0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (85)
  • R500+ (1,897)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Security and Privacy in New Computing Environments - Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August... Security and Privacy in New Computing Environments - Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings (Paperback, 1st ed. 2021)
Ding Wang, Weizhi Meng, Jinguang Han
R1,457 Discovery Miles 14 570 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.

Cyber Security - 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers... Cyber Security - 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, …
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.

Machine Translation - 16th China Conference, CCMT 2020, Hohhot, China, October 10-12, 2020, Revised Selected Papers (Paperback,... Machine Translation - 16th China Conference, CCMT 2020, Hohhot, China, October 10-12, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Junhui Li, Andy Way
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th China Conference on Machine Translation, CCMT 2020, held in Hohhot, China, in October 2020. The 13 papers presented in this volume were carefully reviewed and selected from 78 submissions and focus on all aspects of machine translation, including preprocessing, neural machine translation models, hybrid model, evaluation method, and post-editing.

Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Paperback, 1st ed. 2020): Tuan D. Pham Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Paperback, 1st ed. 2020)
Tuan D. Pham
R2,427 Discovery Miles 24 270 Ships in 18 - 22 working days

This book presents an original combination of three well-known methodological approaches for nonlinear data analysis: recurrence, networks, and fuzzy logic. After basic concepts of these three approaches are introduced, this book presents recently developed methods known as fuzzy recurrence plots and fuzzy recurrence networks. Computer programs written in MATLAB, which implement the basic algorithms, are included to facilitate the understanding of the developed ideas. Several applications of these techniques to biomedical problems, ranging from cancer and neurodegenerative disease to depression, are illustrated to show the potential of fuzzy recurrence methods. This book opens a new door to theorists in complex systems science as well as specialists in medicine, biology, engineering, physics, computer science, geosciences, and social economics to address issues in experimental nonlinear signal and data processing.

Big Data Analytics - 8th International Conference, BDA 2020, Sonepat, India, December 15-18, 2020, Proceedings (Paperback, 1st... Big Data Analytics - 8th International Conference, BDA 2020, Sonepat, India, December 15-18, 2020, Proceedings (Paperback, 1st ed. 2020)
Ladjel Bellatreche, Vikram Goyal, Hamido Fujita, Anirban Mondal, P. Krishna Reddy
R1,425 Discovery Miles 14 250 Ships in 18 - 22 working days

This book constitutes the proceedings of the 8th International Conference on Big Data Analytics, BDA 2020, which took place during December 15-18, 2020, in Sonepat, India. The 11 full and 3 short papers included in this volume were carefully reviewed and selected from 48 submissions; the book also contains 4 invited and 3 tutorial papers. The contributions were organized in topical sections named as follows: data science systems; data science architectures; big data analytics in healthcare; information interchange of Web data resources; and business analytics.

Electronic Governance and Open Society: Challenges in Eurasia - 7th International Conference, EGOSE 2020, St. Petersburg,... Electronic Governance and Open Society: Challenges in Eurasia - 7th International Conference, EGOSE 2020, St. Petersburg, Russia, November 18-19, 2020, Proceedings (Paperback, 1st ed. 2020)
Andrei Chugunov, Igor Khodachek, Yuri Misnikov, Dmitrii Trutnev
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th Conference on Electronic Governance and Open Society: Challenges in Eurasia, EGOSE 2020, held in St. Petersburg, Russia, in November 2020. The 35 full papers and 5 short papers were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on digital government: services, policies, laws, practices, surveillance; digital society: openness, participation, trust, competences; digital data: data science, methods, modelling, AI, NLP.

Reflections on Artificial Intelligence for Humanity (Paperback, 1st ed. 2021): Bertrand Braunschweig, Malik Ghallab Reflections on Artificial Intelligence for Humanity (Paperback, 1st ed. 2021)
Bertrand Braunschweig, Malik Ghallab
R2,200 Discovery Miles 22 000 Ships in 18 - 22 working days

We already observe the positive effects of AI in almost every field, and foresee its potential to help address our sustainable development goals and the urgent challenges for the preservation of the environment. We also perceive that the risks related to the safety, security, confidentiality, and fairness of AI systems, the threats to free will of possibly manipulative systems, as well as the impact of AI on the economy, employment, human rights, equality, diversity, inclusion, and social cohesion need to be better assessed. The development and use of AI must be guided by principles of social cohesion, environmental sustainability, resource sharing, and inclusion. It has to integrate human rights, and social, cultural, and ethical values of democracy. It requires continued education and training as well as continual assessment of its effects through social deliberation. The "Reflections on AI for Humanity" proposed in this book develop the following issues and sketch approaches for addressing them: How can we ensure the security requirements of critical applications and the safety and confidentiality of data communication and processing? What techniques and regulations for the validation, certification, and audit of AI tools are needed to develop confidence in AI? How can we identify and overcome biases in algorithms? How do we design systems that respect essential human values, ensuring moral equality and inclusion? What kinds of governance mechanisms are needed for personal data, metadata, and aggregated data at various levels? What are the effects of AI and automation on the transformation and social division of labor? What are the impacts on economic structures? What proactive and accommodation measures will be required? How will people benefit from decision support systems and personal digital assistants without the risk of manipulation? How do we design transparent and intelligible procedures and ensure that their functions reflect our values and criteria? How can we anticipate failure and restore human control over an AI system when it operates outside its intended scope? How can we devote a substantial part of our research and development resources to the major challenges of our time such as climate, environment, health, and education?

Advanced Hybrid Information Processing - 4th EAI International Conference, ADHIP 2020, Binzhou, China, September 26-27, 2020,... Advanced Hybrid Information Processing - 4th EAI International Conference, ADHIP 2020, Binzhou, China, September 26-27, 2020, Proceedings, Part I (Paperback, 1st ed. 2021)
Shuai Liu, Liyun Xia
R2,722 Discovery Miles 27 220 Ships in 18 - 22 working days

This two-volume set constitutes the post-conference proceedings of the 4th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2020, held in Binzhou, China, in September 2020. Due to COVID-19 the conference was held virtually. The 89 papers presented were selected from 190 submissions and focus on theory and application of hybrid information processing technology for smarter and more effective research and application. The theme of ADHIP 2020 was "Industrial applications of aspects with big data". The papers are named in topical sections as follows: Industrial application of multi-modal information processing; Industrialized big data processing; Industrial automation and intelligent control; Visual information processing.

Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide (Paperback, 4th ed. 2020): Walter Fischer Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide (Paperback, 4th ed. 2020)
Walter Fischer
R3,313 Discovery Miles 33 130 Ships in 18 - 22 working days

This practical guide offers all important digital television, sound radio, and multimedia standards such as MPEG, DVB, DVD, DAB, ATSC, T-DMB, DMB-T, DRM and ISDB-T. It provides an in-depth look at these subjects in terms of practical experience. In addition explains the basics of essential topics like analog television, digital modulation, COFDM or mathematical transformations between time and frequency domains. The fourth edition addresses many new developments and features of digital broadcasting. Especially it includes Ultra High Definition Television (UHDTV), 4K, HEVC / H.265 (High Efficiency Video Coding), DVB-T2 measurement techniques and practice, DOCSIS 3.1, DVB - S2X, and 3DTV, as well as VHF-FM radio, HDMI, terrestrial transmitters, and stations. In the center of the treatments are always measuring techniques and of measuring practice for each case consolidating the knowledge imparted with numerous practical examples. The book is directed primarily at the specialist working in the field, on transmitters and transmission equipment, network planning, studio technology, playout centers and multiplex center technology and in the development departments for entertainment electronics or TV test engineering. Since the entire field of electrical communications technology is traversed in a wide arc, those who are students in this field are not excluded either.

