11-20
of
1,512
results
-
Information Security and Crypt...The Tamarin prover is an open-source analysis tool for cryptographic protocols... The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol possible adversaries and the desired security properties Tamarin either verifies the protocol or provides counter examples witnessing... more
-
Information Security and Crypt...Hardware-intrinsic security is a young field dealing with secure secret key st... Hardware-intrinsic security is a young field dealing with secure secret key storage. This book features contributions from researchers and practitioners with backgrounds in physics mathematics cryptography coding theory and processor theory. more
-
Information Security and Crypt...Guide to Feistel Ciphers: Security Proofs and Cryptanalysis Guide to Feistel Ciphers: Security Proofs and Cryptanalysis more
-
Information Security and Crypt...This book provides a concise yet comprehensive overview of computer and Intern... This book provides a concise yet comprehensive overview of computer and Internet security suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a... more
-
Chapman & Hall/CRC Cyber-Physi...This book discusses a range of topics from information security to cryptograph... This book discusses a range of topics from information security to cryptography mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the... more
-
Information Security (Wiley): ...The only book to provide a unified view of the interplay between computational... The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security.... more
-
River Publishers Digital Secur...This book has recipes and tool development expertise and describe projects in ... This book has recipes and tool development expertise and describe projects in malware analysis web application security intrusion detection system and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown... more
-
Mastering Windows Security and...A comprehensive guide to administering and protecting the latest Windows 11 an... A comprehensive guide to administering and protecting the latest Windows 11 and Windows Server 2022 from the complex cyber threats Key Features Learn to protect your Windows environment using zero-trust and a multi-layered security approach... more
-
Cryptography and Network Secur...Starting with the historical facts behind the concept of information which led... Starting with the historical facts behind the concept of information which led to the creation of computer networks Internet of things and cryptocurrencies the book then arrives at the main definitions of cryptography and network security the... more
-
Lecture Notes in Computer Scie...This book constitutes the proceedings of the 13th International Conference on ... This book constitutes the proceedings of the 13th International Conference on Security and Cryptography for Networks SCN 2022 held in Amalfi Italy in September 2022. The 33 full papers presented in this volume were carefully reviewed and selected... more
Ads related to cyber security cryptography research
Shopping for the best deal on Cyber security cryptography research Computer Books - Select a product below or see other matches to read product reviews, compare prices and store ratings.