0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (100)
  • R500+ (1,923)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Computer Security - ESORICS 2008 - 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008.... Computer Security - ESORICS 2008 - 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008. Proceedings (Paperback, 2008 ed.)
Sushil Jajodia
R1,564 Discovery Miles 15 640 Ships in 10 - 15 working days

These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security--ESORICS 2008--held October 6-8, 2008 in Torremolinos (Malaga), Spain, and hosted by the University of Malaga, C- puter Science Department. ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in different European countries. From 2002 it has taken place yearly. It attracts an international audience from both the academic and industrial communities. In response to the call for papers, 168 papers were submitted to the symposium. These papers were evaluated on the basis of their significance, novelty, and technical quality. Each paper was reviewed by at least three members of the Program Comm- tee. The Program Committee meeting was held electronically, holding intensive d- cussion over a period of two weeks. Finally, 37 papers were selected for presentation at the symposium, giving an acceptance rate of 22%.

E-business and Telecommunications - 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised... E-business and Telecommunications - 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers (Paperback, 2009 ed.)
Joaquim Filipe, Mohammad S. Obaidat
R1,505 Discovery Miles 15 050 Ships in 10 - 15 working days

This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 28-31, 2007 in Barcelona, Spain. The conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and telecommunications. ICETE is a joint international conf- ence integrating four major areas of knowledge that are divided into four cor- sponding conferences: ICE-B (International Conference on e-Business), SECRYPT (International Conference on Security and Cryptography), WINSYS (International Conference on Wireless Information Systems) and SIGMAP (International Conf- ence on Signal Processing and Multimedia). The program of this joint conference included several outstanding keynote lectures presented by internationally renowned distinguished researchers who are experts in the various ICETE areas. Their keynote speeches contributed to the ov- all quality of the program and heightened the significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of- business and telecommunications. This wide view has made it appealing to a global audience of engineers, scientists, business practitioners and policy experts. The papers accepted and presented at the conference demonstrated a number of new and innovative solutions for e-business and telecommunication networks and systems, showing that the technical problems in these fields are challenging, related and significant.

Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks - Second... Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks - Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers (Paperback, 2008 ed.)
Henning Schulzrinne, Radu State, Saverio Niccolini
R1,486 Discovery Miles 14 860 Ships in 10 - 15 working days

These are the proceedings of IPTComm 2008 - the Second Conference on Pr- ciples, Systems andApplications ofIP Telecommunications-heldinHeidelberg, Germany, July 1-2, 2008. The scope of the conference included recent advances in the domains of convergent networks, VoIP security and multimedia service environments for next generation networks. The conference attracted 56 s- missions, of which the Program Committee selected 16 papers for publication. The review process followed strict standards: each paper received at least three reviews. We would like to thank all Program Committee members and external reviewers for their contribution to the review process. The conference attracted attendees from academia and industry. Its excellence is re?ected in the quality of the contributed papers and invited talks. Additional industry talks and - plied demonstrations assured a synergy between academic and applied research. We would also like to acknowledge and thank our sponsors, many of whom s- portedtheconferencegenerously: NEC, AT&T, Codenomicon, IPTEGO, EADS, Cellcrypt, MuDynamics, SIP Forum and EURESCOM, Finally, we would like to thank all the researchers and authors from all over the world who submitted their work to the IPTComm 2008 conferenc

Provable Security - Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings... Provable Security - Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings (Paperback, 2008 ed.)
Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai
R1,493 Discovery Miles 14 930 Ships in 10 - 15 working days

Thesecondinternationalconferenceonprovablesecurity, ProvSec2008, washeld in Shanghai, China, during October 30th - November 1st, 2008. The conference wassponsoredbyShanghaiJiaoTongUniversity(SJTU)incooperationwiththe Chinese Association for Cryptologic Research (CACR) and the Natural Science Foundation of China (NSFC). The aim of ProvSec is to provide a platform for researchers, scholars, and practitionerstoexchangeideasandextendknowledgeonprovablesecurity, which is an important research area in cryptography. The ?rst ProvSec was held in Wollongong, Australia, in 2007. This year, the conference received 79 papers and the program committee selected 25 papers during eight weeks' thorough reviewing process. The authors ofthe selected papersarefrom12 di?erentcountries: Australia, Belgium, China, Estonia, France, Germany, India, Japan, Norway, Singapore, the UK, and the USA. We are grateful to the members of the program committee for their many hours of valuable time and hard work. In addition to the regular conference program, the conference hosted two invited talks: - Kenny Paterson (University of London, Royal Holloway): Non-interactive Key Distribution and Identity-Based Encryption: A Historical Perspective - PhillipRogaway(University ofCalifornia, Davis): BlockcipherModes of- eration: Culture and Counter-Culture in Modern Cryptography. The conference was also one of the special events for the 50th anniversary of the Department of Computer Science at SJTU. We extend our gratitude to all the people involved in organizing ProvSec from the Department of Computer Science and Engineering and the Lab for InformationSecurityofShanghaiJiaoTongUniversity, inparticulartoYuLong, Yanfei Zheng, Meiju Chen, Zhihua Su, and Bo Zhu for their great e?orts in making the conference run smoot

Information Hiding - 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers... Information Hiding - 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers (Paperback, 2008 ed.)
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow
R1,496 Discovery Miles 14 960 Ships in 10 - 15 working days

th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19-21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applications. We received a total of 64 papers from all over the globe, and would like to take this opportunity to thank all the authors who submitted their paper to IH 2008 and thus contributed to the consolidation of the reputation of the conference. The papers were refereed by at least three revi- ers who provided detailed comments, which was followed by discussion amongst the Program Committee members. Only 25 papers were selected for presentation. This rigorous review process will certainly strengthen Information Hiding's po- tion as the top forum of our community.

Pairing-Based Cryptography - Pairing 2008 - Second International Conference, Egham, UK, September 1-3, 2008, Proceedings... Pairing-Based Cryptography - Pairing 2008 - Second International Conference, Egham, UK, September 1-3, 2008, Proceedings (Paperback, 2008 ed.)
Steven Galbraith, Kenny Paterson
R1,497 Discovery Miles 14 970 Ships in 10 - 15 working days

The Pairing 2008 Conference was held at Royal Holloway, University of London during September 1-3, 2008. This conference followed on from the Pairing in Cryptography workshop (held in Dublin, Ireland on June 12-15, 2005) and the Pairing 2007 conference (held in Tokyo, Japan on July 2-4, 2007, with proce- ings published in Springer's LNCS 4575). The aim of this series of conferences is to bring together leading researchers and practitioners from academia and industry, all concerned with problems related to pairing-based cryptography. The programme consisted of 3 invited talks and 20 contributed papers. The invitedspeakerswereXavierBoyen(VoltageSecurity, USA), FlorianHess(Te- nical University Berlin, Germany) and Nigel Smart (University of Bristol, UK). Special thanks are due to these speakers, all three of whom provided papers which are included in these proceedings. The contributed talks were selected from ?fty submissions. The accepted papers cover a range of topics in mathematics and computer science, including hardwareand softwareimplementation of pairings, cryptographicprotocols, and mathematical aspects and applications of pairings. We would like to thank all the people who helped with the conference p- gramme and organisation. First, we thank the Steering Committee for their guidance and suggestions. We also heartily thank the Programme Committee and the sub-reviewers listed on the following pages for their thoroughness d- ing the review process. Each paper was reviewed by at least three people and there was signi?cant online discussion about a number of papers.

Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008... Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008 ed.)
Willem Jonker, Milan Petkovic
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital storage technology, which double storage capacity every year. Furthermore, communication techno- gies do not lag behind. The Internet has been widely used, as well as wireless te- nologies. With a few mouse clicks, people can communicate with each other around the world. All these advances have great potential to change the way people live, introducing new concepts like ubiquitous computing and ambient intelligence. Technology is becoming present everywhere in the form of smart and sensitive c- puting devices. They are nonintrusive, transparent and hidden in the background, but they collect, process, and share all kinds of information, including user beh- ior, in order to act in an intelligent and adaptive way. These emerging technologies put new requirements on security and data m- agement. As data are accessible anytime anywhere, it becomes much easier to get unauthorized data access. Furthermore, the use of new technologies has brought about some privacy concerns. It becomes simpler to collect, store, and search personal information, thereby endangering people's privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The intere- ing problems range from traditional topics, such as, access control and general database security, via privacy protection to new research directions, such as cryptographically enforced access control.

IP Operations and Management - 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008,... IP Operations and Management - 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008, Proceedings (Paperback, 2008 ed.)
Nail Akar, Michal Pioro, Charalabos Skianis
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

On behalf of the IEEE Communications Society, Technical Committee on N- work Operations and Management (CNOM), Manweek 2008 Organizing C- mittee, and members of the IPOM Technical Program Committee, it is our pleasureto present the proceedings of the 8th IEEE Workshop on IP Operations and Management(IPOM 2008),heldaspartofManweek2008duringSeptember 22-26, 2008, on Samos, Greece. ThecurrentInternetisalarge-scaledistributedsystemwhosesub-components suchasaddressing,protocols,algorithms,services,need to scalein time withthe rapid growth of Internet tra?c volumes. Moreover, there is a high level of int- action between di?erent subcomponents of the Internet sometimes in undesired ways - for example, denial of service attacks can jeopardize the operation of a commercial network. With these challenges in place, operations and mana- ment of IP networks have become increasingly important. This necessitates a good understanding of the emerging technical and scienti?c problems in the current Internet, and lessons from such understanding will be particularly - portant for future Internet design and management. Building on the success of the previous events, we wanted IPOM 2008 to focus on network management challenges for the current Internet as well as on future Internet design.

Coding Theory and Applications - 2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain,... Coding Theory and Applications - 2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008, Proceedings (Paperback, 2008 ed.)
Angela Barbero
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

It is a pleasure to welcome you to the proceedings of the second International Castle Meeting on Coding Theory and its Applications, held at La Mota Castle in Medina del Campo. The event provided a forum for the exchange of results and ideas, which we hope will foster future collaboration. The ?rst meeting was held in 1999, and, encouraged by that experience, we now intend to hold the meeting every three years. Springer kindly accepted to publish the proceedings volume you have in your hands in their LNCS series. The topics were selected to cover some of the areas of research in Coding Theory that are currently receiving the most attention. The program consisted of a mixture of invited and submitted talks, with the focus on quality rather than quantity. A total of 34 papers were submitted to themeeting.Afteracarefulreviewprocessconductedbythescienti?ccommittee aided by external reviewers, we selected 14 of these for inclusion in the current volume, along with 5 invited papers. The program was further augmented by the remaining invited papers in addition to papers on recent results, printed in a separate volume. We would like to thank everyone who made this meeting possible by helping with the practical and scienti?c preparations: the organization committee, the scienti?c committee, the invited speakers, and the many external reviewers who shall remain anonymous. I would especially like to mention the General Advisor ofthe meeting, OyvindYtrehus.Finally Iextend mygratitudeto allthe authors and participants who contributed to this meeting."

Financial Cryptography and Data Security - 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008.... Financial Cryptography and Data Security - 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers (Paperback, 2008 ed.)
Gene Tsudik
R1,484 Discovery Miles 14 840 Ships in 10 - 15 working days

This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference, heldinCozumel, Mexico, January28-31 2008. Financial cryptography (FC) and data security has been for years the main international forum for research, advanced development, education, exploration, and debate regarding information assurance in the context of ?nance and commerce. Despite the strong competition from other top-tier related security conf- ences, the Program Committee received a signi?cant number of submissions, indicating a growingacceptance of FC as the premier ?nancialand data security forum. The ProgramCommittee, led by the PCChair Gene Tsudik, achievedan excellent program balance between research, practice, and panel sessions. This year the program included two new additions, namely, a short-paper track and a poster session, both extremely well received. Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadeloupe, Bermuda, and the Grand Cayman. In 2008 we continued this t- dition and the conference was located in sunny Cozumel, Mexico. The ongoing carnival, sailing, submarine trips, and Mayan ruins were just a few of the - merous exciteme

Smart Card Research and Advanced Applications - 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK,... Smart Card Research and Advanced Applications - 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008, Proceedings (Paperback, 2008 ed.)
Gilles Grimaud, Francois-Xavier Standaert
R1,474 Discovery Miles 14 740 Ships in 10 - 15 working days

Since1994, CARDIShasbeentheforemostinternationalconferencededicatedto smart card research and applications. Every two years, the scienti?c community congregates to present new ideas and discuss recent developments with both an academicandindustrialfocus.Followingtheincreasedcapabilitiesofsmartcards anddevices, CARDIS has becomea majoreventfor the discussionofthe various issuesrelatedtotheuseofsmallelectronictokensintheprocessofhuman-machine interactions.Thescopeoftheconferenceincludesnumeroussub?eldssuchasn- working, e?cientimplementations, physicalsecurity, biometrics, andso on. This year's CARDIS was held in London, UK, on September 8-11, 2008. It was organized by the Smart Card Centre, Information Security Group of the Royal Holloway, University of London. Thepresentvolumecontainsthe21papersthatwereselectedfromthe51s- missions to the conference. The 22 members of the program committee worked hard in order to evaluate each submission with at least three reviews and agree on a high quality ?nal program. Additionally, 61 external reviewers helped the committee with their expertise. Two invited talks completed the technical p- gram. The ?rst one, given by Ram Banerjee and Anki Nelaturu, was entitled "Getting Started with Java Card 3.0 Platform." The second one, given by Aline Gouget, was about "Recent Advances in Electronic Cash Design" and was c- pleted by an abstract provided in these proceedings.

Codes: An Introduction to Information Communication and Cryptography (Paperback, 2008 ed.): Norman L. Biggs Codes: An Introduction to Information Communication and Cryptography (Paperback, 2008 ed.)
Norman L. Biggs
R1,065 Discovery Miles 10 650 Ships in 10 - 15 working days

Many people do not realise that mathematics provides the foundation for the devices we use to handle information in the modern world. Most of those who do know probably think that the parts of mathematics involvedare quite 'cl- sical', such as Fourier analysis and di?erential equations. In fact, a great deal of the mathematical background is part of what used to be called 'pure' ma- ematics, indicating that it was created in order to deal with problems that originated within mathematics itself. It has taken many years for mathema- cians to come to terms with this situation, and some of them are still not entirely happy about it. Thisbookisanintegratedintroductionto Coding.Bythis Imeanreplacing symbolic information, such as a sequence of bits or a message written in a naturallanguage, byanother messageusing (possibly) di?erentsymbols.There are three main reasons for doing this: Economy (data compression), Reliability (correction of errors), and Security (cryptography). I have tried to cover each of these three areas in su?cient depth so that the reader can grasp the basic problems and go on to more advanced study. The mathematical theory is introduced in a way that enables the basic problems to bestatedcarefully, butwithoutunnecessaryabstraction.Theprerequisites(sets andfunctions, matrices, ?niteprobability)shouldbefamiliartoanyonewhohas taken a standard course in mathematical methods or discrete mathematics. A course in elementary abstract algebra and/or number theory would be helpful, but the book contains the essential facts, and readers without this background should be able to understand what is going on. vi Thereareafewplaceswherereferenceismadetocomputeralgebrasystems.

Arithmetic of Finite Fields - Second International Workshop, WAIFI 2008, Siena, Italy, July 6-9, 2008, Proceedings (Paperback,... Arithmetic of Finite Fields - Second International Workshop, WAIFI 2008, Siena, Italy, July 6-9, 2008, Proceedings (Paperback, Illustrated Ed)
Joachim Von Zur Gathen, Jose Luis Imana, Cetin Kaya Koc
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

These are the proceedings of WAIFI 2008, the second workshop on the Ari- metic of Finite Fields, that was held in Siena, Italy, July 6-9, 2008. The ?rst workshop, WAIFI 2007, which was held in Madrid (Spain), was received quite enthusiasticallybymathematicians, computerscientists, engineersandphysicists who are performing research on ?nite ?eld arithmetic. We believe that there is a need for a workshop series bridging the gap between the mathematical theory of ?nite ?elds and their hardware/software implementations and technical - plications. We hope that the WAIFI workshopseries, which from now on will be held on even years, will help to ?ll this gap. Therewere 34 submissionsto WAIFI 2008, of which the ProgramCommittee selected 16 for presentation. Each submission was reviewed by at least three reviewers. Our thanks go to the Program Committee members for their many contributionsandhardwork.Wearealsogratefultotheexternalreviewerslisted below for their expertise and assistance in the deliberations. In addition to the contributions appearing in these proceedings, the workshop program included an invited lecture given by Amin Shokrollahi. Special compliments go out to Enrico Martinelli, General Co-chair, and to Roberto Giorgi and Sandro Bartolini, local organizers of WAIFI 2008, who broughtthe workshopto Siena, oneofthe mostbeautiful citiesofTuscany, Italy. WAIFI 2008 was organized by the Dipartimento di Ingegneria dell'Informazione of the University of Siena, Italy. The submission and selection of papers were done using the iChair software, developed at EPFL by Thomas Baign eres and Matthieu Finiasz. We also thank Deniz Karakoyunlu for his help in this matter.

