Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Public Key Cryptography
  • Language: en
  • Pages: 159

Public Key Cryptography

Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based – such as the discrete logarithm problem and the difficulty of factoring integers. The book contai...

Finite Geometries
  • Language: en
  • Pages: 476

Finite Geometries

  • Type: Book
  • -
  • Published: 1983-01-18
  • -
  • Publisher: CRC Press

None

Security and Privacy in Mobile Information and Communication Systems
  • Language: en
  • Pages: 179

Security and Privacy in Mobile Information and Communication Systems

  • Type: Book
  • -
  • Published: 2010-11-29
  • -
  • Publisher: Springer

MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.

Handbook of Combinatorial Designs
  • Language: en
  • Pages: 1011

Handbook of Combinatorial Designs

  • Type: Book
  • -
  • Published: 2006-11-02
  • -
  • Publisher: CRC Press

Continuing in the bestselling, informative tradition of the first edition, the Handbook of Combinatorial Designs, Second Edition remains the only resource to contain all of the most important results and tables in the field of combinatorial design. This handbook covers the constructions, properties, and applications of designs as well as existence

Quality of Service in Optical Packet Switched Networks
  • Language: en
  • Pages: 451

Quality of Service in Optical Packet Switched Networks

This book is a comprehensive study on OPS networks, its architectures, and developed techniques for improving its quality of switching and managing quality of service. The book includes: Introduction to OPS networks, OOFDM networks, GMPLS-enabled optical networks, QoS in OPS networks Hybrid contention avoidance/resolution schemes in both long-haul and metro optical networks Hybrid optical switching schemes

Dependable Computing
  • Language: en
  • Pages: 384

Dependable Computing

This book constitutes the refereed proceedings of the First Latin-American Symposium on Dependable Computing, LADC 2003, held in Sao Paulo, Brazil in October 2003. The 21 revised full papers presented together with abstracts of invited talks, a panel, workshops, and tutorials were carefully reviewed and selected for presentation. The papers are organized in topical sections on fault injection, security, adaptive fault tolerance, distributed algorithms, and components and fault tolerance.

Advances in Wireless, Mobile Networks and Applications
  • Language: en
  • Pages: 329

Advances in Wireless, Mobile Networks and Applications

  • Type: Book
  • -
  • Published: 2011-06-11
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the Third International Conference on Wireless, Mobile Networks and Applications, WiMoA 2011, and the First International Conference on Computer Science, Engineering and Applications, ICCSEA 2011, held in Dubai, United Arab Emirates, in May 2011. The book is organized as a collection of papers from WiMoA 2011 and ICCSEA 2011. The 8 revised full papers presented in the WiMoA 2011 part were carefully reviewed and selected from 63 submissions. The 20 revised full papers presented in the ICCSEA 2011 part were carefully reviewed and selected from 110 submissions.

Combinatorial Designs
  • Language: en
  • Pages: 395

Combinatorial Designs

  • Type: Book
  • -
  • Published: 1989-10-11
  • -
  • Publisher: Elsevier

Haim Hanani pioneered the techniques for constructing designs and the theory of pairwise balanced designs, leading directly to Wilson's Existence Theorem. He also led the way in the study of resolvable designs, covering and packing problems, latin squares, 3-designs and other combinatorial configurations.The Hanani volume is a collection of research and survey papers at the forefront of research in combinatorial design theory, including Professor Hanani's own latest work on Balanced Incomplete Block Designs. Other areas covered include Steiner systems, finite geometries, quasigroups, and t-designs.

Progress in Cryptology - INDOCRYPT 2004
  • Language: en
  • Pages: 442

Progress in Cryptology - INDOCRYPT 2004

  • Type: Book
  • -
  • Published: 2004-12-06
  • -
  • Publisher: Springer

The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this series is increasing every year. The number of papers submitted to INDOCRYPT 2004 was 181, out of which 147 papers conformed to the speci?cations in the call for papers and, therefore, were accepted to the review process. Those 147 submissions were spread over 22 countries. Only 30 papers were accepted to this proceedings. We should note that many of the papers that were not accepted were of good quality but only the top 30 papers were accepted. Each submission received at least three independent - views. The selection process also included a Web-based discussion phase....

Handbook of Financial Cryptography and Security
  • Language: en
  • Pages: 612

Handbook of Financial Cryptography and Security

  • Type: Book
  • -
  • Published: 2010-08-02
  • -
  • Publisher: CRC Press

The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing