(Izdošanas datums: 24-Jan-2025, EPUB+DRM, Izdevniecība: Taylor & Francis Ltd, ISBN-13: 9781040271131)
This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data. It also covers the mathematics behind the use of algorithms for encryption and decrypt...Lasīt vairāk
(Izdošanas datums: 24-Jan-2025, PDF+DRM, Izdevniecība: Taylor & Francis Ltd, ISBN-13: 9781040271117)
This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data. It also covers the mathematics behind the use of algorithms for encryption and decrypt...Lasīt vairāk
(Izdošanas datums: 16-Jan-2025, PDF+DRM, Izdevniecība: Taylor & Francis Ltd, ISBN-13: 9781040295823)
Securing the Digital World: A Comprehensive Guide to Multimedia Security is indispensable reading in todays digital age. With the outbreak of digital range and ever-evolving cyber threats, the demand to protect multimedia data has never been more im...Lasīt vairāk
(Izdošanas datums: 16-Jan-2025, EPUB+DRM, Izdevniecība: Taylor & Francis Ltd, ISBN-13: 9781040295847)
Securing the Digital World: A Comprehensive Guide to Multimedia Security is indispensable reading in todays digital age. With the outbreak of digital range and ever-evolving cyber threats, the demand to protect multimedia data has never been more im...Lasīt vairāk
(Izdošanas datums: 29-Nov-2024, PDF+DRM, Izdevniecība: Taylor & Francis Ltd, ISBN-13: 9781040152072)
Information security primarily serves these six distinct purposes-authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation. The entire gamut of infosec rests upon cryptogra...Lasīt vairāk
(Izdošanas datums: 29-Nov-2024, EPUB+DRM, Izdevniecība: Taylor & Francis Ltd, ISBN-13: 9781040152119)
Information security primarily serves these six distinct purposes-authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation. The entire gamut of infosec rests upon cryptogra...Lasīt vairāk
The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-sy...Lasīt vairāk
The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-sy...Lasīt vairāk
This book discusses the dogmatic (that what is settled) and the dynamic (that what is changing) aspects of the relationship between blockchain and the law from a critical perspective. With contributions from legal and financial experts involved in bo...Lasīt vairāk
This book discusses the dogmatic (that what is settled) and the dynamic (that what is changing) aspects of the relationship between blockchain and the law from a critical perspective. With contributions from legal and financial experts involved in bo...Lasīt vairāk
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 - 18 December 2022. This conference proceeding will provide the understa...Lasīt vairāk
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 - 18 December 2022. This conference proceeding will provide the understa...Lasīt vairāk
This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from both theoretical and practical points of view. Homomorphic and searchable encryption are still relatively novel and rapidly evolving a...Lasīt vairāk
This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from both theoretical and practical points of view. Homomorphic and searchable encryption are still relatively novel and rapidly evolving a...Lasīt vairāk
This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed a...Lasīt vairāk
This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed a...Lasīt vairāk
This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29-31, 2023. This event was held in hybrid mode.The 14 full papers present...Lasīt vairāk
This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29-31, 2023. This event was held in hybrid mode.The 14 full papers present...Lasīt vairāk
This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography, PQCrypto 2022, held in College Park, MD, USA, in August 14-18, 2023.The 25 full papers presented in this book were carefully reviewed and...Lasīt vairāk
This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography, PQCrypto 2022, held in College Park, MD, USA, in August 14-18, 2023.The 25 full papers presented in this book were carefully reviewed and...Lasīt vairāk