Fast Software Encryption - 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected... Fast Software Encryption - 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers (Paperback, 2008 ed.)
Kaisa Nyberg
R1,530 Discovery Miles 15 300 Ships in 10 - 15 working days

FastSoftwareEncryption(FSE)isthe15thinaseriesofworkshopsonsymmetric cryptography. It is sponsored by the International Association for Cryptologic Research(IACR), andpreviousFSEworkshopshavebeenheldaroundtheworld: 1993 Cambridge, UK 1994 Leuven, Belgium 1996 Cambridge, UK 1997 Haifa, Israel 1998 Paris, France 1999 Rome, Italy 2000 New York, USA 2001 Yokohama, Japan 2002 Leuven, Belgium 2003 Lund, Sweden 2004 New Delhi, India 2005 Paris, France 2006 Graz, Austria 2007 Luxembourg, Luxembourg The FSE workshop is devoted to the foreground research on fast and secure primitivesforsymmetriccryptography, includingthedesignandanalysisofblock ciphers, stream ciphers, encryption schemes, analysis and evaluation tools, hash functions, and message authentication codes. This year 72 papers were submitted to FSE including a large number of hi- quality and focused submissions, from which 26 papers for regular presentation and 4 papers for short presentation were selected. I wish to thank the authors of all submissions for their scienti?c contribution to the workshop. The workshop also featured an invited talk by Lars R. Knudsen with the title "Hash functions and SHA-3." The traditional rump session with short informal presentations on current topics was organized and chaired by Daniel J. Bernstein. EachsubmissionwasreviewedbyatleastthreeProgramCommitteemembers. Each submission originating from the Program Committee received at least ?ve reviews.The?nalselectionwasmadeafterathoroughdiscussion.Iwishtothank all ProgramCommittee members and referees for their generouswork.I am also gratefulto ThomasBaign eresformaintainingandcustomizingthe iChair review management software, which o?ered an excellent support for the demanding reviewing task. I would also like to thank him for setting up a beautiful and informative website and for compiling the pre-proceedings.

Information Theoretic Security - Third International Conference, ICITS 2008, Calgary, Canada,  August 10-13, 2008, Proceedings... Information Theoretic Security - Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings (Paperback, 2008 ed.)
Reihaneh Safavi-Naini
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

ICITS 2008, the Third InternationalConference on Information Theoretic Se- rity, was held in Calgary, Alberta, Canada, during August 10-13, 2008, at the Universityof Calgary.This seriesof conferences wasstarted with the 2005IEEE InformationTheoryWorkshoponTheoryandPracticein Information-Theoretic Security (ITW 2005, Japan), held on Awaji Island, Japan, October 16-19,2005. The conference series aims at bringing focus to security research when there is no unproven computational assumption on the adversary. This is the fra- work proposed by Claude Shannon in his seminal paper formalizing modern unclassi?ed research on cryptography. Over the last few decades, Shannon's approach to formalizing security has been used in various other areas including authentication, secure communication, key exchange, multiparty computation and information hiding to name a few. Coding theory has also proven to be a powerful tool in the construction of security systems with information theoretic security. Therewere43submitted papers ofwhich14wereaccepted.Eachcontributed paper was reviewed by three members of the Program Committee. In the case of co-authorship by a Program Committee member the paper was reviewed by ?ve members of the committee (no committee member reviewed their own s- mission). In addition to the accepted papers, the conference also included nine invited speakers, whose contributions were not refereed. These proceedings c- tain the acceptedpapers with anyrevisionsrequiredbythe ProgramCommittee as well as the contributions by invited speakers.

