereed proceedings of the 13th International Conference on the Quality of Information and Communications ...

Lire la suite
Quality of Software Architectures

Although the quality of a system’s software architecture is one of the critical factors in its overall quality, the architecture ...

Lire la suite
Quantum Magnetism

This bookis based on some of the lectures duringthe Paci?c Institute of Theoretical Physics (PITP) summer school on “Quantum ...

Lire la suite
RFID Security and Privacy : Concepts, Protocols, and Architectures

The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...

Lire la suite
Total Books: 681 - 700 /920