Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 18th International Conference on Cryptology in India, INDOCRYPT 2017, held in Chennai, India, in December 2017.
Bemærk: Kan ikke leveres før jul.
Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems.
Bemærk: Kan ikke leveres før jul.
The two-volume proceedings LNCS 9665 + 9666constitutes the thoroughly refereed proceedings of the 35th AnnualInternational Conference on the Theory and Applications of CryptographicTechniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016.
Bemærk: Kan ikke leveres før jul.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
Bemærk: Kan ikke leveres før jul.
For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions.
Bemærk: Kan ikke leveres før jul.
This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945.
Bemærk: Kan ikke leveres før jul.
This book constitutes the proceedings of the 8th International Workshop on Reachability Problems, RP... Læs mere
Bemærk: Kan ikke leveres før jul.
Specifically, it introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding.
Bemærk: Kan ikke leveres før jul.
This book is the study of all codes of life with the standard methods of science. What is really new in this field is the study of all codes that came after the genetic code and before the codes of culture.
Bemærk: Kan ikke leveres før jul.
It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management.
Bemærk: Kan ikke leveres før jul.
This book offers a comprehensive overview of fading and shadowing in wireless channels. Newer models for fading, shadowing and shadowed fading are included along with the analysis of diversity combining algorithms.