Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Symmetric Cryptographic Protocols

Buy
Symmetric Cryptographic Protocols, 9783319075839 (3319075837), Springer, 2014

This book focuses on protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees.

(HTML tags aren't allowed.)

Architecture Design for Soft Errors
Architecture Design for Soft Errors
"Dr. Shubu Mukherjee's book is a welcome surprise: books by architecture leaders in major companies are few and far between. Written from the viewpoint of a working engineer, the book describes sources of soft errors and solutions involving device, logic, and architecture design to reduce the effects of soft errors." - Max Baron,...
COM Beyond Microsoft Designing: Designing and Implementing COM Servers on Compaq Platforms
COM Beyond Microsoft Designing: Designing and Implementing COM Servers on Compaq Platforms
(Digital Press) Draws upon Compaq Computer Corporation's breakthroughs with OpenVMS and Tru64 UNIX to explain how the COM standard can help organizations integrate their applications and heterogeneous computer systems. Details the APIs, utilities, libraries, and run-time environments. Softcover. DLC: COM (Computer architecture).

...
Molecular and Cellular Biophysics
Molecular and Cellular Biophysics
"The language used in the book is extremely clear.... The approach is very thoughtful.... This book is aimed at advanced undergraduates and beginning graduate students ... [and] would be a valuable addition to the library of any research lab at the physical end of biochemistry."
Chemistry World

Providing
...

Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Visual C++ 6 for Dummies Quick Reference
Visual C++ 6 for Dummies Quick Reference
Get up to speed in Visual C++ in a flash with these instant answers to your programming questions. Visual C++ 6 For Dummies Quick Reference is the fast and friendly way to get the most from your C++ programming for the Windows 95 and Windows 98 environments without having to spend hours on end poring through dense reference books....
Cloud Data Centers and Cost Modeling: A Complete Guide To Planning, Designing and Building a Cloud Data Center
Cloud Data Centers and Cost Modeling: A Complete Guide To Planning, Designing and Building a Cloud Data Center

Cloud Data Centers and Cost Modeling establishes a framework for strategic decision-makers to facilitate the development of cloud data centers. Just as building a house requires a clear understanding of the blueprints, architecture, and costs of the project; building a cloud-based data center requires similar knowledge. The authors...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy