0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (101)
  • R500+ (1,926)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022,... Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings (Paperback, 1st ed. 2022)
Steven D. Galbraith
R3,128 Discovery Miles 31 280 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2022, CT-RSA 2022, held in San Francisco, CA, USA, in February 2022.* The 24 full papers presented in this volume were carefully reviewed and selected from 87 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto-graphic protocols to primitives and their implementation security. *The conference was held as a hybrid event.

Learn Blockchain by Building One - A Concise Path to Understanding Cryptocurrencies (Paperback, 1st ed.): Daniel Van Flymen Learn Blockchain by Building One - A Concise Path to Understanding Cryptocurrencies (Paperback, 1st ed.)
Daniel Van Flymen
R1,073 R869 Discovery Miles 8 690 Save R204 (19%) Ships in 10 - 15 working days

As cryptocurrencies and their underlying data structure, blockchains, become further intertwined in our daily lives, a full understanding of them is essential to anyone who wants to keep up and remain informed of the future of finance. There is no better learning method than a hands-on one, and Learn Blockchain by Building One offers just that. Develop your own blockchain using Python with step-by-step instructions from author Daniel van Flymen, an expert in the field. You will come away with a confident working knowledge of popular cryptocurrencies such as Bitcoin and Ethereum and which foundations make them work. Through helpful exercises and real-world examples, you will understand the core concepts of peer-to-peer networking, proof of work, hashing, encryption, and digital signatures. Learn Blockchain by Building One gives you timely, real-world lessons in blockchain and cryptocurrencies that you will need as our modern society becomes increasingly digitally sophisticated. The lasting implications of such technology, including the security of personal transactions and the role of government regulation, are not to be underestimated. Stay ahead of the curve and become a confident blockchain builder now! What You Will Learn Develop a fully-fledged blockchain in Python Obtain a ground-up understanding of of Proof of Work Grasp core cryptographic concepts, such as hashing, encryption, and digital signatures Understand how gossip protocols and peer-to-peer networking works by implementing a TCP client-server Realize the differences and trade-offs between popular blockchains such as Bitcoin and Ethereum Who This Book Is For This book is aimed at intermediate programmers in any area from finance to academia. Readers should be comfortable reading and writing basic Python.

Advanced Hybrid Information Processing - 5th EAI International Conference, ADHIP 2021, Virtual Event, October 22-24, 2021,... Advanced Hybrid Information Processing - 5th EAI International Conference, ADHIP 2021, Virtual Event, October 22-24, 2021, Proceedings, Part II (Paperback, 1st ed. 2022)
Shuai Liu, Xuefei Ma
R3,336 Discovery Miles 33 360 Ships in 10 - 15 working days

This two-volume set constitutes the post-conference proceedings of the 5th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2021, held in October 2021. Due to COVID-19 the conference was held virtually. The 94 papers presented were selected from 254 submissions and focus on theory and application of hybrid information processing technology for smarter and more effective research and application. The theme of ADHIP 2020 was "Social hybrid data processing". The papers are named in topical sections as follows: Intelligent algorithms in complex environment; AI system research and model design; Method research on Internet of Things technology; Research and analysis with intelligent education.

Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, SKM 2021, San Antonio, TX, USA,... Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, SKM 2021, San Antonio, TX, USA, October 8-9, 2021, Proceedings (Paperback, 1st ed. 2022)
Ramkrishnan, H. Raghav Rao, Sanjay K. Sahay, Sagar Samtani, Ziming Zhao
R1,807 Discovery Miles 18 070 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2021, held in San Antonio, TX, USA, in 2021. Due to the COVID-19 pandemic the conference was held online. The 11 papers presented were carefully reviewed and selected from 30 submissions. They were organized according to the following topical sections: intrusion and malware detection; secure knowledge management; deep learning for security; web and social network.

Emerging Technologies for Authorization and Authentication - 4th International Workshop, ETAA 2021, Darmstadt, Germany, October... Emerging Technologies for Authorization and Authentication - 4th International Workshop, ETAA 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers (Paperback, 1st ed. 2021)
Andrea Saracino, Paolo Mori
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days

This book constitutes the proceedings of the 4th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2021, held in Darmstadt, Germany, on October 8, 2021. The workshop was co-located with ESORICS 2021. The 11 full papers presented in this volume were carefully reviewed and selected from 14 submissions. The workshop presents new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including smart home environment.

Emerging Information Security and Applications - Second International Symposium, EISA 2021, Copenhagen, Denmark, November... Emerging Information Security and Applications - Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Weizhi Meng, Sokratis K. Katsikas
R1,805 Discovery Miles 18 050 Ships in 10 - 15 working days

This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.* The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. *Due to the COVID-19 pandemic the conference was held online.

Services - SERVICES 2021 - 17th World Congress, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event,... Services - SERVICES 2021 - 17th World Congress, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10-14, 2021, Proceedings (Paperback, 1st ed. 2022)
Mohamed Adel Serhani, Liang-Jie Zhang
R1,541 Discovery Miles 15 410 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th World Congress on Services, SERVICES 2021, held as part of the Services Conference Federation, SCF 2021, in December 2021. The conference was held virtually due to the COVID-19 pandemic. The 7 full papers and 2 short papers presented were carefully reviewed and selected from 43 submissions. The papers cover topics in the field of Advertising Services, Banking Services, Broadcasting & Cable TV Service, Business Services, Communications Services, Government Services, Real Estate Operations Services, Schools and Education Services, Healthcare Services, and much more.

A Comprehensive Course in Number Theory (Paperback, New): Alan Baker A Comprehensive Course in Number Theory (Paperback, New)
Alan Baker
R1,097 Discovery Miles 10 970 Ships in 12 - 17 working days

Developed from the author's popular text, A Concise Introduction to the Theory of Numbers, this book provides a comprehensive initiation to all the major branches of number theory. Beginning with the rudiments of the subject, the author proceeds to more advanced topics, including elements of cryptography and primality testing, an account of number fields in the classical vein including properties of their units, ideals and ideal classes, aspects of analytic number theory including studies of the Riemann zeta-function, the prime-number theorem and primes in arithmetical progressions, a description of the Hardy-Littlewood and sieve methods from respectively additive and multiplicative number theory and an exposition of the arithmetic of elliptic curves. The book includes many worked examples, exercises and further reading. Its wider coverage and versatility make this book suitable for courses extending from the elementary to beginning graduate studies.

Codebreaker in the Far East (Paperback, New edition): Alan Stripp Codebreaker in the Far East (Paperback, New edition)
Alan Stripp
R754 Discovery Miles 7 540 Ships in 12 - 17 working days

Codebreaker in the Far East is the first book to describe how Bletchley Park and its Indian and Far Eastern outposts broke a series of Japanese codes and cipher systems of dazzling variety and complexity. Alan Stripp gives his first-hand account of the excitement of reading the enemy's mind, of working against the clock, hampered by one of the world's most daunting languages and the knowledge that they were facing an unyielding and resourceful enemy who had never known defeat.

Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE,... Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Sokratis Katsikas, Costas Lambrinoudakis, Nora Cuppens, John Mylopoulos, Christos Kalloniatis, …
R2,154 Discovery Miles 21 540 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of six International Workshops that were held in conjunction with the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-6, 2021. The conference was initially planned to take place in Darmstadt, Germany, but changed to an online event due to the COVID-19 pandemic.The 32 papers included in these proceedings stem from the following workshops: the 7th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2021, which accepted 7 papers from 16 submissions; the 5th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2021, which accepted 5 papers from 8 submissions; the 4th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2021, which accepted 6 full and 1 short paper out of 15 submissions; the 3rd Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2021, which accepted 5 full and 1 short paper out of 13 submissions. the 2nd Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2021, which accepted 3 full and 1 short paper out of 6 submissions; and the 1st International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2021, which accepted 3 papers out of 7 submissions. The following papers are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com:Why IT Security Needs Therapy by Uta Menges, Jonas Hielscher, Annalina Buckmann, Annette Kluge, M. Angela Sasse, and Imogen Verret Transferring Update Behavior from Smartphones to Smart Consumer Devices by Matthias Fassl, Michaela Neumayr, Oliver Schedler, and Katharina Krombholz Organisational Contexts of Energy Cybersecurity by Tania Wallis, Greig Paul, and James Irvine SMILE - Smart eMaIl Link domain Extractor by Mattia Mossano, Benjamin Berens, Philip Heller, Christopher Beckmann, Lukas Aldag, Peter Mayer, and Melanie Volkamer A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things by Salatiel Ezennaya-Gomez, Claus Vielhauer, and Jana Dittmann Data Protection Impact Assessments in Practice - Experiences from Case Studies by Michael Friedewald, Ina Schiering, Nicholas Martin, and Dara Hallinan

Network and System Security - 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings... Network and System Security - 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings (Paperback, 1st ed. 2021)
Min Yang, Chao Chen, Yang Liu
R2,220 Discovery Miles 22 200 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Network and System Security, NSS 2021, held in Tianjin, China, on October 23, 2021. The 16 full and 8 short papers presented in this book were carefully reviewed and selected from 62 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.