Trends in Computational Intelligence, Security and Internet of Things - Third International Conference, ICCISIoT 2020, Tripura,... Trends in Computational Intelligence, Security and Internet of Things - Third International Conference, ICCISIoT 2020, Tripura, India, December 29-30, 2020, Proceedings (Paperback, 1st ed. 2020)
Nirmalya Kar, Ashim Saha, Suman Deb
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the Third International Conference on Computational Intelligence, Security and Internet of Things, ICCISIoT 2020, held in Agartala, India, in December 2020. Due to the COVID-19 pandemic the conference was held online. The 23 full papers and 4 short papers were carefully reviewed and selected from 113 submissions. The papers are organised according to the following topics: computational intelligence, security, and internet of things.

Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30,... Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings (Paperback, 1st ed. 2020)
Quanyan Zhu, John S. Baras, Radha Poovendran, Juntao Chen
R1,472 Discovery Miles 14 720 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020. Due to COVID-19 pandemic the conference was held virtually The 21 full papers presented together with 2 short papers were carefully reviewed and selected from 29 submissions. The papers focus on machine learning and security; cyber deception; cyber-physical systems security; security of network systems; theoretic foundations of security games; emerging topics.

Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020,... Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings (Paperback, 1st ed. 2020)
Miroslaw Kutylowski, Jun Zhang, Chao Chen
R2,472 Discovery Miles 24 720 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020. The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions. The selected papers are devoted to topics such as secure operating system architectures, applications programming and security testing, intrusion and attack detection, cybersecurity intelligence, access control, cryptographic techniques, cryptocurrencies, ransomware, anonymity, trust, recommendation systems, as well machine learning problems. Due to the Corona pandemic the event was held virtually.

Communication Technologies for Vehicles - 15th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2020, Bordeaux,... Communication Technologies for Vehicles - 15th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2020, Bordeaux, France, November 16-17, 2020, Proceedings (Paperback, 1st ed. 2020)
Francine Krief, Hasnaa Aniss, Leo Mendiboure, Serge Chaumette, Marion Berbineau
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2020, held in Bordeaux, France, in November 2020. The 18 full papers were carefully reviewed and selected from 22 submissions. The selected papers present orig-inal research results in areas related to the physical layer, communication protocols and standards, mobility and traffic models, experimental and field operational testing, and performance analysis.

Information and Cyber Security - 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25-26, 2020, Revised... Information and Cyber Security - 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25-26, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, …
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information Security, ISSA 2020, which was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic.The 10 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers deal with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; and distributed systems security.

Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18,... Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, …
R1,425 Discovery Miles 14 250 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy, DETIPS 2020; the First International Workshop on Dependability and Safety of Emerging Cloud and Fog Systems, DeSECSys 2020; Third International Workshop on Multimedia Privacy and Security, MPS 2020; and the Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2020; held in Guildford, UK, in September 2020, in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. A total of 42 papers was submitted. For the DETIPS Workshop 8 regular papers were selected for presentation. Topics of interest address various aspect of the core areas in relation to digital economy. For the DeSECSys Workshop 4 regular papers are included. The workshop had the objective of fostering collaboration and discussion among cyber-security researchers and practitioners to discuss the various facets and trade-o s of cyber security. In particular, applications, opportunities and possible shortcomings of novel security technologies and their integration in emerging application domains. For the MPS Workshop 4 regular papers are presented which cover topics related to the security and privacy of multimedia systems of Internet-based video conferencing systems (e.g., Zoom, Microsoft Teams, Google Meet), online chatrooms (e.g., Slack), as well as other services to support telework capabilities. For the SPOSE Workshop 3 full papers were accepted for publication. They reflect the discussion, exchange, and development of ideas and questions regarding the design and engineering of technical security and privacy mechanisms with particular reference to organizational contexts.

Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December... Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December 17-21, 2020, Proceedings (Paperback, 1st ed. 2020)
Lejla Batina, Stjepan Picek, Mainack Mondal
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020. Due to COVID-19 pandemic, the conference was held virtual. The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Image and Graphics Technologies and Applications - 15th Chinese Conference, IGTA 2020, Beijing, China, September 19, 2020,... Image and Graphics Technologies and Applications - 15th Chinese Conference, IGTA 2020, Beijing, China, September 19, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Yongtian Wang, Xueming Li, Yuxin Peng
R1,420 Discovery Miles 14 200 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th Conference on Image and Graphics Technologies and Applications, IGTA 2020, held in Beijing, China in September, 2020.*The 24 papers presented were carefully reviewed and selected from 115 submissions. They provide a forum for sharing progresses in the areas of image processing technology; image analysis and understanding; computer vision and pattern recognition; big data mining, computer graphics and VR, as well as image technology applications. *The conference was held virtually due to the COVID-19 pandemic.

Forward Error Correction via Channel Coding (Paperback, 1st ed. 2020): Orhangazi Forward Error Correction via Channel Coding (Paperback, 1st ed. 2020)
Orhangazi
R2,663 Discovery Miles 26 630 Ships in 18 - 22 working days

This book provides a comprehensive explanation of forward error correction, which is a vital part of communication systems. The book is written in such a way to make the subject easy and understandable for the reader. The book starts with a review of linear algebra to provide a basis for the text. The author then goes on to cover linear block codes, syndrome error correction, cyclic codes, Galois fields, BCH codes, Reed Solomon codes, and convolutional codes. Examples are provided throughout the text.

Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA,... Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
R1,465 Discovery Miles 14 650 Ships in 18 - 22 working days

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020,... Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Sokratis Katsikas, Frederic Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, …
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in Guildford, UK, in September 2020 in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. Due to COVID-19 pandemic the conference was held virtually The CyberICPS Workshop received 21 submissions from which 5 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyberattacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 4 full papers out of 7 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. From the ADIoT Workshop 2 full papers and 2 short papers out of 12 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part I... Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Rafael Pass, Krzysztof Pietrzak
R1,523 Discovery Miles 15 230 Ships in 18 - 22 working days

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.

Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II... Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Rafael Pass, Krzysztof Pietrzak
R1,524 Discovery Miles 15 240 Ships in 18 - 22 working days

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.

Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part III... Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part III (Paperback, 1st ed. 2020)
Rafael Pass, Krzysztof Pietrzak
R2,759 Discovery Miles 27 590 Ships in 18 - 22 working days

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.

Fundamentals of Cryptography - Introducing Mathematical and Algorithmic Foundations (Paperback, 1st ed. 2021): Duncan Buell Fundamentals of Cryptography - Introducing Mathematical and Algorithmic Foundations (Paperback, 1st ed. 2021)
Duncan Buell
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Cryptography, as done in this century, is heavily mathematical. But it also has roots in what is computationally feasible. This unique textbook text balances the theorems of mathematics against the feasibility of computation. Cryptography is something one actually "does", not a mathematical game one proves theorems about. There is deep math; there are some theorems that must be proved; and there is a need to recognize the brilliant work done by those who focus on theory. But at the level of an undergraduate course, the emphasis should be first on knowing and understanding the algorithms and how to implement them, and also to be aware that the algorithms must be implemented carefully to avoid the "easy" ways to break the cryptography. This text covers the algorithmic foundations and is complemented by core mathematics and arithmetic.

Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Shiho Moriai, Huaxiong Wang
R2,798 Discovery Miles 27 980 Ships in 18 - 22 working days

The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R952 Discovery Miles 9 520
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980
Blockchain - An Essential Beginner's…
Herbert Jones Hardcover R656 R585 Discovery Miles 5 850
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Cryptographic Boolean Functions and…
Thomas W Cusick, Pantelimon Stanica Paperback R1,920 Discovery Miles 19 200
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Real Life Cryptology - Ciphers and…
Benedek Lang Hardcover R3,336 Discovery Miles 33 360
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610

 

Partners