|
|
|
|
|
Cryptographic Boolean Functions and ApplicationsBoolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).
Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean... | | | | |
|
| | Physical-Layer Security: From Information Theory to Security Engineering
This book is the result of more than five years of intensive research in collaboration with a
large number of people. Since the beginning, our goal has been to understand at a deeper
level how information-theoretic security ideas can help build more secure networks and
communication systems. Back in 2008, the actual planwas to... | | |
|
Securing Wireless Communications at the Physical LayerThe book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at higher layers of the protocol stack, the methods described in this book secure communications at the physical layer.
The area of physical... | | Java Cryptography (Java Series)Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity... | | Security in Wireless Ad Hoc and Sensor NetworksThis book provides an in-depth guide to security in wireless ad hoc and sensor networks
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and... |
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |