Filter
Kodningsteori & kryptologi
Filter
In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and to decrypt intercepted German diplomatic and military …
For more than 30 years, this comprehensive manual has been the standard introduction and complete reference for writing articles and books containing mathematical formulas. This …
This book constitutes the refereed proceedings of the 26th International Conference on Information Security and Cryptology on Information Security and Cryptology - ICISC 2023, held …
Explore expert strategies to master cyber resilience as a CISO, ensuring your organization's security program stands strong against evolving threats Key Features Unlock expert …
The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber security and the solutions based on Software Defined Networks …
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic …
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, …
Tauchen Sie ein in die aufregende Welt der Kryptow hrungen mit unserem Buch "Digitaler Goldrausch". Diese fesselnde Lekt re bietet eine umfassende Einf hrung in die Grundlagen von …
Learn how to implement, deploy, and manage blockchain solutions across AWS, Azure, and GCP with the help of hands-on labs and real-world use cases Key Features Learn architecture …
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic …