|
|
|
|
Number Theory for ComputingThere are many surprising connections between the theory of numbers, which is one of the oldest branches of mathematics, and computing and information theory. Number theory has important applications in computer organization and security, coding and cryptography, random number generation, hash functions, and graphics. Conversely, number theorists... | | Auditing Information SystemsAuditing Information Systems, Second Edition, explains clearly how to audit the controls and security over all types of information systems environments. The concepts and techniques in the book enable auditors, information security professionals, managers, and audit committee members of every knowledge and skill level to truly... | | Concurrent Zero-Knowledge: With Additional Background by Oded GoldreichZero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory definition; zero-knowledge proofs are convincing and yet yield nothing beyond the validity of the assertion being proved. Their applicability in the domain of cryptography is vast.
A fundamental question... |
|
|
|
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |