Wartacrypt '04
Author : Jerzy Jaworski
Publisher :
Page : 244 pages
File Size : 22,38 MB
Release : 2006
Category : Cryptography
ISBN :
Author : Jerzy Jaworski
Publisher :
Page : 244 pages
File Size : 22,38 MB
Release : 2006
Category : Cryptography
ISBN :
Author : Burton Rosenberg
Publisher : CRC Press
Page : 631 pages
File Size : 39,64 MB
Release : 2010-08-02
Category : Computers
ISBN : 1420059823
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing
Author : Sokratis K. Katsikas
Publisher : Springer Science & Business Media
Page : 559 pages
File Size : 26,6 MB
Release : 2006-08-17
Category : Business & Economics
ISBN : 3540383417
This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006. The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections.
Author : Josyula R. Rao
Publisher : Springer
Page : 469 pages
File Size : 20,3 MB
Release : 2005-09-19
Category : Computers
ISBN : 3540319409
These are the proceedings of the 7th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005) held in Edinburgh, Scotland from August 29 to September 1, 2005.
Author : Igor Fabrici
Publisher :
Page : 192 pages
File Size : 44,34 MB
Release : 2007
Category : Combinatorial analysis
ISBN :
Author : Sachar Paulus
Publisher : Springer Science & Business Media
Page : 373 pages
File Size : 50,67 MB
Release : 2013-11-11
Category : Computers
ISBN : 3322849848
This book presents the most interesting talks given at ISSE 2004 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Corporate Governance and why security implies to control the enterprise - Risk Management and how to quantify security threats - Secure Computing and how it will change the way we trust computers - Digital Rights Management and the protection of corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2004.
Author : Ján Borsík
Publisher :
Page : 196 pages
File Size : 50,74 MB
Release : 2007
Category : Functions of real variables
ISBN :
Author : Daniel Cvrček
Publisher :
Page : 158 pages
File Size : 16,6 MB
Release : 2007
Category : Computer networks
ISBN :
Author : Juraj Kostra
Publisher :
Page : 166 pages
File Size : 44,9 MB
Release : 2005
Category : Forms (Mathematics)
ISBN :
Author : Otokar Gros̆ek
Publisher :
Page : 204 pages
File Size : 44,12 MB
Release : 2008
Category : Computational complexity
ISBN :