Subcategories
Tags
Language
Tags

A quick glance at quantum cryptography

Posted By: insetes
A quick glance at quantum cryptography

A quick glance at quantum cryptography By Lomonaco S.J.
1998 | 54 Pages | ISBN: 0897915917 | DJVU | 1 MB

Information Security and Cryptology – ICISC 2020

Posted By: AvaxGenius
Information Security and Cryptology – ICISC 2020

Information Security and Cryptology – ICISC 2020: 23rd International Conference, Seoul, South Korea, December 2–4, 2020, Proceedings by Deukjo Hong
English | EPUB | 2021 | 289 Pages | ISBN : 3030688895 | 27.1 MB

This book constitutes selected papers from the 23rd International Conference on Information Security and Cryptology, ICISC 2020, held in Seoul, South Korea, in December 2020. Due to the COVID-19, the confere was held online.

Security in Computing and Communications

Posted By: AvaxGenius
Security in Computing and Communications

Security in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers by Sabu M. Thampi
English | EPUB | 2021 | 314 Pages | ISBN : 9811604215 | 39.2 MB

This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online.

Security and Privacy: Select Proceedings of ICSP 2020

Posted By: AvaxGenius
Security and Privacy: Select Proceedings of ICSP 2020

Security and Privacy: Select Proceedings of ICSP 2020 by Pantelimon Stănică
English | EPUB | 2020 | 183 Pages | ISBN : 9813367806 | 20.1 MB

This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy.

Foundations and Practice of Security

Posted By: AvaxGenius
Foundations and Practice of Security

Foundations and Practice of Security: 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1–3, 2020, Revised Selected Papers by Gabriela Nicolescu
English | EPUB | 2021 | 213 Pages | ISBN : 3030708802 | 10.5 MB

This book constitutes the revised selected papers of the 13th International Symposium on Foundations and Practice of Security, FPS 2020, held in Montréal, QC, Canada, in December 2020.
The 11full papers and 1 short paper presented in this book were carefully reviewed and selected from 23 submissions. They cover a range of topics such as Analysis and Detection; Prevention and Efficiency; and Privacy by Design.

Security, Privacy, and Anonymity in Computation, Communication, and Storage

Posted By: AvaxGenius
Security, Privacy, and Anonymity in Computation, Communication, and Storage

Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings by Guojun Wang
English | EPUB | 2021 | 613 Pages | ISBN : 3030688836 | 65.1 MB

This book constitutes seven refereed workshops and symposiums, SpaCCS Workshops 2020, which are held jointly with the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, in Nanjing, China, in December 2020.

Kryptografie: Verfahren, Protokolle, Infrastrukturen

Posted By: arundhati
Kryptografie: Verfahren, Protokolle, Infrastrukturen

Klaus Schmeh, "Kryptografie: Verfahren, Protokolle, Infrastrukturen"
Deutsch | 2016 | ISBN: 3864903564 | 948 pages | EPUB | 7 MB

Expert SQL Server 2008 Encryption

Posted By: AvaxGenius
Expert SQL Server 2008 Encryption

Expert SQL Server 2008 Encryption by Michael Coles
English | PDF | 2009 | 319 Pages | ISBN : 1430224649 | 3.1 MB

Every day, organizations large and small fall victim to attacks on their data. Encryption provides a shield to help defend against intruders. Because of increasing pressure from government regulators, consumers, and the business community at large, the job descriptions of SQL DBAs and developers are expanding to include encryption. Expert SQL Server 2008 Encryption will show you how to efficiently implement SQL Server 2008 encryption functionality and features to secure your organizational data.

Multimedia Encryption and Watermarking

Posted By: AvaxGenius
Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking by Borko Furht
English | PDF | 2005 | 331 Pages | ISBN : 0387244255 | 26.8 MB

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property.

System-on-Chip Architectures and Implementations for Private-Key Data Encryption

Posted By: AvaxGenius
System-on-Chip Architectures and Implementations for Private-Key Data Encryption

System-on-Chip Architectures and Implementations for Private-Key Data Encryption by Máire McLoone
English | PDF | 2003 | 165 Pages | ISBN : 030647882X | 14.3 MB

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented.

Identity-Based Encryption

Posted By: AvaxGenius
Identity-Based Encryption

Identity-Based Encryption by Sanjit Chatterjee
English | PDF (True) | 2011 | 187 Pages | ISBN : 1441993827 | 3.7 MB

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area.

Crypto Asset Investing in the Age of Autonomy

Posted By: First1
Crypto Asset Investing in the Age of Autonomy

Crypto Asset Investing in the Age of Autonomy by Jake Ryan
English | January 14th, 2021 | ISBN: 1119705363 | 306 pages | True PDF | 2.65 MB

Competition, the drive for efficiency, and continuous improvement ultimately push businesses toward automation and later towards autonomy. If a business can operate without human intervention, it will minimize its operational cost. If Uber can remove the expense of a driver with an autonomous vehicle, it will provide its service cheaper than a competitor who can't. If an artificially intelligent trading company can search, find, and take advantage of some arbitrage opportunity, then it can profit where its competitors cannot. A business that can analyze and execute in real-time without needing to wait for a human to act, is a business that will be able to take advantage of brief inefficiencies from other markets or businesses.

Privacy and Identity Management

Posted By: AvaxGenius
Privacy and Identity Management

Privacy and Identity Management: 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21–23, 2020, Revised Selected Papers by Michael Friedewald
English | PDF | 2021 | 273 Pages | ISBN : 3030724646 | 12.8 MB

This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.*

Information Security and Cryptology – ICISC 2020

Posted By: AvaxGenius
Information Security and Cryptology – ICISC 2020

Information Security and Cryptology – ICISC 2020: 23rd International Conference, Seoul, South Korea, December 2–4, 2020, Proceedings by Deukjo Hong
English | PDF | 2021 | 289 Pages | ISBN : 3030688895 | 17.8 MB

This book constitutes selected papers from the 23rd International Conference on Information Security and Cryptology, ICISC 2020, held in Seoul, South Korea, in December 2020. Due to the COVID-19, the confere was held online.

Security in Computing and Communications

Posted By: AvaxGenius
Security in Computing and Communications

Security in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers by Sabu M. Thampi
English | PDF | 2021 | 314 Pages | ISBN : 9811604215 | 37.5 MB

This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online.