Meer dan een miljoen boeken binnen handbereik!
Bookbot

Dieter Gollmann

    Kaskadenschaltungen taktgesteuerter Schieberegister als Pseudozufallszahlengeneratoren
    Algorithmenentwurf in der Kryptographie
    Information security
    Smart card research and advanced application
    Computer Security
    • Computer Security

      • 386bladzijden
      • 14 uur lezen
      4,0(4)Tarief

      This is a brand new edition of the best-selling computer security book. Written for self-study and course use, this book will suit a variety of introductory and more advanced security programmes for students of computer science, engineering and related disciplines. Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewildering array of competing security systems.

      Computer Security
    • This book constitutes the refereed proceedings of the 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Application, CARDIS 2010, held in Passau, Germany, in April 2010. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on mathematical algorithms; side channel analysis; systems; logical attacks; fault analysis; and privacy.

      Smart card research and advanced application
    • Information security

      • 416bladzijden
      • 15 uur lezen

      This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.

      Information security