[图书][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

[图书][B] The algorithm design manual

SS Skiena - 1998 - Springer
This newly expanded and updated second edition of the best-selling classic continues to
take the" mystery" out of designing algorithms, and analyzing their efficacy and efficiency …

[图书][B] An Introduction to Cryptography

J Hoffstein, J Pipher, JH Silverman, J Hoffstein… - 2014 - Springer
An Introduction to Cryptography | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Track your research Search Cart Book cover An …

[图书][B] Complexity theory: exploring the limits of efficient algorithms

I Wegener - 2005 - books.google.com
Complexity theory is the theory of determining the necessary resources for the solution of
algorithmic problems and, therefore, the limits of what is possible with the available …

Texts in Theoretical Computer Science An EATCS Series

A Board, GAMBCS Calude, ACDHJ Hartmanis… - 2005 - Springer
This book is an accessible introduction to complexity theory and cryptology, two closely
related areas in theoretical computer science. Based on courses taught at Heinrich-Heine …

[图书][B] Basic modern algebra with applications

MR Adhikari, A Adhikari - 2014 - Springer
This book is designed to serve as a basic text of modern algebra at the undergraduate level.
Modern mathematics facilitates unification of different areas of mathematics. It is …

[图书][B] Algorithm Engineering

M Müller-Hannemann, S Schirra - 2001 - Springer
The systematic development of efficient algorithms has become a key technology for all
kinds of ambitious and innovative computer applications. With major parts of algorithmic …

[图书][B] Computability theory: an introduction to recursion theory

HB Enderton - 2010 - books.google.com
Computability Theory: An Introduction to Recursion Theory provides a concise,
comprehensive, and authoritative introduction to contemporary computability theory …

Perceptual video hashing based on temporal wavelet transform and random projections with application to indexing and retrieval of near-identical videos

S Rameshnath, PK Bora - Multimedia Tools and Applications, 2019 - Springer
A perceptual video hash function extracts a short fixed-length bit string called a perceptual
hash on the basis of the visual contents of the video. Such a function should be robust to the …

[图书][B] Mathematik für Informatiker

W Struckmann, D Wätjen - 2016 - Springer
Wenn sich Studierende der Informatik oder verwandter Fächer in den ersten Wochen ihres
Studiums befinden, wundern sie sich häufig, wie viele Lehrveranstaltungen der Mathematik …