0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (85)
  • R500+ (1,905)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

SIGINT - The Secret History of Signals Intelligence in the World Wars (Paperback, New Ed): Peter Matthews SIGINT - The Secret History of Signals Intelligence in the World Wars (Paperback, New Ed)
Peter Matthews
R435 R396 Discovery Miles 3 960 Save R39 (9%) Ships in 9 - 17 working days

Signals Intelligence, or SIGINT, is the interception and evaluation of coded enemy messages. From Enigma to Ultra, Purple to Lorenz, Room 40 to Bletchley, SIGINT has been instrumental in both victory and defeat during the First and Second World War. In the First World War, a vast network of signals rapidly expanded across the globe, spawning a new breed of spies and intelligence operatives to code, de-code and analyse thousands of messages. As a result, signallers and cryptographers in the Admiralty's famous Room 40 paved the way for the code breakers of Bletchley Park in the Second World War. In the ensuing war years the world battled against a web of signals intelligence that gave birth to Enigma and Ultra, and saw agents from Britain, France, Germany, Russia, America and Japan race to outwit each other through infinitely complex codes. For the first time, Peter Matthews reveals the secret history of global signals intelligence during the world wars through original interviews with German interceptors, British code breakers, and US and Russian cryptographers. "SIGINT is a fascinating account of what Allied investigators learned postwar about the Nazi equivalent of Bletchley Park. Turns out, 60,000 crptographers, analysts and linguists achieved considerable success in solving intercepted traffic, and even broke the Swiss Enigma! Based on recently declassifed NSA document, this is a great contribution to the literature." - The St Ermin's Hotel Intelligence Book of the Year Award 2014

Multi-photon Quantum Secure Communication (Paperback, Softcover reprint of the original 1st ed. 2019): Pramode K. Verma,... Multi-photon Quantum Secure Communication (Paperback, Softcover reprint of the original 1st ed. 2019)
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
R3,785 Discovery Miles 37 850 Ships in 18 - 22 working days

This book explores alternative ways of accomplishing secure information transfer with incoherent multi-photon pulses in contrast to conventional Quantum Key Distribution techniques. Most of the techniques presented in this book do not need conventional encryption. Furthermore, the book presents a technique whereby any symmetric key can be securely transferred using the polarization channel of an optical fiber for conventional data encryption. The work presented in this book has largely been practically realized, albeit in a laboratory environment, to offer proof of concept rather than building a rugged instrument that can withstand the rigors of a commercial environment.

Space Information Networks - Third International Conference, SINC 2018, Changchun, China, August 9-10, 2018, Revised Selected... Space Information Networks - Third International Conference, SINC 2018, Changchun, China, August 9-10, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Quan Yu
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the Third International Conference on Space Information Networks, SINC 2018, held in Changchun, China, in August 2018. The 17 full and 7 short papers presented in this volume were carefully reviewed and selected from 140 submissions. The papers are organized in topical sections on architecture and efficient networking mechanism; theories and methods of high speed transmission; and sparse characterization and fusion processing.

Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018,... Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Kwangsu Lee
R1,433 Discovery Miles 14 330 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018. The total of 21 papers presented in this volume were carefully reviewed and selected from 49 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.

Polar Codes - A Non-Trivial Approach to Channel Coding (Paperback, Softcover reprint of the original 1st ed. 2019): Orhangazi Polar Codes - A Non-Trivial Approach to Channel Coding (Paperback, Softcover reprint of the original 1st ed. 2019)
Orhangazi
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

This book explains the philosophy of the polar encoding and decoding technique. Polar codes are one of the most recently discovered capacity-achieving channel codes. What sets them apart from other channel codes is the fact that polar codes are designed mathematically and their performance is mathematically proven. The book develops related fundamental concepts from information theory, such as entropy, mutual information, and channel capacity. It then explains the successive cancellation decoding logic and provides the necessary formulas, moving on to demonstrate the successive cancellation decoding operation with a tree structure. It also demonstrates the calculation of split channel capacities when polar codes are employed for binary erasure channels, and explains the mathematical formulation of successive cancellation decoding for polar codes. In closing, the book presents and proves the channel polarization theorem, before mathematically analyzing the performance of polar codes.

Secure Networked Inference with Unreliable Data Sources (Paperback, Softcover reprint of the original 1st ed. 2018): Aditya... Secure Networked Inference with Unreliable Data Sources (Paperback, Softcover reprint of the original 1st ed. 2018)
Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.

Fault Tolerant Architectures for Cryptography and Hardware Security (Paperback, Softcover reprint of the original 1st ed.... Fault Tolerant Architectures for Cryptography and Hardware Security (Paperback, Softcover reprint of the original 1st ed. 2018)
Sikhar Patranabis, Debdeep Mukhopadhyay
R3,785 Discovery Miles 37 850 Ships in 18 - 22 working days

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Permutation Polynomial Interleavers for Turbo Codes (Paperback, Softcover reprint of the original 1st ed. 2019): Lucian... Permutation Polynomial Interleavers for Turbo Codes (Paperback, Softcover reprint of the original 1st ed. 2019)
Lucian Trifina, Daniela Tarniceriu
R4,018 Discovery Miles 40 180 Ships in 18 - 22 working days

This book investigates the permutation polynomial (PP) based interleavers for turbo codes, including all the main theoretical and practical findings related to topics such as full coefficient conditions for PPs up to fifth; the number of all true different PPs up to fifth degree; the number of true different PPs under Zhao and Fan sufficient conditions, for any degree (with direct formulas or with a simple algorithm); parallel decoding of turbo codes using PP interleavers by butterfly networks; upper bounds of the minimum distance for turbo codes with PP interleavers; specific methods to design and find PP interleavers with good bit/frame error rate (BER/FER) performance. The theoretical results are explained in great detail to enhance readers' understanding. The book is intended for engineers in the telecommunications field, but the chapters dealing with the PP coefficient conditions and with the number of PP are of interest to mathematicians working in the field.

Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (Paperback, 1st ed. 2019): Yushu Zhang, Yong Xiang, Leo... Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (Paperback, 1st ed. 2019)
Yushu Zhang, Yong Xiang, Leo Yu Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.

Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018,... Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings (Paperback, 1st ed. 2018)
Chunhua Su, Hiroaki Kikuchi
R1,501 Discovery Miles 15 010 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.

Distributed Computing by Oblivious Mobile Robots (Paperback): Paola Flocchini, Giuseppe Prencipe, Nicola Santoro Distributed Computing by Oblivious Mobile Robots (Paperback)
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro
R1,165 Discovery Miles 11 650 Ships in 18 - 22 working days

The study of what can be computed by a team of autonomous mobile robots, originally started in robotics and AI, has become increasingly popular in theoretical computer science (especially in distributed computing), where it is now an integral part of the investigations on computability by mobile entities. The robots are identical computational entities located and able to move in a spatial universe; they operate without explicit communication and are usually unable to remember the past; they are extremely simple, with limited resources, and individually quite weak. However, collectively the robots are capable of performing complex tasks, and form a system with desirable fault-tolerant and self-stabilizing properties. The research has been concerned with the computational aspects of such systems. In particular, the focus has been on the minimal capabilities that the robots should have in order to solve a problem. This book focuses on the recent algorithmic results in the field of distributed computing by oblivious mobile robots (unable to remember the past). After introducing the computational model with its nuances, we focus on basic coordination problems: pattern formation, gathering, scattering, leader election, as well as on dynamic tasks such as flocking. For each of these problems, we provide a snapshot of the state of the art, reviewing the existing algorithmic results. In doing so, we outline solution techniques, and we analyze the impact of the different assumptions on the robots' computability power. Table of Contents: Introduction / Computational Models / Gathering and Convergence / Pattern Formation / Scatterings and Coverings / Flocking / Other Directions

Network Security Metrics (Paperback, Softcover reprint of the original 1st ed. 2017): Lingyu Wang, Sushil Jajodia, Anoop Singhal Network Security Metrics (Paperback, Softcover reprint of the original 1st ed. 2017)
Lingyu Wang, Sushil Jajodia, Anoop Singhal
R2,427 Discovery Miles 24 270 Ships in 18 - 22 working days

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve what you cannot measure", a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.

Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7,... Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Javier Lopez, Jianying Zhou, Miguel Soriano
R3,063 Discovery Miles 30 630 Ships in 18 - 22 working days

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Proceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security (Paperback, Softcover... Proceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security (Paperback, Softcover reprint of the original 1st ed. 2018)
Marco Baldi, Elizabeth A. Quaglia, Stefano Tomasin
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers. The characteristic feature of all the contributions in this book is their relevance for the practical application of security principles to a variety of widely used communication techniques, including: multiantenna systems, ultra-wide-band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, building a bridge between two usually distinct worlds. The book gathers extended versions of contributions delivered at the Second Workshop on Communication Security, held in Paris, France, in April 2017 and affiliated with the conference EUROCRYPT 2017.

Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Hovav Shacham, Alexandra Boldyreva
R2,800 Discovery Miles 28 000 Ships in 18 - 22 working days

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September... Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings (Paperback, 1st ed. 2018)
Atsuo Inomata, Kan Yasuda
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Workshop on Security, IWSEC 2018, held in Sendai, Japan, in September 2018. The 18 regular papers and 2 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They were organized in topical sections named: Cryptanalysis, Implementation Security, Public-Key Primitives, Security in Practice, Secret Sharing, Symmetric-Key Primitives, and Provable Security.

Fading and Shadowing in Wireless Systems (Paperback, Softcover reprint of the original 2nd ed. 2017): P.Mohana Shankar Fading and Shadowing in Wireless Systems (Paperback, Softcover reprint of the original 2nd ed. 2017)
P.Mohana Shankar
R4,383 Discovery Miles 43 830 Ships in 18 - 22 working days

This book offers a comprehensive overview of fading and shadowing in wireless channels. A number of statistical models including simple, hybrid, compound and cascaded ones are presented along with a detailed discussion of diversity techniques employed to mitigate the effects of fading and shadowing. The effects of co-channel interference before and after the implementation of diversity are also analyzed. To facilitate easy understanding of the models and the analysis, the background on probability and random variables is presented with relevant derivations of densities of the sums, products, ratios as well as order statistics of random variables. The book also provides material on digital modems of interest in wireless systems. The updated edition expands the background materials on probability by offering sections on Laplace and Mellin transforms, parameter estimation, statistical testing and receiver operating characteristics. Newer models for fading, shadowing and shadowed fading are included along with the analysis of diversity combining algorithms. In addition, this edition contains a new chapter on Cognitive Radio. Based on the response from readers of the First Edition, detailed Matlab scripts used in the preparation of this edition are provided. Wherever necessary, Maple scripts used are also provided.

Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London,... Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Erol Gelenbe, Paolo Campegiani, Tadeusz Czachorski, Sokratis K. Katsikas, Ioannis Komnios, …
R1,928 Discovery Miles 19 280 Ships in 18 - 22 working days

This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software systems, and the Internet of Things has become a crucial aspect of the performance of computer systems. The papers deal with these issues, with a specific focus on societally critical systems such as health informatics systems, the Internet of Things, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures.

Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18,... Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings (Paperback, 1st ed. 2018)
Florian Kerschbaum, Stefano Paraboschi
R1,426 Discovery Miles 14 260 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018. The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on administration, access control policies, privacy-preserving access and computation, integrity and user interaction, security analysis and private evaluation, fixing vulnerabilities, and networked systems.

Feistel Ciphers - Security Proofs and Cryptanalysis (Paperback, Softcover reprint of the original 1st ed. 2017): Valerie... Feistel Ciphers - Security Proofs and Cryptanalysis (Paperback, Softcover reprint of the original 1st ed. 2017)
Valerie Nachef, Jacques Patarin, Emmanuel Volte
R4,700 Discovery Miles 47 000 Ships in 18 - 22 working days

This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2, we describe generic attacks on Feistel ciphers. In Part 3, we give results on DES and specific Feistel ciphers. Part 4 is devoted to improved security results. We also give results on indifferentiability and indistinguishability.

Computational Information Geometry - For Image and Signal Processing (Paperback, Softcover reprint of the original 1st ed.... Computational Information Geometry - For Image and Signal Processing (Paperback, Softcover reprint of the original 1st ed. 2017)
Frank Nielsen, Frank Critchley, Christopher T. J. Dodson
R3,113 Discovery Miles 31 130 Ships in 18 - 22 working days

This book focuses on the application and development of information geometric methods in the analysis, classification and retrieval of images and signals. It provides introductory chapters to help those new to information geometry and applies the theory to several applications. This area has developed rapidly over recent years, propelled by the major theoretical developments in information geometry, efficient data and image acquisition and the desire to process and interpret large databases of digital information. The book addresses both the transfer of methodology to practitioners involved in database analysis and in its efficient computational implementation.

Hardware IP Security and Trust (Paperback, Softcover reprint of the original 1st ed. 2017): Prabhat Mishra, Swarup Bhunia, Mark... Hardware IP Security and Trust (Paperback, Softcover reprint of the original 1st ed. 2017)
Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor
R2,673 Discovery Miles 26 730 Ships in 18 - 22 working days

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

Information Theory and Coding - Solved Problems (Paperback, Softcover reprint of the original 1st ed. 2017): Predrag Ivanis,... Information Theory and Coding - Solved Problems (Paperback, Softcover reprint of the original 1st ed. 2017)
Predrag Ivanis, Dusan Drajic
R3,395 Discovery Miles 33 950 Ships in 18 - 22 working days

This book is offers a comprehensive overview of information theory and error control coding, using a different approach then in existed literature. The chapters are organized according to the Shannon system model, where one block affects the others. A relatively brief theoretical introduction is provided at the beginning of every chapter, including a few additional examples and explanations, but without any proofs. And a short overview of some aspects of abstract algebra is given at the end of the corresponding chapters. The characteristic complex examples with a lot of illustrations and tables are chosen to provide detailed insights into the nature of the problem. Some limiting cases are presented to illustrate the connections with the theoretical bounds. The numerical values are carefully selected to provide in-depth explanations of the described algorithms. Although the examples in the different chapters can be considered separately, they are mutually connected and the conclusions for one considered problem relate to the others in the book.

Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018,... Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings (Paperback, 1st ed. 2018)
Dario Catalano, Roberto De Prisco
R1,490 Discovery Miles 14 900 Ships in 18 - 22 working days

This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.The 30 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on signatures and watermarking; composability; encryption; multiparty computation; anonymity and zero knowledge; secret sharing and oblivious transfer; lattices and post quantum cryptography; obfuscation; two-party computation; and protocols.

Service-Oriented Computing - ICSOC 2017 Workshops - ASOCA, ISyCC, WESOACS, and Satellite Events, Malaga, Spain, November 13-16,... Service-Oriented Computing - ICSOC 2017 Workshops - ASOCA, ISyCC, WESOACS, and Satellite Events, Malaga, Spain, November 13-16, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Lars Braubach, Juan M. Murillo, Nima Kaviani, Manuel Lama, Loli Burgueno, …
R1,442 Discovery Miles 14 420 Ships in 18 - 22 working days

This book constitutes the revised selected papers of the scientific satellite events that were held in conjunction with the 15th International Conference on Service-Oriented Computing, ICSOC 2017, held in Malaga, Spain, in November 2017. The ICSOC 2017 workshop track consisted of three workshops on a wide range of topics that fall into the general area of service computing: ASOCA 2017: The Second Workshop on Adaptive Service-Oriented and Cloud Applications ISyCC 2016: The Second Workshop on IoT Systems Provisioning and Management in Cloud Computing WESOACS 2017: The 13th International Workshop on Engineering Service-Oriented Applications and Cloud Services

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Construction and Analysis of…
Lilya Budaghyan Hardcover R3,268 Discovery Miles 32 680
Blockchain Applications
Arshdeep Bagha Hardcover R1,870 R1,522 Discovery Miles 15 220
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970

 

Partners