The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lire la suiteThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Lire la suiteThis book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
Lire la suiteThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Lire la suiteTrusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...
Lire la suiteConstitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, ...
Lire la suiteTurbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...
Lire la suiteA major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several ...
Lire la suiteMost data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...
Lire la suiteThis book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...
Lire la suiteThe articles in this book, written by seven internationally known experts, present the fundamentals and practical applications ...
Lire la suiteWireless Communications: 2007 CNIT Thyrrhenian Symposium compiles the papers presented at the 2007 Thyrrenian International ...
Lire la suiteThe Internet is subject to permanent modi?cations and to continuous restr- turing. This is primarily due to the tremendous ...
Lire la suiteThis book It covers WLAN characterization, vehicular networks, WLAN and sensor networks protocols, QoS and routing in ad-hoc ...
Lire la suiteThe book introduces us to the professional women of the Argentine "mafia state", Albanian human traffickers, spies for ...
Lire la suite