Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for …
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, …
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or …
The Fifth Edition of one of the standard works on number theory, written by internationally-recognized mathematicians. Chapters are relatively self-contained …
Elementary Methods in Number Theory begins with "a first course in number theory" for students with no previous knowledge of …
In this volume one finds basic techniques from algebra and number theory (e.g. congruences, unique factorization domains, finite fields, quadratic …
Number theory is one of the oldest and most appealing areas of mathematics. Computation has always played a role in …
Quantum information and computation is a rapidly expanding and cross-disciplinary subject. This book gives a self-contained introduction to the field …
This is a pedagogical introduction to the subjects of quantum information and computation. Topics include non-locality of quantum mechanics, quantum …
This multi-authored textbook addresses graduate students with a background in physics, mathematics or computer science. No research experience is necessary. …
This book is an introduction to the two closely related subjects of quantum optics and quantum information. Essentially, the physical …
Research and development in the pioneering field of quantum computing involve just about every facet of science and engineering, including …
The classic guide to network and Internet security has been thoroughly updated for today's latest security threats. In the second …
This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, …
This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers …
This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is …
Please Read Notes: Brand New, International Softcover Edition, Printed in black and white pages, minor self wear on the cover …
This is a textbook about classical elementary number theory and elliptic curves. The first part discusses elementary topics such as …
This book is mainly devoted to some computational and algorithmic problems in finite fields such as, for example, polynomial factorization, …
This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network …
This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network …
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in …
"Google's algorithms assume the world's future is nothing more than the next moment in a random process. George Gilder shows …
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, …
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice …
This book constitutes the carefully refereed and revised selected papers of the 5th Canada-France ETS Symposium on Foundations and Practice …
This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for …
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network …
Get a head start in real-world cryptography by learning the logic of algorithms that defend against attacks, and explore the …
As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, …
Computer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of …
Issues (Editions)YearIssue2020Volume: 20201234567891011122019Volume: 20191234567891011122018Volume: 20181234567891011122017Volume: 20171234567891011122016Volume: 20161234567891011122015Volume: 20151234567891011122014Volume: 20141234567891011122013Volume: 20131234567891011122012Volume: 20121234567891011122011Volume: 20111234567891011122010Volume: 20101234567891011122009Volume: 20091234567891011122008Volume: 20081234567891011122007Volume: 20071234567891011122006Volume: 20061234567891011122005Volume: 20051234567891011122004Volume: 20041234567891011122003Volume: 20031234567891011122002Volume: …
Issues (Editions)YearIssue2021Volume: 1612020Volume: 1512342019Volume: 1412342018Volume: 1312342017Volume: 1212342016Volume: 111/2342015Volume: 1012342014Volume: 912342013Volume: 812342012Volume: 712342011Volume: 612/342010Volume: 512/342009Volume: 41/2342008Volume: 312342007Volume: 21/23/42006Volume: 11/23/4