The Leading eBooks Store Online

3,597,636 members ⚫ 1,163,417 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Mathematics; History; 20th century

  • Public-Key Cryptography ? PKC 2016by Chen-Mou Cheng; Kai-Min Chung; Giuseppe Persiano; Bo-Yin Yang

    Springer Berlin Heidelberg 2016; US$ 94.00

    Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016. The34 revised papers presented were carefully reviewed and selected from 143submissions. They are organized in topical sections named:... more...

  • Public-Key Cryptography ? PKC 2016by Chen-Mou Cheng; Kai-Min Chung; Giuseppe Persiano; Bo-Yin Yang

    Springer Berlin Heidelberg 2016; US$ 169.00

    Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR  International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016. The34 revised papers presented were carefully reviewed and selected from 143submissions. They are organized in topical sections... more...

  • Introducing Game Theory and its Applicationsby Elliott Mendelson

    CRC Press 2016; US$ 99.95

    The mathematical study of games is an intriguing endeavor with implications and applications that reach far beyond tic-tac-toe, chess, and poker to economics, business, and even biology and politics. Most texts on the subject, however, are written at the graduate level for those with strong mathematics, economics, or business backgrounds. In a clear... more...

  • Topics in Cryptology - CT-RSA 2016by Kazue Sako

    Springer International Publishing 2016; US$ 94.00

    Thisbook constitutes the refereed proceedings of the Cryptographer's Track at theRSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March2016. The26 papers presented in this volume were carefully reviewed and selected from 76submissions. The focus of the track is on following subjects: secure keyexchange schemes, authenticated... more...

  • Quantum Computational Number Theoryby Song Y. Yan

    Springer International Publishing 2015; US$ 109.00

    This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation,... more...

  • Computation, Cryptography, and Network Securityby Nicholas J. Daras; Michael Th. Rassias

    Springer International Publishing 2015; US$ 189.00

    Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories... more...

  • Why Cryptography Should Not Rely on Physical Attack Complexityby Juliane Krämer

    Springer Singapore 2015; US$ 99.00

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years... more...

  • Progress in Cryptology -- LATINCRYPT 2015by Kristin Lauter; Francisco Rodríguez-Henríquez

    Springer International Publishing 2015; US$ 84.00

    This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security in Latin America, LatinCrypt 2015, held in Guadalajara, Mexico, in August 2015. The 20 papers presented were carefully reviewed and selected from 49 submissions. They were organized in topical sections named: cryptographic protocols;... more...

  • Coding Theory and Applicationsby Raquel Pinto; Paula Rocha Malonek; Paolo Vettori

    Springer International Publishing 2015; US$ 169.00

    The topics covered in this book, written by researchers at the forefront of their field, represent some of the most relevant research areas in modern coding theory: codes and combinatorial structures, algebraic geometric codes, group codes, quantum codes, convolutional codes, network coding and cryptography. The book includes a survey paper on the... more...

  • Adversarial Risk Analysisby David L. Banks; Jesus M. Rios Aliaga; David Rios Insua

    CRC Press 2015; US$ 89.95

    Flexible Models to Analyze Opponent Behavior A relatively new area of research, adversarial risk analysis (ARA) informs decision making when there are intelligent opponents and uncertain outcomes. Adversarial Risk Analysis develops methods for allocating defensive or offensive resources against intelligent adversaries. Many examples throughout... more...