Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Intermediate-Advanced user level
Bemærk: Kan ikke leveres før jul.
This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 9thInternational Conference on Cloud Computing, CloudComp 2019, and the 4th International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2019, both held in Beijing, China, in December 2019.
Bemærk: Kan ikke leveres før jul.
This book constitutes the proceedings of the 14th IFIP WG 11.12... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the proceedings of the 14th IFIP WG 11.12... Læs mere
Bemærk: Kan ikke leveres før jul.
This book provides comprehensive coverage of various Cryptography topics, while highlighting the most recent trends such as quantum, blockchain, lightweight, Chaotic and DNA cryptography.
Bemærk: Kan ikke leveres før jul.
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020.
Bemærk: Kan ikke leveres før jul.
This book introduces physics students to concepts and methods of finance. Juxtaposing the key methods to applications in both physics and finance articulates both differences and common features, this gives students a deeper understanding of the underlying ideas.
Bemærk: Kan ikke leveres før jul.
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the... Læs mere
Bemærk: Kan ikke leveres før jul.
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the... Læs mere
Bemærk: Kan ikke leveres før jul.
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting.