Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively.Written by the...
Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with...
This book is almost entirely concerned with stream ciphers, concentrating on a particular mathematical model for such ciphers which are called...
Discover the first unified treatment of today's most essential information technologies— Compressing, Encrypting, and Encoding With identity theft...
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
So-called string problems are abundant in bioinformatics and computational biology. New optimization problems dealing with DNA or protein sequences...
In order for wireless devices to function, the signals must be coded in standard ways so that the sender and the receiver can communicate. This area...