Cyber Security - 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers... Cyber Security - 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li
R1,335 Discovery Miles 13 350 Ships in 10 - 15 working days

This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: data security; privacy protection; anomaly detection; traffic analysis; social network security; vulnerability detection; text classification.

Digital Forensics and Watermarking - 20th International Workshop, IWDW 2021, Beijing, China, November 20-22, 2021, Revised... Digital Forensics and Watermarking - 20th International Workshop, IWDW 2021, Beijing, China, November 20-22, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Xianfeng Zhao, Alessandro Piva, Pedro Comesana-Alfaro
R1,827 Discovery Miles 18 270 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 20th International Workshop on Digital Forensics and Watermarking, IWDW 2021, held in Beijing, China, in November 2021. The 18 full papers in this volume were carefully reviewed and selected from 32 submissions. The are categorized in the following topical headings: Forensics and Security Analysis; Watermarking and Steganology.

Cryptography and Coding - 18th IMA International Conference, IMACC 2021, Virtual Event, December 14-15, 2021, Proceedings... Cryptography and Coding - 18th IMA International Conference, IMACC 2021, Virtual Event, December 14-15, 2021, Proceedings (Paperback, 1st ed. 2021)
Maura B. Paterson
R2,202 Discovery Miles 22 020 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th IMA International Conference on Cryptography and Coding, IMACC 2021, held in December 2021. Due to COVID 19 pandemic the conference was held virtually. The 14 papers presented were carefully reviewed and selected from 30 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.

Advanced Hybrid Information Processing - 5th EAI International Conference, ADHIP 2021, Virtual Event, October 22-24, 2021,... Advanced Hybrid Information Processing - 5th EAI International Conference, ADHIP 2021, Virtual Event, October 22-24, 2021, Proceedings, Part I (Paperback, 1st ed. 2022)
Shuai Liu, Xuefei Ma
R3,403 Discovery Miles 34 030 Ships in 10 - 15 working days

This two-volume set constitutes the post-conference proceedings of the 5th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2021, held in October 2021. Due to COVID-19 the conference was held virtually. The 94 papers presented were selected from 254 submissions and focus on theory and application of hybrid information processing technology for smarter and more effective research and application. The theme of ADHIP 2020 was "Social hybrid data processing". The papers are named in topical sections as follows: Intelligent algorithms in complex environment; AI system research and model design; Method research on Internet of Things technology; Research and analysis with intelligent education.

Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020,... Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers (Paperback, 1st ed. 2022)
Steven Furnell, Paolo Mori, Edgar Weippl, Olivier Camp
R2,179 Discovery Miles 21 790 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020. The 11 full papers presented were carefully reviewed and selected from a total of 125 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.

Ubiquitous Networking - 7th International Symposium, UNet 2021, Virtual Event, May 19-22, 2021, Revised Selected Papers... Ubiquitous Networking - 7th International Symposium, UNet 2021, Virtual Event, May 19-22, 2021, Revised Selected Papers (Paperback, 1st ed. 2021)
Halima Elbiaze, Essaid Sabir, Francisco Falcone, Mohamed Sadik, Samson Lasaulce, …
R2,204 Discovery Miles 22 040 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Symposium on Ubiquitous Networking, UNet 2021, held in May 2021. Due to COVID-19 pandemic the conference was held virtually. The 16 revised full papers presented together with 6 invited papers and 3 special sessions were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections: ubiquitous communication technologies and networking; tactile internet and internet of things; mobile edge networking and fog-cloud computing; artificial intelligence-driven communications; and data engineering, cyber security and pervasive services.

Security and Trust Management - 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings... Security and Trust Management - 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings (Paperback, 1st ed. 2021)
Rodrigo Roman, Jianying Zhou
R1,806 Discovery Miles 18 060 Ships in 10 - 15 working days

This book constitutes the proceedings of the 17th International Workshop on Security and Trust Management, STM 2021, co-located with the 26th European Symposium on Research in Computer Security, ESORICS 2021. The conference was planned to take place in Darmstadt, Germany. It was held online on October 8, 2021, due to the COVID-19 pandemic.The 10 papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections on applied cryptography; privacy; formal methods for security and trust; and systems security.

Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Mehdi Tibouchi, Huaxiong Wang
R2,914 Discovery Miles 29 140 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptoanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.

Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II (Paperback, 1st ed. 2021)
Mehdi Tibouchi, Huaxiong Wang
R3,401 Discovery Miles 34 010 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.

Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part III (Paperback, 1st ed. 2021)
Mehdi Tibouchi, Huaxiong Wang
R3,153 Discovery Miles 31 530 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.

AI Approaches to the Complexity of Legal Systems XI-XII - AICOL International Workshops 2018 and 2020: AICOL-XI@JURIX 2018,... AI Approaches to the Complexity of Legal Systems XI-XII - AICOL International Workshops 2018 and 2020: AICOL-XI@JURIX 2018, AICOL-XII@JURIX 2020, XAILA@JURIX 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Victor Rodriguez Doncel, Monica Palmirani, Michal Araszkiewicz, Pompeu Casanovas, Ugo Pagallo, …
R2,325 Discovery Miles 23 250 Ships in 10 - 15 working days

This book includes revised selected papers from the International Workshops on AI Approaches to the Complexity of Legal Systems, AICOL-XI@JURIX2018, held in Groningen, The Netherlands, on December 12, 2018; AICOL-XII@JURIX 2020, held in Brno, Czechia, on December 9, 2020; XAILA@JURIX 2020, held in in Brno, Czechia, on December 9, 2020.*The 17 full and 4 short papers included in this volume were carefully reviewed and selected form 39 submissions. They represent a comprehensive picture of the state of the art in legal informatics. The papers are logically organized in 5 blocks: Knowledge Representation; Logic, rules, and reasoning; Explainable AI in Law and Ethics; Law as Web of linked Data and the Rule of Law; Data protection and Privacy Modelling and Reasoning. *Due to the Covid-19 pandemic AICOL-XII@JURIX 2020 and XAILA@JURIX 2020 were held virtually.

Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday (Paperback, 1st ed.... Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday (Paperback, 1st ed. 2021)
Daniel Dougherty, Jose Meseguer, Sebastian Alexander Moedersheim, Paul Rowe
R2,110 Discovery Miles 21 100 Ships in 10 - 15 working days

This Festschrift was published in honor of Joshua Guttman on the occasion of his 66.66 birthday. The impact of his work is reflected in the 23 contributions enclosed in this volume. Joshua's most influential and enduring contribution to the field has been the development of the strand space formalism for analyzing cryptographic protocols. It is one of several "symbolic approaches" to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants. His attention to the underlying logic of strand spaces has also allowed him to merge domain-specific reasoning about protocols with general purpose, first-order logical theories. The identification of clear principles in a domain paves the way to automated reasoning, and Joshua has been a leader in the development and distribution of several tools for security analysis.

Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings (Paperback, 1st ed.... Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings (Paperback, 1st ed. 2021)
Nicola Tuveri, Antonis Michalas, Billy Bob Brumley
R1,809 Discovery Miles 18 090 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 26th Nordic Conference on Secure IT Systems, NordSec 2021, which was held online during November 2021.The 11 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: Applied Cryptography, Security in Internet of Things, Machine Learning and Security, Network Security, and Trust.

Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part I... Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Kobbi NIssim, Brent Waters
R3,177 Discovery Miles 31 770 Ships in 10 - 15 working days

The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
New Cooperative Banking in Europe…
Marco Migliorelli Hardcover R3,619 Discovery Miles 36 190
Handbook on Corporate Governance in…
Christine A. Mallin Paperback R1,300 Discovery Miles 13 000
Central Bank Independence - Cultural…
C. Tognato Hardcover R1,459 Discovery Miles 14 590
Regional Economic Development in Russia…
Niyaz Kamilevich Gabdrakhmanov, Lenar Nailevich Safiullin Hardcover R4,980 Discovery Miles 49 800
Financial Globalization - Growth…
D Das Hardcover R2,805 Discovery Miles 28 050
Seng Heng Bank - History and Acquisition…
Patrick W.M. Huen, Jean Jinghan Chen, … Hardcover R1,829 Discovery Miles 18 290
Handbook of Finance and Development
Thorsten Beck, Ross Levine Hardcover R6,602 Discovery Miles 66 020
Financial Intelligence for IT…
Julie Bonner Hardcover R2,819 Discovery Miles 28 190
Income Diversification in the Chinese…
Zhixian Qu Hardcover R2,789 Discovery Miles 27 890
The US-China Trade Dispute - Facts…
Imad A Moosa Hardcover R3,300 Discovery Miles 33 000

 

Partners