Title: 3D Video Coding for Embedded Devices: Energy Efficient Algorithms and Architectures, Author: Bruno Zatt
Title: A Course in Mathematical Cryptography, Author: Gilbert Baumslag
Title: Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits, Author: Eric Peeters
Title: Advanced Error Control Techniques for Data Storage Systems, Author: Erozan M. Kurtas
Title: Advanced Security Solutions for Multimedia, Author: Irshad Ahmad Ansari
Title: Advances in Cryptology -- CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings, Author: Reihaneh Safavi-Naini
Title: AirCoin / AirMark / AirSense roadmap: The cryptomatics of e-money, Author: Ray Hermann Angossio Liwa
Title: Algebraic and Stochastic Coding Theory, Author: Dave K. Kythe
Title: Algorithmic Cryptanalysis, Author: Antoine Joux
Explore Series
Title: Allied and Axis Signals Intelligence in World War II, Author: David Alvarez
Title: An In-Depth Guide to Mobile Device Forensics, Author: Chuck Easttom
Title: An Introduction to Cryptography, Author: Richard A. Mollin
Title: Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition, Author: Darel W. Hardy
Title: Archives in the Digital Age: Preservation and the Right to be Forgotten, Author: Abderrazak Mkadmi
Title: Asymmetric Cryptography: Primitives and Protocols, Author: David Pointcheval
Title: Authentication Codes and Combinatorial Designs, Author: Dingyi Pei
Explore Series
Title: Bent Functions: Results and Applications to Cryptography, Author: Natalia Tokareva
Title: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction, Author: Arvind Narayanan
Title: Blockchain for Real World Applications, Author: Rishabh Garg
Title: Breaking Teleprinter Ciphers at Bletchley Park: An edition of I.J. Good, D. Michie and G. Timms: General Report on Tunny with Emphasis on Statistical Methods (1945), Author: James A. Reeds

Pagination Links