Most Popular Books
- Introduction to Cryptography with Coding Theory (2nd Edition)
- Pervasive Wireless Environments: Detecting and Localizing User Spoofing
- Securing Emerging Wireless Systems: Lower-layer Approaches
- Network-Aware Security for Group Communications
- Multimedia Fingerprinting Forensics for Traitor Tracing (Eurasip Signal Processing And Communications)