Stefan Katzenbeisser Book order






- 2014
- 2012
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
- 2009
Information hiding
- 276 pages
- 10 hours of reading
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.
- 2001
Recent Advances in RSA Cryptography
- 156 pages
- 6 hours of reading
This book delves into the latest developments in RSA cryptography, a cornerstone of modern secure communications. It covers advanced mathematical techniques, algorithmic improvements, and practical applications, making it essential for researchers and practitioners in the field of cryptography. The exploration includes discussions on security enhancements, efficiency optimizations, and real-world implementations, providing a comprehensive overview of how RSA continues to evolve in response to emerging threats and technological advancements.
- 1997
Angeraten für alle, deren Texte auch optisch herausragen sollen. Aus dem Inhalt: Einführung. Textsatz. Formelsatz. Tabellensatz. Makros. Änderung der Ausgabeform. Das TEX der AMS. Anhänge: Lösungen zu den Übungsaufgaben. Befehlsverzeichnis. Fonttabellen.