Progress in Cryptology - AFRICACRYPT 2008 - First International Conference on Cryptology in Africa, Casablanca, Morocco, June... Progress in Cryptology - AFRICACRYPT 2008 - First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings (Paperback, 2008 ed.)
Serge Vaudenay
R1,509 Discovery Miles 15 090 Ships in 10 - 15 working days

The AFRICACRYPT 2008 conference was held during June 11-14, 2008 in Casablanca, Morocco. Upon the initiative of the organizers from the Ecole n- male sup erieure in Casablanca, this event was the ?rst international research conference in Africa dedicated to cryptography. The conference was honored by the presence of the invited speakers Bruce Schneier, Jacques Stern, and Alexander W. Dent who gave talks entitled "The Psychology of Security" "Modern Cryptography: A Historical Perspective" and "ABriefHistoryofProvably-SecurePublic-KeyEncryption,"respectively.These proceedings include papers by Bruce Schneier and by Alexander Dent. The conference received 82 submissions on November 24, 2007. They went through a careful doubly anonymous review process. This was run by the iChair software written by Thomas Baign eres and Matthieu Finiasz. Every paper - ceived at least three review reports. After this period, 25 papers were accepted on February 12, 2008. Authors then had the opportunity to update their papers until March 13, 2008. The present proceedings include all the revised papers. At the end of the review process, the paper entitled "An Authentication Protocol with Encrypted Biometric Data" written by Julien Bringer and Herv e Chabanne was elected to receive the Africacrypt 2008 Best Paper Award. I had the privilege to chair the Program Committee. I would like to thank all committee members for their tough work on the submissions, as well as all externalreviewersfortheirsupport.IalsothankmyassistantThomasBaign eres formaintainingtheserverandhelpingmetorunthesoftware.Ithanktheinvited speakers, the authors of the best paper, the authors of all submissions. They all contributed to the success of the conference."

Public Key Infrastructure - 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008,... Public Key Infrastructure - 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008, Proceedings (Paperback, 2008 ed.)
Stig F. Mjolsnes, Sjouke Mauw, Sokratis Katsikas
R1,458 Discovery Miles 14 580 Ships in 10 - 15 working days

This book contains the proceedings of the 5th European Public Key Infrastr- ture Workshop: Theory and Practice, EuroPKI 2008, which was held on the NTNU campus Gloshaugen in Trondheim, Norway, in June 2008. The EuroPKI workshop series focuses on all research and practice aspects of public key infrastructures, services and applications, and welcomes original research papers and excellent survey contributions from academia, government, and industry. Simplyput, publickeysareeasiertodistributethansecretkeys.Nevertheless, constructing e?ective, practical, secure and low cost means for assuring auth- ticity and validity of public keys used in large-scale networked services remains both a technological and organizational challenge. In a nutshell, this is the PKI problem, and the papers presented herein propose new solutions and insight for these questions. This volume holds 16 refereedpapers including the presentationpaper by the invited speaker P. Landrock. In response to the EuroPKI 2008 call for papers, a total of 37 paper proposalswere received. All submissions underwenta thorough blind review by at least three PC members, resulting in a careful selection and revision of the accepted papers. The authors came from 10 countries: Belgium, Brazil, Canada, Finland, Germany, Japan, Malaysia, Norway, Spain, and the USA.Theacceptedpaperswereorganizedintothe topicalsessions: InvitedTalk, Certi?cates, Authentication, Practice, Signatures, Analysis, and Networks.

Database Systems for Advanced Applications. DASFAA 2022 International Workshops - BDMS, BDQM, GDMA, IWBT, MAQTDS, and PMBD,... Database Systems for Advanced Applications. DASFAA 2022 International Workshops - BDMS, BDQM, GDMA, IWBT, MAQTDS, and PMBD, Virtual Event, April 11-14, 2022, Proceedings (Paperback, 1st ed. 2022)
Uday Kiran Rage, Vikram Goyal, P. Krishna Reddy
R2,064 Discovery Miles 20 640 Ships in 12 - 17 working days

This volume constitutes the papers of several workshops which were held in conjunction with the 27th International Conference on Database Systems for Advanced Applications, DASFAA 2022, held as virtual event in April 2022. The 30 revised full papers presented in this book were carefully reviewed and selected from 65 submissions. DASFAA 2022 presents the following five workshops: * First workshop on Pattern mining and Machine learning in Big complex Databases (PMBD 2021) * 6th International Workshop on Graph Data Management and Analysis (GDMA 2022) * First International Workshop on Blockchain Technologies (IWBT2022) * 8th International Workshop on Big Data Management and Service (BDMS 2022) * First workshop on Managing Air Quality Through Data Science * 7th International Workshop on Big Data Quality Management (BDQM 2022).

