for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties.
Bemærk: Kan ikke leveres før jul.
As such, the book is a collection of recent and innovative works in the field Network Security and Cryptography, Cloud Computing and Big Data Analytics, Data Mining and Data Warehouse, Communication and Nanotechnology and VLSI and Image Processing.
Bemærk: Kan ikke leveres før jul.
The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, 2012.
Bemærk: Kan ikke leveres før jul.
This book takes a fresh look at biometrics and identity management, extending the dialogue beyond technical considerations, and exploring some of the broader societal and philosophical aspects surrounding the use of biometric applications.
Bemærk: Kan ikke leveres før jul.
This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945.
Bemærk: Kan ikke leveres før jul.
This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems.
Bemærk: Kan ikke leveres før jul.
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber... Læs mere
Bemærk: Kan ikke leveres før jul.
Cybercrime, Digital Forensics and Jurisdiction
Bemærk: Kan ikke leveres før jul.
This book is about enforcing privacy and data protection. Contributors to this book - including regulators, privacy advocates,... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book explains how major world economies are recognizing the need for a major push in cyber policy environments.
Bemærk: Kan ikke leveres før jul.
This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are... Læs mere