Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties.
Bemærk: Kan ikke leveres før jul.
The two-volume proceedings LNCS 9665 + 9666constitutes the thoroughly refereed proceedings of the 35th AnnualInternational Conference on the Theory and Applications of CryptographicTechniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016.
Bemærk: Kan ikke leveres før jul.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions.
Bemærk: Kan ikke leveres før jul.
This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 15th International... Læs mere
Bemærk: Kan ikke leveres før jul.
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber... Læs mere
Bemærk: Kan ikke leveres før jul.
This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery.
Bemærk: Kan ikke leveres før jul.
It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management.
Bemærk: Kan ikke leveres før jul.
This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are... Læs mere