0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (86)
  • R500+ (1,899)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Coding Theory and Applications - 4th International Castle Meeting, Palmela Castle, Portugal, September 15-18, 2014 (Hardcover,... Coding Theory and Applications - 4th International Castle Meeting, Palmela Castle, Portugal, September 15-18, 2014 (Hardcover, 1st ed. 2015)
Raquel Pinto, Paula Rocha Malonek, Paolo Vettori
R2,731 Discovery Miles 27 310 Ships in 18 - 22 working days

The topics covered in this book, written by researchers at the forefront of their field, represent some of the most relevant research areas in modern coding theory: codes and combinatorial structures, algebraic geometric codes, group codes, quantum codes, convolutional codes, network coding and cryptography. The book includes a survey paper on the interconnections of coding theory with constrained systems, written by an invited speaker, as well as 37 cutting-edge research communications presented at the 4th International Castle Meeting on Coding Theory and Applications (4ICMCTA), held at the Castle of Palmela in September 2014. The event's scientific program consisted of four invited talks and 39 regular talks by authors from 24 different countries. This conference provided an ideal opportunity for communicating new results, exchanging ideas, strengthening international cooperation, and introducing young researchers into the coding theory community.

Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015): Juliane Kramer Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015)
Juliane Kramer
R3,193 Discovery Miles 31 930 Ships in 18 - 22 working days

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

Construction and Analysis of Cryptographic Functions (Hardcover, 2014 ed.): Lilya Budaghyan Construction and Analysis of Cryptographic Functions (Hardcover, 2014 ed.)
Lilya Budaghyan
R3,268 Discovery Miles 32 680 Ships in 10 - 15 working days

This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes equivalence relations for these functions and develops several new methods for construction of their infinite families. In addition, the book offers solutions to two longstanding open problems, including the problem on characterization of APN and AB functions via Boolean, and the problem on the relation between two classes of bent functions.

Algebraic Geometry Modeling In Information Theory (Hardcover): Edgar Martinez-Moro Algebraic Geometry Modeling In Information Theory (Hardcover)
Edgar Martinez-Moro
R2,933 Discovery Miles 29 330 Ships in 18 - 22 working days

Algebraic & geometry methods have constituted a basic background and tool for people working on classic block coding theory and cryptography. Nowadays, new paradigms on coding theory and cryptography have arisen such as: Network coding, S-Boxes, APN Functions, Steganography and decoding by linear programming. Again understanding the underlying procedure and symmetry of these topics needs a whole bunch of non trivial knowledge of algebra and geometry that will be used to both, evaluate those methods and search for new codes and cryptographic applications. This book shows those methods in a self-contained form.

Security, Privacy and Trust in Cloud Systems (Hardcover, 2014 ed.): Surya Nepal, Mukaddim Pathan Security, Privacy and Trust in Cloud Systems (Hardcover, 2014 ed.)
Surya Nepal, Mukaddim Pathan
R4,401 R3,596 Discovery Miles 35 960 Save R805 (18%) Ships in 10 - 15 working days

The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes
- Cloud security fundamentals and related technologies to-date, with a comprehensive
coverage of evolution, current landscape, and future roadmap.
- A smooth organization with introductory, advanced and specialist content, i.e. from basics
of security, privacy and trust in cloud systems, to advanced cartographic techniques,
case studies covering both social and technological aspects, and advanced platforms.
- Case studies written by professionals and/or industrial researchers.
- Inclusion of a section on Cloud security and eGovernance tutorial that can be used
for knowledge transfer and teaching purpose.
- Identification of open research issues to help practitioners and researchers.
The book is a timely topic for readers, including practicing engineers and
academics, in the domains related to the engineering, science, and art of building networks and
networked applications. Specifically, upon reading this book, audiences will perceive the following
benefits:
1. Learn the state-of-the-art in research and development on cloud security, privacy and
trust.
2. Obtain a future roadmap by learning open research issues.
3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems.

OFDM - Concepts for Future Communication Systems (Hardcover, 2011 Ed.): Hermann Rohling OFDM - Concepts for Future Communication Systems (Hardcover, 2011 Ed.)
Hermann Rohling
R2,674 Discovery Miles 26 740 Ships in 18 - 22 working days

(Preliminary): The Orthogonal Frequency Division Multiplexing (OFDM) digital transmission technique has several advantages in broadcast and mobile communications applications. The main objective of this book is to give a good insight into these efforts, and provide the reader with a comprehensive overview of the scientific progress which was achieved in the last decade. Besides topics of the physical layer, such as coding, modulation and non-linearities, a special emphasis is put on system aspects and concepts, in particular regarding cellular networks and using multiple antenna techniques. The work extensively addresses challenges of link adaptation, adaptive resource allocation and interference mitigation in such systems. Moreover, the domain of cross-layer design, i.e. the combination of physical layer aspects and issues of higher layers, are considered in detail. These results will facilitate and stimulate further innovation and development in the design of modern communication systems, based on the powerful OFDM transmission technique.

Recent Advances in Multimedia Signal Processing and Communications (Hardcover, 2010 ed.): Mislav Grgic, Kresimir Delac,... Recent Advances in Multimedia Signal Processing and Communications (Hardcover, 2010 ed.)
Mislav Grgic, Kresimir Delac, Mohammed Ghanbari
R4,131 Discovery Miles 41 310 Ships in 18 - 22 working days

The rapid increase in computing power and communication speed, coupled with computer storage facilities availability, has led to a new age of multimedia app- cations. Multimedia is practically everywhere and all around us we can feel its presence in almost all applications ranging from online video databases, IPTV, - teractive multimedia and more recently in multimedia based social interaction. These new growing applications require high-quality data storage, easy access to multimedia content and reliable delivery. Moving ever closer to commercial - ployment also aroused a higher awareness of security and intellectual property management issues. All the aforementioned requirements resulted in higher demands on various - eas of research (signal processing, image/video processing and analysis, com- nication protocols, content search, watermarking, etc.). This book covers the most prominent research issues in multimedia and is divided into four main sections: i) content based retrieval, ii) storage and remote access, iii) watermarking and co- right protection and iv) multimedia applications. Chapter 1 of the first section presents an analysis on how color is used and why is it crucial in nowadays multimedia applications. In chapter 2 the authors give an overview of the advances in video abstraction for fast content browsing, transm- sion, retrieval and skimming in large video databases and chapter 3 extends the discussion on video summarization even further. Content retrieval problem is tackled in chapter 4 by describing a novel method for producing meaningful s- ments suitable for MPEG-7 description based on binary partition trees (BPTs).

Critical Infrastructure Protection III - Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March... Critical Infrastructure Protection III - Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers (Hardcover, 2009 ed.)
Charles Palmer, Sujeet Shenoi
R2,676 Discovery Miles 26 760 Ships in 18 - 22 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection III, is the third volume in the annualseriesproducedbyIFIP WorkingGroup11.10onCriticalInfrastructure Protection, an active international community of scientists, engineers, prac- tioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at Dartmouth College, Hanover, New Hampshire, March 23-25, 2009. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure protection.

Cooperative Communications and Networking - Technologies and System Design (Hardcover, 2010 Ed.): Y -W Peter Hong, Wan-Jen... Cooperative Communications and Networking - Technologies and System Design (Hardcover, 2010 Ed.)
Y -W Peter Hong, Wan-Jen Huang, C.-C.Jay Kuo
R4,237 Discovery Miles 42 370 Ships in 18 - 22 working days

Cooperative and relay communications have recently become the most widely explored topics in communications, whereby users cooperate in transmitting their messages to the destination, instead of conventional networks which operate independently and compete among each other for channel resources. As the field has progressed, cooperative communications have become a design concept rather than a specific transmission technology. This concept has revolutionized the design of wireless networks, allowing increased coverage, throughput, and transmission reliability even as conventional transmission techniques gradually reach their limits. Cooperative and relay technologies have also made their way toward next generation wireless standards, such as IEEE802.16 (WiMAX) or LTE, and have been incorporated into many modern wireless applications, such as cognitive radio and secret communications.

"Cooperative Communications and Networking: Technologies and System Design" provides a systematic introduction to the fundamental concepts of cooperative communications and relays technology to enable engineers, researchers or graduate students to conduct advanced research and development in this area.

"Cooperative Communications and Networking: Technologies and System Design" provides researchers, graduate students, and practical engineers with sufficient knowledge of both the background of cooperative communications and networking, and potential research directions.

