Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Security, CD-ARES 2013, held in Regensburg, Germany, in September 2013.
Bemærk: Kan ikke leveres før jul.
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers,... Læs mere
Bemærk: Kan ikke leveres før jul.
The work introduces the fundamentals concerning the measure of discrete information, the modeling of discrete sources without and with a memory, as well as... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2011, held in Madrid, Spain, in May 2011.
Bemærk: Kan ikke leveres før jul.
In this highly readable book, H.S. Green, a former student of Max Born and well known as an author in physics and in the philosophy of science, presents a timely analysis of theoretical physics and related fundamental problems.
Bemærk: Kan ikke leveres før jul.
This book constitutes the thoroughly refereed post-proceedings of the 12th... Læs mere
Bemærk: Kan ikke leveres før jul.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication.
Bemærk: Kan ikke leveres før jul.
The Handbook on Ontologies provides a comprehensive overview of the current status and future prospects of the field, which has developed significantly in the five years since the first edition. Revisions here include 21 completely new chapters.
Bemærk: Kan ikke leveres før jul.
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security).
Bemærk: Kan ikke leveres før jul.
Numerous pictures and images, a subject-index and a detailed list of historical personalities including a glossary for each chapter increase the practical benefit of this book that is well suited as well as for undergraduate students as for working practitioners.
Bemærk: Kan ikke leveres før jul.
Generic group algorithms solve computational problems defined over algebraic groups without exploiting properties of a particular representation of group elements.