Home | Amazing | Today | Tags | Publishers | Years | Search 
Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011
Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011

The 13th IMA Conference on Cryptography and Coding was held at the Lady Margaret Hall, University of Oxford, UK, during December 12–15, 2011. This event was a 25th anniversary celebration of the very successful biennial IMA conference series. Traditionally, the conference has taken place at the Royal Agricultural College,...

Getting Started with OAuth 2.0
Getting Started with OAuth 2.0
I’ve been working with web-based APIs since 1999, building SOAP-based web services for internal IT applications and helping thousands of developers using Google’s RESTbased APIs for Google Calendar, Picasa Web Albums, YouTube, and more. Each of these APIs has required authorization from users to act on their behalf. Developers...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany

The "European Institute for System Security (E.I.S.S.)" was founded on February 29, 1988 by cabinet resolution of the state government Baden-Wurttemberg. It is headed by Professor Thomas Beth and is affiliated with the Institute for Algorithms and Cognitive Systems (IAKS) of the Faculty for Computer Science at the University of...

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Physical-Layer Security: From Information Theory to Security Engineering
Physical-Layer Security: From Information Theory to Security Engineering
This book is the result of more than five years of intensive research in collaboration with a large number of people. Since the beginning, our goal has been to understand at a deeper level how information-theoretic security ideas can help build more secure networks and communication systems. Back in 2008, the actual planwas to...
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication

This is the third revised edition of the established and trusted RFID Handbook; the most comprehensive introduction to radio frequency identification (RFID) available.

This essential new edition contains information on electronic product code (EPC) and the EPC global network, and explains near-field communication (NFC) in...

Information and Coding Theory (Springer Undergraduate Mathematics Series)
Information and Coding Theory (Springer Undergraduate Mathematics Series)
As thi s Preface is being written, th e twent ieth century is coming to an end . Historians may perhaps come to refer to it as the cent ury of information, jus t as its predecessor is associated with the proce ss of indust rialisation. Successive technological developments such as the telephone, radio, television , compute rs and...
Military Cryptanalysis, Part I, Monoalphabetic Substitution Systems (Cryptographic Series, C-30)
Military Cryptanalysis, Part I, Monoalphabetic Substitution Systems (Cryptographic Series, C-30)

This book provides an excellent foundation for solving cipher systems. The text describes the fundamental principles of cipher solution plus use of the unilateral frequency distribution in the solution process is covered in some detail. Various unilateral and multilateral systems are carefully discussed. In addition, the text introduces the...

Implementing SSL / TLS Using Cryptography and PKI
Implementing SSL / TLS Using Cryptography and PKI

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or...

Prime Numbers and Computer Methods for Factorization (Modern Birkhäuser Classics)
Prime Numbers and Computer Methods for Factorization (Modern Birkhäuser Classics)

From the original hard cover edition:In the modern age of almost universal computer usage, practically every individual in a technologically developed society has routine access to the most up-to-date cryptographic technology that exists, the so-called RSA public-key cryptosystem. A major component of this system is the factorization of large...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy