Forensic Computing
The second edition of this successful book shows how the contents of computer systems can be...
EAN: 9781849965965
Information Security Management & Small Systems Security
The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems...
EAN: 9781475754834
Brief History of Cryptology and Cryptographic Algorithms
For over 2,000 years, the desire to communicate securely and secretly has resulted in the...
EAN: 9783319016276
Availability, Reliability, and Security in Information Systems and HCI
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International...
EAN: 9783642405105
Financial Cryptography and Data Security
EAN: 9783642398834
Information Theory and Quantum Physics
EAN: 9783642630613
Advances in Cryptology – CRYPTO 2013
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd...
EAN: 9783642400834
Advances in Cryptology – CRYPTO 2013
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd...
EAN: 9783642400407
Data and Applications Security and Privacy XXVII
This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference...
EAN: 9783642392559
Hypercomputation
This book provides a thorough description of hypercomputation, covering all attempts at devising...
EAN: 9781441940407
Black-Box Models of Computation in Cryptology
Generic group algorithms solve computational problems defined over algebraic groups without...
EAN: 9783834819895
TErrestrial Trunked RAdio - TETRA
Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security...
EAN: 9783642090295
Handbook of Multibiometrics
Multibiometric systems are expected to meet the stringent performance requirements imposed by...
EAN: 9781441935472
Fundamentals in Information Theory and Coding
The work introduces the fundamentals concerning the measure of discrete information, the modeling...
EAN: 9783642448720
10 Don'ts on Your Digital Devices
In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to...
EAN: 9781484203682
Primality Testing and Integer Factorization in Public-Key Cryptography
The Primality Testing Problem (PTP) has now proved to be solvable in deterministic...
EAN: 9781441945860
Biometric User Authentication for IT Security
EAN: 9781441938732
Advances in Information Processing and Protection
The Computer Science is relatively new field which is developing very fast not only because due...
EAN: 9781441944573
Cryptographic Engineering
Intended for a graduate-level course in Cryptographic Engineering, this text will teach students...
EAN: 9781441944177
Power Analysis Attacks
Power analysis attacks allow the extraction of secret information from smart cards. In all these...
EAN: 9781441940391
Security and Privacy in Communication Networks
This volume presents the refereed proceedings of the 8th International ICST Conference on...
EAN: 9783642368820
Algebraic Aspects of the Advanced Encryption Standard
EAN: 9781441937292
Security and Trust Management
This book constitutes the thoroughly refereed post-conference proceedings of the 8th...
EAN: 9783642380037