0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (91)
  • R500+ (1,943)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Proceedings of International Conference on Network Security and Blockchain Technology - ICNSBT 2021 (Paperback, 1st ed. 2022):... Proceedings of International Conference on Network Security and Blockchain Technology - ICNSBT 2021 (Paperback, 1st ed. 2022)
Debasis Giri, Jyotsna Kumar Mandal, Kouichi Sakurai, Debashis De
R5,705 Discovery Miles 57 050 Ships in 12 - 19 working days

The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India-Kolkata Chapter, India, during December 2-4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.

A Practical Introduction to Regression Discontinuity Designs - Foundations (Paperback): Matias D. Cattaneo, Nicolas Idrobo,... A Practical Introduction to Regression Discontinuity Designs - Foundations (Paperback)
Matias D. Cattaneo, Nicolas Idrobo, Rocio Titiunik
R649 Discovery Miles 6 490 Ships in 12 - 19 working days

In this Element and its accompanying second Element, A Practical Introduction to Regression Discontinuity Designs: Extensions, Matias Cattaneo, Nicolas Idrobo, and Rociio Titiunik provide an accessible and practical guide for the analysis and interpretation of regression discontinuity (RD) designs that encourages the use of a common set of practices and facilitates the accumulation of RD-based empirical evidence. In this Element, the authors discuss the foundations of the canonical Sharp RD design, which has the following features: (i) the score is continuously distributed and has only one dimension, (ii) there is only one cutoff, and (iii) compliance with the treatment assignment is perfect. In the second Element, the authors discuss practical and conceptual extensions to this basic RD setup.

Blockchain Technology and Applications (Hardcover): Pethuru Raj, Kavita Saini, Chellammal Surianarayanan Blockchain Technology and Applications (Hardcover)
Pethuru Raj, Kavita Saini, Chellammal Surianarayanan
R2,383 Discovery Miles 23 830 Ships in 12 - 19 working days

Blockchain is emerging as a powerful technology, which has attracted the wider attention of all businesses across the globe. In addition to financial businesses, IT companies and business organizations are keenly analyzing and adapting this technology for improving business processes. Security is the primary enterprise application. There are other crucial applications that include creating decentralized applications and smart contracts, which are being touted as the key differentiator of this pioneering technology. The power of any technology lies in its ecosystem. Product and tool vendors are building and releasing a variety of versatile and robust toolsets and platforms in order to speed up and simplify blockchain application development, deployment and management. There are other infrastructure-related advancements in order to streamline blockchain adoption. Cloud computing, big data analytics, machine and deep learning algorithm, and connected and embedded devices all are driving blockchain application development and deployment. Blockchain Technology and Applications illustrates how blockchain is being sustained through a host of platforms, programming languages, and enabling tools. It examines: Data confidential, integrity, and authentication Distributed consensus protocols and algorithms Blockchain systems design criteria and systems interoperability and scalability Integration with other technologies including cloud and big data It also details how blockchain is being blended with cloud computing, big data analytics and IoT across all industry verticals. The book gives readers insight into how this path-breaking technology can be a value addition in several business domains ranging from healthcare, financial services, government, supply chain and retail.

Codeless Data Structures and Algorithms - Learn DSA Without Writing a Single Line of Code (Paperback, 1st ed.): Armstrong Subero Codeless Data Structures and Algorithms - Learn DSA Without Writing a Single Line of Code (Paperback, 1st ed.)
Armstrong Subero
R1,073 R907 Discovery Miles 9 070 Save R166 (15%) Ships in 10 - 15 working days

In the era of self-taught developers and programmers, essential topics in the industry are frequently learned without a formal academic foundation. A solid grasp of data structures and algorithms (DSA) is imperative for anyone looking to do professional software development and engineering, but classes in the subject can be dry or spend too much time on theory and unnecessary readings. Regardless of your programming language background, Codeless Data Structures and Algorithms has you covered. In this book, author Armstrong Subero will help you learn DSAs without writing a single line of code. Straightforward explanations and diagrams give you a confident handle on the topic while ensuring you never have to open your code editor, use a compiler, or look at an integrated development environment. Subero introduces you to linear, tree, and hash data structures and gives you important insights behind the most common algorithms that you can directly apply to your own programs. Codeless Data Structures and Algorithms provides you with the knowledge about DSAs that you will need in the professional programming world, without using any complex mathematics or irrelevant information. Whether you are a new developer seeking a basic understanding of the subject or a decision-maker wanting a grasp of algorithms to apply to your projects, this book belongs on your shelf. Quite often, a new, refreshing, and unpretentious approach to a topic is all you need to get inspired. What You'll Learn Understand tree data structures without delving into unnecessary details or going into too much theory Get started learning linear data structures with a basic discussion on computer memory Study an overview of arrays, linked lists, stacks and queues Who This Book Is ForThis book is for beginners, self-taught developers and programmers, and anyone who wants to understand data structures and algorithms but don't want to wade through unnecessary details about quirks of a programming language or don't have time to sit and read a massive book on the subject. This book is also useful for non-technical decision-makers who are curious about how algorithms work.

Socio-Technical Aspects in Security - 11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected... Socio-Technical Aspects in Security - 11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Simon Parkin, Luca Vigano
R1,779 Discovery Miles 17 790 Ships in 12 - 19 working days

This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021. The 10 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: web and apps; context and modelling; and from the present to the future.

RC4 Stream Cipher and Its Variants (Paperback): Goutam Paul, Subhamoy Maitra RC4 Stream Cipher and Its Variants (Paperback)
Goutam Paul, Subhamoy Maitra
R2,047 Discovery Miles 20 470 Ships in 12 - 19 working days

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values. The text explains how to reconstruct the secret key from known state information and analyzes the RC4 PRGA in detail, including a sketch of state recovery attacks. The book then describes three popular attacks on RC4: distinguishing attacks, Wired Equivalent Privacy (WEP) protocol attacks, and fault attacks. The authors also compare the advantages and disadvantages of several variants of RC4 and examine stream cipher HC-128, which is the next level of evolution after RC4 in the software stream cipher paradigm. The final chapter emphasizes the safe use of RC4. With open research problems in each chapter, this book offers a complete account of the most current research on RC4.

Systemtheorie - Methoden und Anwendungen fur ein- und mehrdimensionale Systeme (German, Hardcover, 3., neubearb. u. erw. Aufl.... Systemtheorie - Methoden und Anwendungen fur ein- und mehrdimensionale Systeme (German, Hardcover, 3., neubearb. u. erw. Aufl. 1995)
Hans Marko
R3,795 Discovery Miles 37 950 Ships in 10 - 15 working days

Dieser Klassiker der Systemtheorie wurde auf den neuesten Stand gebracht und um ein Kapitel uber mehrdimensionale Systeme erweitert. Zentrales Thema ist die grundlegende und umfassende Darstellung der Behandlung linearer Systeme mittels Spektraltransformationen. Diese mussen nicht nachrichten-, informations-, oder regelungstechnischer, sondern konnen z.B. auch biologischer Natur sein.
Auf eine kompakte Darstellung wurde besonderer Wert gelegt, die Anspruche an die Mathematikkenntnisse des Lesers sind gering. Das Buch ist somit sowohl als Nachschlagewerk als auch zum Lernen geeignet."

Machine Translation - 16th China Conference, CCMT 2020, Hohhot, China, October 10-12, 2020, Revised Selected Papers (Paperback,... Machine Translation - 16th China Conference, CCMT 2020, Hohhot, China, October 10-12, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Junhui Li, Andy Way
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th China Conference on Machine Translation, CCMT 2020, held in Hohhot, China, in October 2020. The 13 papers presented in this volume were carefully reviewed and selected from 78 submissions and focus on all aspects of machine translation, including preprocessing, neural machine translation models, hybrid model, evaluation method, and post-editing.

Image and Graphics Technologies and Applications - 15th Chinese Conference, IGTA 2020, Beijing, China, September 19, 2020,... Image and Graphics Technologies and Applications - 15th Chinese Conference, IGTA 2020, Beijing, China, September 19, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Yongtian Wang, Xueming Li, Yuxin Peng
R1,535 Discovery Miles 15 350 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th Conference on Image and Graphics Technologies and Applications, IGTA 2020, held in Beijing, China in September, 2020.*The 24 papers presented were carefully reviewed and selected from 115 submissions. They provide a forum for sharing progresses in the areas of image processing technology; image analysis and understanding; computer vision and pattern recognition; big data mining, computer graphics and VR, as well as image technology applications. *The conference was held virtually due to the COVID-19 pandemic.

Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021):... Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021)
Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra
R1,769 Discovery Miles 17 690 Ships in 12 - 19 working days

This book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the area and the hands-on analysis of the spectral properties of Boolean functions from a cryptologic viewpoint. Topics covered in the book include Qubit, Deutsch-Jozsa and Walsh spectrum, Grover's algorithm, Simon's algorithm and autocorrelation spectrum. The book aims at encouraging readers to design and implement practical algorithms related to Boolean functions. Apart from combinatorial techniques, this book considers implementing related programs in a quantum computer. Researchers, practitioners and educators will find this book valuable.

Network Coding and Subspace Designs (Hardcover, 1st ed. 2018): Marcus Greferath, Mario Osvin Pavcevic, Natalia Silberstein,... Network Coding and Subspace Designs (Hardcover, 1st ed. 2018)
Marcus Greferath, Mario Osvin Pavcevic, Natalia Silberstein, Maria Angeles Vazquez-Castro
R3,862 R2,670 Discovery Miles 26 700 Save R1,192 (31%) Ships in 12 - 19 working days

This book, written by experts from universities and major research laboratories, addresses the hot topic of network coding, a powerful scheme for information transmission in networks that yields near-optimal throughput. It introduces readers to this striking new approach to network coding, in which the network is not simply viewed as a mechanism for delivering packets, but rather an algebraic structure named the subspace, which these packets span. This leads to a new kind of coding theory, employing what are called subspace codes. The book presents selected, highly relevant advanced research output on: Subspace Codes and Rank Metric Codes; Finite Geometries and Subspace Designs; Application of Network Coding; Codes for Distributed Storage Systems. The outcomes reflect research conducted within the framework of the European COST Action IC1104: Random Network Coding and Designs over GF(q). Taken together, they offer communications engineers, R&D engineers, researchers and graduate students in Mathematics, Computer Science, and Electrical Engineering a comprehensive reference guide to the construction of optimal network codes, as well as efficient encoding and decoding schemes for a given network code.

Unsolved! - The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies... Unsolved! - The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies (Hardcover)
Craig P. Bauer
R964 R840 Discovery Miles 8 400 Save R124 (13%) Ships in 12 - 19 working days

A mathematical tour of some of the greatest unsolved ciphers of all time In 1953, a man was found dead from cyanide poisoning near the Philadelphia airport with a picture of a Nazi aircraft in his wallet. Taped to his abdomen was an enciphered message. In 1912, a book dealer named Wilfrid Voynich came into possession of an illuminated cipher manuscript once belonging to Emperor Rudolf II, who was obsessed with alchemy and the occult. Wartime codebreakers tried--and failed--to unlock the book's secrets, and it remains an enigma to this day. In this lively and entertaining book, Craig Bauer examines these and other vexing ciphers yet to be cracked. Some may reveal the identity of a spy or serial killer, provide the location of buried treasure, or expose a secret society--while others may be elaborate hoaxes. Unsolved! begins by explaining the basics of cryptology, and then explores the history behind an array of unsolved ciphers. It looks at ancient ciphers, ciphers created by artists and composers, ciphers left by killers and victims, Cold War ciphers, and many others. Some are infamous, like the ciphers in the Zodiac letters, while others were created purely as intellectual challenges by figures such as Nobel Prize-winning physicist Richard P. Feynman. Bauer lays out the evidence surrounding each cipher, describes the efforts of geniuses and eccentrics--in some cases both--to decipher it, and invites readers to try their hand at puzzles that have stymied so many others. Unsolved! takes readers from the ancient world to the digital age, providing an amazing tour of many of history's greatest unsolved ciphers.

Small Business Cyber Security - Your Customers Can Trust You...Right? (Paperback): Adam Anderson, Tom Gilkeson Small Business Cyber Security - Your Customers Can Trust You...Right? (Paperback)
Adam Anderson, Tom Gilkeson
R369 R345 Discovery Miles 3 450 Save R24 (7%) Ships in 10 - 15 working days
Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised... Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan Ko, Chun I. Fan
R1,372 Discovery Miles 13 720 Ships in 12 - 19 working days

This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.

Multidisciplinary Perspectives in Cryptology and Information Security (Hardcover): Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas Multidisciplinary Perspectives in Cryptology and Information Security (Hardcover)
Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas
R6,703 Discovery Miles 67 030 Ships in 10 - 15 working days

With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security. This publication offers a comprehensive, in-depth analysis of encryption solutions and will be of particular interest to IT professionals, cryptologists, and researchers in the field.

Coding Interviews - Questions, Analysis & Solutions (Paperback, 1st ed.): Harry He Coding Interviews - Questions, Analysis & Solutions (Paperback, 1st ed.)
Harry He
R2,159 Discovery Miles 21 590 Ships in 10 - 15 working days

This book is about coding interview question of software and Internet companies. It covers five key factors which determine performance of candidates: (1) the basics of programming languages, data structures and algorithms, (2) approaches to writing code with high quality, (3) tips to solve difficult problems, (4) methods to optimize code, (5) soft skills required in interviews. The basics of languages, algorithms and data structures are discussed as well as questions that explore how to write robust solutions after breaking down problems into manageable pieces. It also includes examples to focus on modeling and creative problem solving. Interview questions from the most popular companies in the IT industry are taken as examples to illustrate the five factors above. Besides solutions, it contains detailed analysis, how interviewers evaluate solutions, as well as why they like or dislike them. Readers will improve their interview performance after reading this book. It will be beneficial for them even after they get offers, because its topics, such as approaches to analyzing difficult problems, writing robust code and optimizing, are all essential for high-performing coders.What you'll learn * Necessary knowledge for coding interviews, including programming languages, algorithms and data structures * Tips to write complete and robust code * Approaches to simplifying and solving difficult problems, with examples, figures and discussion * Methods to optimizing memory and space efficiency * Tips to demonstrate communication skills and learning skills during interviews * Standards in interviewers' minds to evaluate candidates' performance Who this book is for Targeted audiences of this book include students who are interested in programming-related careers, as well as developers with less-than-three-year experience who are looking for more career opportunities. Table of Contents1. Interview Process 2. Programming Languages 3. Data Structures 4. Algorithms 5. High Quality Code 6. Approaches to Solutions 7. Optimization 8. Skills for Interviews 9. Interview Cases

An Introduction to Data Structures and Algorithms (Paperback, Softcover reprint of the original 1st ed. 2002): John C... An Introduction to Data Structures and Algorithms (Paperback, Softcover reprint of the original 1st ed. 2002)
John C Cherniavsky; J.A. Storer
R1,363 Discovery Miles 13 630 Ships in 9 - 17 working days

Data structures and algorithms are presented at the college level in a highly accessible format that presents material with one-page displays in a way that will appeal to both teachers and students. The thirteen chapters cover: Models of Computation, Lists, Induction and Recursion, Trees, Algorithm Design, Hashing, Heaps, Balanced Trees, Sets Over a Small Universe, Graphs, Strings, Discrete Fourier Transform, Parallel Computation. Key features: Complicated concepts are expressed clearly in a single page with minimal notation and without the "clutter" of the syntax of a particular programming language; algorithms are presented with self-explanatory "pseudo-code." * Chapters 1-4 focus on elementary concepts, the exposition unfolding at a slower pace. Sample exercises with solutions are provided. Sections that may be skipped for an introductory course are starred. Requires only some basic mathematics background and some computer programming experience. * Chapters 5-13 progress at a faster pace. The material is suitable for undergraduates or first-year graduates who need only review Chapters 1 -4. * This book may be used for a one-semester introductory course (based on Chapters 1-4 and portions of the chapters on algorithm design, hashing, and graph algorithms) and for a one-semester advanced course that starts at Chapter 5. A year-long course may be based on the entire book. * Sorting, often perceived as rather technical, is not treated as a separate chapter, but is used in many examples (including bubble sort, merge sort, tree sort, heap sort, quick sort, and several parallel algorithms). Also, lower bounds on sorting by comparisons are included with the presentation of heaps in the context of lower bounds for comparison-based structures. * Chapter 13 on parallel models of computation is something of a mini-book itself, and a good way to end a course. Although it is not clear what parallel

Competitive Programming in Python - 128 Algorithms to Develop your Coding Skills (Paperback): Christoph Durr, Jill-Jenn Vie Competitive Programming in Python - 128 Algorithms to Develop your Coding Skills (Paperback)
Christoph Durr, Jill-Jenn Vie; Translated by Greg Gibbons, Daniele Gibbons
R1,137 Discovery Miles 11 370 Ships in 12 - 19 working days

Want to kill it at your job interview in the tech industry? Want to win that coding competition? Learn all the algorithmic techniques and programming skills you need from two experienced coaches, problem setters, and jurors for coding competitions. The authors highlight the versatility of each algorithm by considering a variety of problems and show how to implement algorithms in simple and efficient code. Readers can expect to master 128 algorithms in Python and discover the right way to tackle a problem and quickly implement a solution of low complexity. Classic problems like Dijkstra's shortest path algorithm and Knuth-Morris-Pratt's string matching algorithm are featured alongside lesser known data structures like Fenwick trees and Knuth's dancing links. The book provides a framework to tackle algorithmic problem solving, including: Definition, Complexity, Applications, Algorithm, Key Information, Implementation, Variants, In Practice, and Problems. Python code included in the book and on the companion website.

Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Paperback, 1st ed. 2023):... Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Paperback, 1st ed. 2023)
Zhiyong Zheng, Kun Tian, Fengxia Liu
R1,032 Discovery Miles 10 320 Ships in 9 - 17 working days

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R3,466 Discovery Miles 34 660 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R3,217 Discovery Miles 32 170 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R2,949 Discovery Miles 29 490 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Digital Forensics and Watermarking - 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised... Digital Forensics and Watermarking - 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers (Paperback, 1st ed. 2023)
Xianfeng Zhao, Zhenjun Tang, Pedro Comesana-Alfaro, Alessandro Piva
R1,872 Discovery Miles 18 720 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022. The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking.

Smart Card Research and Advanced Applications - 21st International Conference, CARDIS 2022, Birmingham, UK, November 7-9, 2022,... Smart Card Research and Advanced Applications - 21st International Conference, CARDIS 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers (Paperback, 1st ed. 2023)
Ileana Buhan, Tobias Schneider
R1,895 Discovery Miles 18 950 Ships in 10 - 15 working days

This book constitutes the proceedings of the 21st International Conference on Smart Card Research and Advanced Applications, CARDIS 2022, which took place in November 2022. The conference took place in Birmingham, United Kingdom. The 15 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: physical attacks; physical countermeasures; protecting AES; evaluation methodologies; attacking NTRU; next-generation cryptography.

Astronomy in the Near-Infrared - Observing Strategies and Data Reduction Techniques (Hardcover, 1st ed. 2022): Jochen Heidt Astronomy in the Near-Infrared - Observing Strategies and Data Reduction Techniques (Hardcover, 1st ed. 2022)
Jochen Heidt
R3,787 R3,573 Discovery Miles 35 730 Save R214 (6%) Ships in 9 - 17 working days

Near-infrared astronomy has become one of the most rapidly developing branches in modern astrophysics. Innovative observing techniques, near-infrared detectors with quantum efficiencies in excess of 90%, highly specialised instruments as well as advanced data reduction techniques have allowed major breakthroughs in various areas like exoplanets, star-forming regions, the supermassive black hole in the Galactic center, and the high-redshift Universe. In this book, the reader will be introduced to the basic concepts of how to prepare near-infrared observations with maximized scientific return. Equal weight is given to all aspects of the data reduction for both - imaging and spectroscopy. Information is also provided on the state of the art instrumentation available and planned, on detector technology or the physics of the atmosphere, all of which influence the preparation and execution of observations and data reduction techniques. The beginner but also the expert will find a lot of information in compact form which is otherwise widely dispersed across the internet or other sources.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Modern Software Engineering - Doing What…
David Farley Paperback R864 Discovery Miles 8 640
Online Survey Design and Data Analytics…
Shalin Hai-Jew Hardcover R5,752 Discovery Miles 57 520
Browsers, Devices, and Fonts - A…
Gary Rozanc Paperback R1,825 Discovery Miles 18 250
The Semantic Web - Real-World…
Jorge Cardoso, Martin Hepp, … Hardcover R2,913 Discovery Miles 29 130
Design and Use of Software Architectures…
Jan Bosch Paperback R1,773 Discovery Miles 17 730
Algorithm Design: A Methodological…
Patrick Bosc, Marc Guyomard, … Paperback R1,641 Discovery Miles 16 410
Balancing Agile and Disciplined…
Manuel Mora, Jorge Marx Gomez, … Hardcover R6,798 Discovery Miles 67 980
Software Inspection
Tom Gilb, Dorothy Graham Paperback R1,855 Discovery Miles 18 550
Custom Search - Discover more: - A…
Irina Shamaeva, David Michael Galley Paperback R1,519 Discovery Miles 15 190
Semantic Web Services - Advancement…
Brian Blake, Liliana Cabral, … Hardcover R2,927 Discovery Miles 29 270

 

Partners