 |
|
|
 |  |  Design of Hashing Algorithms (Lecture Notes in Computer Science)
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the... |  |  Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011
The 13th IMA Conference on Cryptography and Coding was held at the Lady
Margaret Hall, University of Oxford, UK, during December 12–15, 2011. This
event was a 25th anniversary celebration of the very successful biennial IMA
conference series. Traditionally, the conference has taken place at the Royal
Agricultural College,... |
|
|
 Information and Coding Theory (Springer Undergraduate Mathematics Series)
As thi s Preface is being written, th e twent ieth century is coming to an end .
Historians may perhaps come to refer to it as the cent ury of information, jus t
as its predecessor is associated with the proce ss of indust rialisation. Successive
technological developments such as the telephone, radio, television , compute rs
and... |  |  |  |  |
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |