Cryptography & Coding Theory


Viewing: 1 - 10 of 64
January 17, 2014
David Kahn
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking 
December 14, 2013
Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between 
August 19, 2013
Richard R. Brooks
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical 
July 22, 2013
Qurban A. Memon
For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence, 
July 15, 2013
Robert H. Sloan, Richard Warner
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in 
June 18, 2013
Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important. Anomaly-based network intrusion detection refers to finding exceptional or nonconforming 
June 17, 2013
Gary L. Mullen, Daniel Panario
Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors compile state-of-the-art research in this definitive handbook. Edited by two renowned researchers, the 
June 13, 2013
San Ling, Huaxiong Wang, Chaoping Xing
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a 
June 07, 2013
Jacques M. Bahi, Christophe Guyeux
For computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts. Discrete Dynamical Systems and Chaotic Machines: 
May 08, 2013
Franjieh El Khoury
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured 

News and Notes

Join the Conversation!
Sign up to receive CRC Press' First Look eAlerts, special discounts, and promotions!


Data Mining "Nobel Prize" Awarded to Series Editor Vipin Kumar

The ACM SIGKDD 2012 Innovation Award, the highest award for technical excellence in the field of Knowledge Discovery and Data Mining (KDD), has been awarded to Prof. Vipin Kumar for his technical contributions to foundational research in data mining and its applications to mining scientific and climate data. Prof. Kumar is the editor of the Chapman & Hall/CRC Data Mining and Knowledge Discovery Series. He has pioneered research in the areas of high performance and parallel data mining. His research group has also been at the forefront in the development of data-driven discovery methods for analyzing global climate and ecosystem data.


Online Bestsellers:

New Handbook! A pioneering publication for researchers in computer science and engineering, Handbook of Energy-Aware and Green Computing - Two Volume Set is one of the first to present a comprehensive account of recent research in energy-aware and green computing.

New Textbooks!

Programming in C++ for Engineering and Science

A Concise Introduction to Programming in Python

Computers and Society: Computing for Good

Operating System Design: The Xinu Approach, Linksys Version

Like us on Facebook, join our LinkedIn Group, or follow us on Twitter.