Responding to Crises in the Modern Infrastructure - Policy Lessons from Y2K (Paperback, 1st ed. 2008): K Quigley Responding to Crises in the Modern Infrastructure - Policy Lessons from Y2K (Paperback, 1st ed. 2008)
K Quigley
R1,438 Discovery Miles 14 380 Ships in 10 - 15 working days

This book examines comparatively the US and the UK governments' management of Y2K and considers the extent to which such management can be understood as responses to market pressures, public opinion and organized interests. It concludes by providing valuable lessons to those concerned about managing risk and critical infrastructure today.

Financial Cryptography and Data Security - 11th International Conference, FC 2007, and First International Workshop on Usable... Financial Cryptography and Data Security - 11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers (Paperback, 2007 ed.)
Sven Dietrich, Rachna Dhamija
R1,501 Discovery Miles 15 010 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, FC 2007, and the co-located 1st International Workshop on Usable Security, USEC 2007, both held in Scarborough, Trinidad/Tobago, in February 2007.

The book includes 17 revised full papers, 1 system presentation paper and the transcriptions of 5 panel sessions from FC 2007. The papers, which were carefully reviewed and selected from 85 submissions, are organized in topical sections on Payment Systems, Anonymity, Authentication, Anonymity and Privacy, Cryptography and Commercial Transactions, Financial Transactions and Web Services, and Cryptography. The book concludes with 5 revised full and 5 revised short papers from the USEC 2007 workshop. This workshop brought together an interdisciplinary group of researchers and practitioners to discuss usability problems and deepen the understanding of users' capabilities and motivations in performing security tasks.

Cryptography and Coding - 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings (Paperback,... Cryptography and Coding - 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings (Paperback, 2007 ed.)
Steven Galbraith
R1,512 Discovery Miles 15 120 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007.

The 22 revised full papers presented together with 2 invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation.

Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings (Paperback, 2007 ed.)
Kaoru Kurosawa
R2,879 Discovery Miles 28 790 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December 2007. The papers are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast cryptography, mac and implementation, multiparty computation, block ciphers, foundation, public key encryption, and cryptanalysis.

Secure Data Management - 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings (Paperback, 2007... Secure Data Management - 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings (Paperback, 2007 ed.)
Willem Jonker, Milan Petkovic
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Fourth VLDB 2007 International Workshop on Secure Data Management, SDM 2007, held in Vienna, Austria, September 23-24, 2007 in conjunction with VLDB 2007.

The 11 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Access Control, Database Security, Privacy Protection and Positon Papers.

Formal Aspects in Security and Trust - Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006,... Formal Aspects in Security and Trust - Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006, Revised Selected Papers (Paperback, 2007 ed.)
Theo Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust, FAST 2006, held in Hamilton, Ontario, Canada, August 26-27, 2006.

The 18 revised papers presented were carefully reviewed and selected from 47 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.

Transactions on Data Hiding and Multimedia Security II (Paperback, 2007 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security II (Paperback, 2007 ed.)
Yun Q. Shi
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper introduces Fingercasting, which allows joint fingerprinting and decryption of broadcast messages. The second paper presents an estimation attack on content-based video fingerprinting. The third proposes a statistics and spatiality-based feature distance measure for error resilient image authentication. The fourth paper reports on LTSB steganalysis. Finally, the fifth paper surveys various blind and robust watermarking schemes for 3D shapes.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Introduction to Bitcoin
David Ricardo Hardcover R733 Discovery Miles 7 330
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030
Bitcoin - Guide Book for Beginners
Keizer Soeze Hardcover R1,151 R928 Discovery Miles 9 280
Technical Articles about the Voynich…
National Security Agency Hardcover R568 Discovery Miles 5 680
Blockchain - Novice to Expert - 2…
Keizer Soeze Hardcover R1,081 R875 Discovery Miles 8 750
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,178 Discovery Miles 11 780
The Economics of Blockchain and…
James L. Caton Hardcover R2,745 Discovery Miles 27 450
New Frontiers in Cryptography - Quantum…
Khaled Salah Mohamed Hardcover R3,508 Discovery Miles 35 080
Alice and Bob Learn Application Security
T Janca Paperback R849 Discovery Miles 8 490
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R639 Discovery Miles 6 390

 

Partners