Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management.
Bemærk: Kan ikke leveres før jul.
This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are... Læs mere
Bemærk: Kan ikke leveres før jul.
This book presents methods to improve information security for protected communication.
Bemærk: Kan ikke leveres før jul.
This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Each paper was reviewed independently by at least three members of the program committee, and papers co-authored by a member of the program committee were reviewed by at least six (other) members.
Bemærk: Kan ikke leveres før jul.
Ziel der Autoren ist es, bei Entwicklern und Projektleitern ein grundlegendes Sicherheitsbewusstsein zu schaffen und ihnen einen Leitfaden für den Bau sicherer verteilter Systeme an die Hand zu geben.
Bemærk: Kan ikke leveres før jul.
Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography.
Bemærk: Kan ikke leveres før jul.
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions.
Bemærk: Kan ikke leveres før jul.
"Introduction to Modern Number Theory" surveys from a unified point of view both the modern state and the trends of continuing development of various branches of number theory.
Bemærk: Kan ikke leveres før jul.
Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography.
Bemærk: Kan ikke leveres før jul.
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key.