Søgning på underkategorier- og emner:
Bemærk: Kan leveres før jul.
This book provides basic concepts and deep knowledge about various security mechanisms that can be... Læs mere
Bemærk: Kan leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book contains selected papers presented at the 14th IFIP WG 9.2,... Læs mere
Bemærk: Kan ikke leveres før jul.
The fifth volume of Rudolf Ahlswede’s lectures on Information Theory focuses on several problems that were at the heart of a lot of his research. After a short Part II on continuous data compression, Part III, the longest part of the book, is devoted to distributed information.
Bemærk: Kan ikke leveres før jul.
It also demonstrates the calculation of split channel capacities when polar codes are employed for binary erasure channels, and explains the mathematical formulation of successive cancellation decoding for polar codes.
Bemærk: Kan ikke leveres før jul.
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes.
Bemærk: Kan ikke leveres før jul.
This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. . Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed.
Bemærk: Kan leveres før jul.
A highly interdisciplinary overview of the emerging topic of the Quantum Internet. Current and future quantum technologies are covered in detail, in... Læs mere
Bemærk: Kan ikke leveres før jul.
The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of... Læs mere
Bemærk: Kan ikke leveres før jul.
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for... Læs mere
Bemærk: Kan ikke leveres før jul.
This book seeks to generalize techniques and experiences in designing and analyzing cryptographic schemes for blockchain. In addition, it covers surveys of research objects, reviews of cryptographic schemes, lectures and methodologies to practice cryptography.