Handbook on Ontologies (Hardcover, 2nd ed. 2009): Steffen Staab, Rudi Studer Handbook on Ontologies (Hardcover, 2nd ed. 2009)
Steffen Staab, Rudi Studer
R9,859 Discovery Miles 98 590 Ships in 10 - 15 working days

An ontology is a formal description of concepts and relationships that can exist for a community of human and/or machine agents. The notion of ontologies is crucial for the purpose of enabling knowledge sharing and reuse. The Handbook on Ontologies provides a comprehensive overview of the current status and future prospectives of the field of ontologies considering ontology languages, ontology engineering methods, example ontologies, infrastructures and technologies for ontologies, and how to bring this all into ontology-based infrastructures and applications that are among the best of their kind. The field of ontologies has tremendously developed and grown in the five years since the first edition of the "Handbook on Ontologies." Therefore, its revision includes 21 completely new chapters as well as a major re-working of 15 chapters transferred to this second edition.

Bitcoin Takara - 1189 Bitcoin Wallets (Hardcover): Satoshi Nakamoto Bitcoin Takara - 1189 Bitcoin Wallets (Hardcover)
Satoshi Nakamoto
R3,748 R3,027 Discovery Miles 30 270 Save R721 (19%) Ships in 18 - 22 working days
Directed Information Measures in Neuroscience (Hardcover, 2014): Michael Wibral, Raul Vicente, Joseph T. Lizier Directed Information Measures in Neuroscience (Hardcover, 2014)
Michael Wibral, Raul Vicente, Joseph T. Lizier
R4,138 R3,337 Discovery Miles 33 370 Save R801 (19%) Ships in 10 - 15 working days

Analysis of information transfer has found rapid adoption in neuroscience, where a highly dynamic transfer of information continuously runs on top of the brain's slowly-changing anatomical connectivity. Measuring such transfer is crucial to understanding how flexible information routing and processing give rise to higher cognitive function. "Directed Information Measures in Neuroscience" reviews recent developments of concepts and tools for measuring information transfer, their application to neurophysiological recordings and analysis of interactions. Written by the most active researchers in the field the book discusses the state of the art, future prospects and challenges on the way to an efficient assessment of neuronal information transfer. Highlights include the theoretical quantification and practical estimation of information transfer, description of transfer locally in space and time, multivariate directed measures, information decomposition among a set of stimulus/responses variables and the relation between interventional and observational causality. Applications to neural data sets and pointers to open source software highlight the usefulness of these measures in experimental neuroscience. With state-of-the-art mathematical developments, computational techniques and applications to real data sets, this book will be of benefit to all graduate students and researchers interested in detecting and understanding the information transfer between components of complex systems.

Applications of Cryptography and Network Security (Hardcover): Stephen Mason Applications of Cryptography and Network Security (Hardcover)
Stephen Mason
R3,143 R2,846 Discovery Miles 28 460 Save R297 (9%) Ships in 18 - 22 working days
Computational Information Geometry - For Image and Signal Processing (Hardcover, 1st ed. 2017): Frank Nielsen, Frank Critchley,... Computational Information Geometry - For Image and Signal Processing (Hardcover, 1st ed. 2017)
Frank Nielsen, Frank Critchley, Christopher T. J. Dodson
R5,036 Discovery Miles 50 360 Ships in 10 - 15 working days

This book focuses on the application and development of information geometric methods in the analysis, classification and retrieval of images and signals. It provides introductory chapters to help those new to information geometry and applies the theory to several applications. This area has developed rapidly over recent years, propelled by the major theoretical developments in information geometry, efficient data and image acquisition and the desire to process and interpret large databases of digital information. The book addresses both the transfer of methodology to practitioners involved in database analysis and in its efficient computational implementation.

Identity-Based Encryption (Hardcover, 2011 ed.): Sanjit Chatterjee, Palash Sarkar Identity-Based Encryption (Hardcover, 2011 ed.)
Sanjit Chatterjee, Palash Sarkar
R2,652 Discovery Miles 26 520 Ships in 18 - 22 working days

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Probability, Random Processes, and Ergodic Properties (Hardcover, 2nd ed. 2009): Robert M. Gray Probability, Random Processes, and Ergodic Properties (Hardcover, 2nd ed. 2009)
Robert M. Gray
R4,383 Discovery Miles 43 830 Ships in 10 - 15 working days

Probability, Random Processes, and Ergodic Properties is for mathematically inclined information/communication theorists and people working in signal processing. It will also interest those working with random or stochastic processes, including mathematicians, statisticians, and economists.

Highlights:

Complete tour of book and guidelines for use given in Introduction, so readers can see at a glance the topics of interest.

Structures mathematics for an engineering audience, with emphasis on engineering applications.

New in the Second Edition:

Much of the material has been rearranged and revised for pedagogical reasons.

