Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book discusses the state-of-the-art techniques in the domain of contact tracing applications. This book provides a link between new proposals related to contact tracing applications and a contextual literature review primarily from the cryptologic viewpoint.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed post-conference proceedings of the... Læs mere
Bemærk: Kan ikke leveres før jul.
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information... Læs mere
Bemærk: Kan ikke leveres før jul.
This book analyzes the fundamental issues faced when blockchain technology is applied to real-life applications. Also explained is the reason why blockchain is hard to adopt for real-life problems but is valuable as a foundation for flexible ecosystems.
Bemærk: Kan ikke leveres før jul.
The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum... Læs mere
Bemærk: Kan ikke leveres før jul.
The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Quantum Ready is not just a warning, it’s a field guide for the era of quantum disruption. As quantum computing accelerates toward the threshold where today’s encryption becomes obsolete, organizations must prepare now or risk a catastrophic breakdown in digital trust.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Quantum Ready is not just a warning, it’s a field guide for the era of quantum disruption. As quantum computing accelerates toward the threshold where today’s encryption becomes obsolete, organizations must prepare now or risk a catastrophic breakdown in digital trust.
Bemærk: Kan ikke leveres før jul.
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. Finally, it provides theoretical and practical... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Traditionally, the consensus protocols are studied either in the synchronous or in the asynchronous communication setting and very often the protocols in the former category serve as the basis for the protocols in the latter category.