The original first chapter has been split in order to allow a more thorough treatment of basic probability before tackling random processes and dynamical systems.

The final chapter has been broken into two pieces to provide separate emphasis on process metrics and the ergodic decomposition of affine functionals.

Many classic inequalities are now incorporated into the text, along with proofs; and many citations have been added.

Innovations in Digital Watermarking Techniques (Hardcover, 2009 ed.): Feng-Hsing Wang Innovations in Digital Watermarking Techniques (Hardcover, 2009 ed.)
Feng-Hsing Wang
R2,755 Discovery Miles 27 550 Ships in 18 - 22 working days

Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions. This book is directed to students, professors, researchers and application engineers who are interested in the area of information security.

Privacy and Identity Management for Life - 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice,... Privacy and Identity Management for Life - 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers (Hardcover, 2010 ed.)
Michele Bezzi, Penny Duquenoy, Simone Fischer-Hubner, Marit Hansen, Ge Zhang
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies-andthepeopleresponsible for making decisions about them, designing, and implementing them-scarcely consider those requirements, thereby potentially putting individuals' privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may become hard for individuals to manage and control information that concerns them and particularly how to eliminate outdated or unwanted personal information, thus leavingpersonalhistoriesexposedpermanently. Theseactivitiesraisesubstantial new challenges for personal privacy at the technical, social, ethical, regulatory, and legal levels: How can privacy in emerging Internet applications such as c- laborative scenarios and virtual communities be protected? What frameworks and technical tools could be utilized to maintain life-long privacy? DuringSeptember3-10,2009, IFIP(InternationalFederationforInformation Processing)workinggroups9. 2 (Social Accountability),9. 6/11. 7(IT Misuseand theLaw),11. 4(NetworkSecurity)and11. 6(IdentityManagement)heldtheir5th InternationalSummerSchoolincooperationwiththeEUFP7integratedproject PrimeLife in Sophia Antipolis and Nice, France. The focus of the event was on privacy and identity managementfor emerging Internet applications throughout a person's lifetime. The aim of the IFIP Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity management and to build up collegial relationships with others. As such, the Summer Schools havebeen introducing participants to the social implications of information technology through the process of informed discussion.

Turbo-like Codes - Design for High Speed Decoding (Hardcover, 2007 ed.): Aliazam Abbasfar Turbo-like Codes - Design for High Speed Decoding (Hardcover, 2007 ed.)
Aliazam Abbasfar
R2,703 Discovery Miles 27 030 Ships in 18 - 22 working days

Turbo-like Codes introduces turbo error correcting concept in a simple language, including a general theory and the algorithms for decoding turbo-like code. It presents a unified framework for the design and analysis of turbo codes and LDPC codes and their decoding algorithms. A major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several hundred million bits per second (Mbps). In this book a novel high-speed turbo decoder is presented that exploits parallelization. Parallelism is achieved very efficiently by exploiting the flexibility of message-passing algorithm. It has been shown that very large speed gains can be achieved by this scheme while the efficiency is maintained reasonably high. Memory access, which poses a practical problem for the proposed parallel turbo decoder, is solved by introducing the conflict-free interleaver. The latency is further improved by designing a special kind of conflict-free interleaver. Furthermore, an algorithm to design such interleaver is presented. It is shown that the performance of turbo code is not sacrificed by using the interleaver with the proposed structure.

Alice and Bob Learn Application Security (Paperback): T Janca Alice and Bob Learn Application Security (Paperback)
T Janca
R1,116 R918 Discovery Miles 9 180 Save R198 (18%) Ships in 9 - 17 working days

Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects. Topics include: Secure requirements, design, coding, and deployment Security Testing (all forms) Common Pitfalls Application Security Programs Securing Modern Applications Software Developer Security Hygiene Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs. Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within.

Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information... Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information Systems, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
David Avison, George M. Kasper, Barbara Pernici, Isabel Ramos, Dewald Roode
R2,774 Discovery Miles 27 740 Ships in 18 - 22 working days

Introduction The International Federation for Information Processing (IFIP) is a non-profit umbrella organization for national societies working in the field of information processing. It was founded in 1960 under the auspices of UNESCO. It is organized into several technical c- mittees. This book represents the proceedings of the 2008 conference of technical committee 8 (TC8), which covers the field of infor- tion systems. TC8 aims to promote and encourage the advancement of research and practice of concepts, methods, techniques and issues related to information systems in organisations. TC8 has established eight working groups covering the following areas: design and evaluation of information systems; the interaction of information systems and the organization; decision support systems; e-business information systems: multi-disciplinary research and practice; inf- mation systems in public administration; smart cards, technology, applications and methods; and enterprise information systems. Further details of the technical committee and its working groups can be found on our website (ifiptc8. dsi. uminho. pt). This conference was part of IFIP's World Computer Congress in Milan, Italy which took place 7-10 September 2008. The occasion celebrated the 32nd anniversary of IFIP TC8. The call for papers invited researchers, educators, and practitioners to submit papers and panel proposals that advance concepts, methods, techniques, tools, issues, education, and practice of information systems in organi- tions. Thirty one submissions were received.

Privacy and Identity Management for Life - 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School,... Privacy and Identity Management for Life - 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers (Hardcover, Edition.)
Simone Fischer-Hubner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.

The Multimedia Internet (Hardcover, 1st ed. 2005. Corr. 2nd printing 2006): Stephen Weinstein The Multimedia Internet (Hardcover, 1st ed. 2005. Corr. 2nd printing 2006)
Stephen Weinstein
R2,866 Discovery Miles 28 660 Ships in 18 - 22 working days

Here is a thorough, not-overly-complex introduction to the three technical foundations for multimedia applications across the Internet: communications (principles, technologies and networking); compressive encoding of digital media; and Internet protocol and services. All the contributing systems elements are explained through descriptive text and numerous illustrative figures; the result is a book well-suited toward non-specialists, preferably with technical background, who need well-composed tutorial introductions to the three foundation areas. The text discusses the latest advances in digital audio and video encoding, optical and wireless communications technologies, high-speed access networks, and IP-based media streaming, all crucial enablers of the multimedia Internet.

Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New): Atilla Elci, Josef Pieprzyk,... Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New)
Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang, …
R5,047 Discovery Miles 50 470 Ships in 18 - 22 working days

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

VLSI-SoC: Design Methodologies for SoC and SiP - 16th IFIP WG 10.5/IEEE International Conference on Very Large Scale... VLSI-SoC: Design Methodologies for SoC and SiP - 16th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2008, Rhodes Island, Greece, October 13-15, 2008, Revised Selected Papers (Hardcover, Edition.)
Christian Piguet, Ricardo Reis, Dimitrios Soudris
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

This book contains extended and revised versions of the best papers that were p- sented during the 16th edition of the IFIP/IEEE WG10.5 International Conference on Very Large Scale Integration, a global System-on-a-Chip Design & CAD conference. The 16th conference was held at the Grand Hotel of Rhodes Island, Greece (October 13-15, 2008). Previous conferences have taken place in Edinburgh, Trondheim, V- couver, Munich, Grenoble, Tokyo, Gramado, Lisbon, Montpellier, Darmstadt, Perth, Nice and Atlanta. VLSI-SoC 2008 was the 16th in a series of international conferences sponsored by IFIP TC 10 Working Group 10.5 and IEEE CEDA that explores the state of the art and the new developments in the field of VLSI systems and their designs. The purpose of the conference was to provide a forum to exchange ideas and to present industrial and research results in the fields of VLSI/ULSI systems, embedded systems and - croelectronic design and test.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Into The Uncut Grass
Trevor Noah Hardcover  (1)
R299 R271 Discovery Miles 2 710
Prey Zone
Wilbur Smith, Keith Chapman, … Paperback  (1)
R230 R209 Discovery Miles 2 090
Beginning Oracle Programming
Sean Dillon, Christopher Beck, … Paperback R1,480 R1,284 Discovery Miles 12 840
The World Of David Walliams - The…
David Walliams Paperback R814 Discovery Miles 8 140
Forecasting Oracle Performance
Craig Shallahamer Hardcover R1,345 Discovery Miles 13 450
Asterix And The Chieftain's Daughter
Jean-Yves Ferri Paperback  (1)
R250 R223 Discovery Miles 2 230
Sunrise On The Reaping - A Hunger Games…
Suzanne Collins Hardcover R652 R537 Discovery Miles 5 370
Oracle SQL By Example
Alice Rischert Paperback  (1)
R1,404 Discovery Miles 14 040
The CIO's Guide to Oracle Products and…
Jessica Keyes Hardcover R1,871 Discovery Miles 18 710
Children Of The Stone City
Beverley Naidoo Paperback R240 R214 Discovery Miles 2 140

 

Partners