0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (86)
  • R500+ (1,946)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Communication Networks for Smart Grids - Making Smart Grid Real (Paperback, Softcover reprint of the original 1st ed. 2014):... Communication Networks for Smart Grids - Making Smart Grid Real (Paperback, Softcover reprint of the original 1st ed. 2014)
Kenneth C. Budka, Jayant G. Deshpande, Marina Thottan
R2,952 Discovery Miles 29 520 Ships in 10 - 15 working days

This book presents an application-centric approach to the development of smart grid communication architecture. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response and synchrophasors. Features: examines a range of exciting utility applications made possible through smart grid evolution; describes the core-edge network architecture for smart grids, introducing the concept of WANs and FANs; explains how the network design paradigm for smart grids differs from that for more established data networks, and discusses network security in smart grids; provides an overview of communication network technologies for WANs and FANs, covering OPGW, PLC, and LTE and MPLS technology; investigates secure data-centric data management and data analytics for smart grids; discusses the transformation of a network from conventional modes of utility operation to an integrated network based on the smart grid architecture framework.

Handbook on Ontologies (Paperback, Softcover reprint of the original 2nd ed. 2009): Steffen Staab, Rudi Studer Handbook on Ontologies (Paperback, Softcover reprint of the original 2nd ed. 2009)
Steffen Staab, Rudi Studer
R11,388 Discovery Miles 113 880 Ships in 10 - 15 working days

An ontology is a formal description of concepts and relationships that can exist for a community of human and/or machine agents. The notion of ontologies is crucial for the purpose of enabling knowledge sharing and reuse. The Handbook on Ontologies provides a comprehensive overview of the current status and future prospectives of the field of ontologies considering ontology languages, ontology engineering methods, example ontologies, infrastructures and technologies for ontologies, and how to bring this all into ontology-based infrastructures and applications that are among the best of their kind. The field of ontologies has tremendously developed and grown in the five years since the first edition of the "Handbook on Ontologies". Therefore, its revision includes 21 completely new chapters as well as a major re-working of 15 chapters transferred to this second edition.

Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19,... Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings (Paperback, 1st ed. 2016)
Benedikt Gierlichs, Axel Y. Poschmann
R3,376 Discovery Miles 33 760 Ships in 10 - 15 working days

This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.

Elements of Cloud Computing Security - A Survey of Key Practicalities (Paperback, 1st ed. 2016): Mohammed M. Alani Elements of Cloud Computing Security - A Survey of Key Practicalities (Paperback, 1st ed. 2016)
Mohammed M. Alani
R1,665 Discovery Miles 16 650 Ships in 10 - 15 working days

This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.

Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15,... Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Francois-Xavier Standaert, Elisabeth Oswald
R2,136 Discovery Miles 21 360 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. The 12 papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named: security and physical attacks; side-channel analysis (case studies); fault analysis; and side-channel analysis (tools).

Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers... Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Thomas Peyrin
R4,310 Discovery Miles 43 100 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis.

Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006): John R Vacca Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006)
John R Vacca
R4,580 Discovery Miles 45 800 Ships in 10 - 15 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense (Paperback, Softcover reprint... Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense (Paperback, Softcover reprint of the original 1st ed. 2015)
Kristin E. Heckman, Frank J Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
R5,077 Discovery Miles 50 770 Ships in 10 - 15 working days

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization's mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book.

Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications (Paperback, Softcover reprint of the... Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications (Paperback, Softcover reprint of the original 2nd ed. 2015)
Feng Liu, Weiqi Yan
R1,998 Discovery Miles 19 980 Ships in 10 - 15 working days

This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with new content on braille and 2D barcode authentication of visual cryptography shares. Features: contains review exercises at the end of each chapter, as well as a helpful glossary; examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems; reviews a range of VCSs, including XOR-based visual cryptography and security enriched VCS; describes different methods for presenting color content using visual cryptographic techniques; covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS.

Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on... Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings (Paperback, 1st ed. 2017)
Matteo Maffei, Mark Ryan
R2,434 Discovery Miles 24 340 Ships in 10 - 15 working days

This book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017. The 14 papers presented in this volume were carefully reviewed and selected from 40 submissions. They were organized in topical sections named: information flow; security protocols; security policies; and information leakage.

Digital Watermarking Techniques in Curvelet and Ridgelet Domain (Paperback, 1st ed. 2016): Channapragada Rama Seshagiri Rao,... Digital Watermarking Techniques in Curvelet and Ridgelet Domain (Paperback, 1st ed. 2016)
Channapragada Rama Seshagiri Rao, Munaga V. N. K. Prasad
R1,791 Discovery Miles 17 910 Ships in 10 - 15 working days

This book describes the design, development, and testing of a novel digital watermarking technique for color images using Magic Square and Ridgelet transforms. The novel feature of the method is that it generates and uses multiple copies of the digital watermark. The book describes how the method was tested for embedding digital watermarks into color cover images, resulting in very high PSNR value and yielding comparable results with existing watermarking techniques.To reach this new method, eight different techniques are designed, developed and tested. First, the authors test two digital watermarking techniques based on encryption: Image Watermark Using Complete Complementary Code Technique (CCCT) and Image Watermarking Using CCC-Fast Walsh Hadamard Transform Technique (CCC-FWHTT). Next, four digital watermarking techniques based on curvelet transforms are discussed: Image Watermarking Using Curvelet Transform (WCT), Watermark Wavelets in Curvelets of Cover Image (WWCT), Resized Watermark into Curvelets of Cover Image (RWCT), and Resized Watermark Wavelets into Curvelets of Cover Image (RWWCT). Then, two final techniques are presented: Image Watermarking Based on Magic Square (MST) and Image watermarking based on Magic Square and Ridgelet Transform (MSRTT). Future research directions are explored in the final chapter.Designed for professionals and researchers in computer graphics and imaging, Digital Watermarking Techniques in Curvelet and Ridgelet Domain is also a useful tool for advanced-level students.

Intelligent Mobile Malware Detection (Hardcover): Tony Thomas, Teenu John, Mamoun Alazab, Roopak Surendran Intelligent Mobile Malware Detection (Hardcover)
Tony Thomas, Teenu John, Mamoun Alazab, Roopak Surendran
R2,372 Discovery Miles 23 720 Ships in 12 - 19 working days

Unique selling point: * This book proposes several approaches for dynamic Android malware detection based on system calls which do not have the limitations of existing mechanisms. * This book will be useful for researchers, students, developers and security analysts to know how malware behavior represented in the form of system call graphs can effectively detect Android malware. * The malware detection mechanisms in this book can be integrated with commercial antivirus softwares to detect Android malware including obfuscated variants.

Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Marc Fischlin, Jean-Sebastien Coron
R3,060 Discovery Miles 30 600 Ships in 10 - 15 working days

The two-volume proceedings LNCS 9665 + 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowledge; pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leakage; in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.

Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA,... Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings (Paperback, 1st ed. 2016)
Kazue Sako
R2,847 Discovery Miles 28 470 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016. The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.

An Introduction to Mathematical Cryptography (Paperback, Softcover reprint of the original 2nd ed. 2014): Jeffrey Hoffstein,... An Introduction to Mathematical Cryptography (Paperback, Softcover reprint of the original 2nd ed. 2014)
Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
R3,926 Discovery Miles 39 260 Ships in 10 - 15 working days

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: classical cryptographic constructions, such as Diffie-Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; an in-depth treatment of important cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. The second edition of An Introduction to Mathematical Cryptography includes a significant revision of the material on digital signatures, including an earlier introduction to RSA, Elgamal, and DSA signatures, and new material on lattice-based signatures and rejection sampling. Many sections have been rewritten or expanded for clarity, especially in the chapters on information theory, elliptic curves, and lattices, and the chapter of additional topics has been expanded to include sections on digital cash and homomorphic encryption. Numerous new exercises have been included.

Chaos-based Cryptography - Theory, Algorithms and Applications (Paperback, Softcover reprint of the original 1st ed. 2011):... Chaos-based Cryptography - Theory, Algorithms and Applications (Paperback, Softcover reprint of the original 1st ed. 2011)
Ljupco Kocarev, Shiguo Lian
R4,424 Discovery Miles 44 240 Ships in 10 - 15 working days

Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.

Dynamic Secrets in Communication Security (Paperback, Softcover reprint of the original 1st ed. 2014): Sheng Xiao, Weibo Gong,... Dynamic Secrets in Communication Security (Paperback, Softcover reprint of the original 1st ed. 2014)
Sheng Xiao, Weibo Gong, Don Towsley
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user's password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.

Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016): Byung-gyu Kim, Kalyan Goswami Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016)
Byung-gyu Kim, Kalyan Goswami
R1,733 Discovery Miles 17 330 Ships in 10 - 15 working days

This book discusses in detail the basic algorithms of video compression that are widely used in modern video codec. The authors dissect complicated specifications and present material in a way that gets readers quickly up to speed by describing video compression algorithms succinctly, without going to the mathematical details and technical specifications. For accelerated learning, hybrid codec structure, inter- and intra- prediction techniques in MPEG-4, H.264/AVC, and HEVC are discussed together. In addition, the latest research in the fast encoder design for the HEVC and H.264/AVC is also included.

Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers... Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Gregor Leander
R3,226 Discovery Miles 32 260 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementation issues; more block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes; proofs; design; lightweight; cryptanalysis of hash functions and stream ciphers; and mass surveillance.

Security and Privacy in Biometrics (Paperback, Softcover reprint of the original 1st ed. 2013): Patrizio Campisi Security and Privacy in Biometrics (Paperback, Softcover reprint of the original 1st ed. 2013)
Patrizio Campisi
R2,918 Discovery Miles 29 180 Ships in 10 - 15 working days

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardization; describes real-world applications, from face and fingerprint-based user recognition, to biometrics-based electronic documents, and biometric systems employing smart cards; reviews the ethical implications of the ubiquity of biometrics in everyday life, and its impact on human dignity; provides guidance on best practices for the processing of biometric data within a legal framework.

Evolution of Semantic Systems (Paperback, 2013 ed.): Bernd-Olaf Kuppers, Udo Hahn, Stefan Artmann Evolution of Semantic Systems (Paperback, 2013 ed.)
Bernd-Olaf Kuppers, Udo Hahn, Stefan Artmann
R3,522 Discovery Miles 35 220 Ships in 10 - 15 working days

Complex systems in nature and society make use of information for the development of their internal organization and the control of their functional mechanisms. Alongside technical aspects of storing, transmitting and processing information, the various semantic aspects of information, such as meaning, sense, reference and function, play a decisive part in the analysis of such systems. With the aim of fostering a better understanding of semantic systems from an evolutionary and multidisciplinary perspective, this volume collects contributions by philosophers and natural scientists, linguists, information and computer scientists. They do not follow a single research paradigm; rather they shed, in a complementary way, new light upon some of the most important aspects of the evolution of semantic systems. Evolution of Semantic Systems is intended for researchers in philosophy, computer science, and the natural sciences who work on the analysis or development of semantic systems, ontologies, or similar complex information structures. In the eleven chapters, they will find a broad discussion of topics ranging from underlying universal principles to representation and processing aspects to paradigmatic examples.

Introduction to the Theory of Quantum Information Processing (Paperback, 2013 ed.): Janos A. Bergou, Mark Hillery Introduction to the Theory of Quantum Information Processing (Paperback, 2013 ed.)
Janos A. Bergou, Mark Hillery
R2,432 Discovery Miles 24 320 Ships in 10 - 15 working days

Introduction to the Theory of Quantum Information Processing provides the material for a one-semester graduate level course on quantum information theory and quantum computing for students who have had a one-year graduate course in quantum mechanics. Many standard subjects are treated, such as density matrices, entanglement, quantum maps, quantum cryptography, and quantum codes. Also included are discussions of quantum machines and quantum walks. In addition, the book provides detailed treatments of several underlying fundamental principles of quantum theory, such as quantum measurements, the no-cloning and no-signaling theorems, and their consequences. Problems of various levels of difficulty supplement the text, with the most challenging problems bringing the reader to the forefront of active research. This book provides a compact introduction to the fascinating and rapidly evolving interdisciplinary field of quantum information theory, and it prepares the reader for doing active research in this area.

Transactions on Data Hiding and Multimedia Security X (Paperback, 2015 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security X (Paperback, 2015 ed.)
Yun Q. Shi
R1,568 Discovery Miles 15 680 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The six papers included in this issue deal with watermarking security, perceptual image hashing, infrared hiding, steganography and steganalysis.

Scalable Information Systems - 5th International Conference, INFOSCALE 2014, Seoul, South Korea, September 25-26, 2014, Revised... Scalable Information Systems - 5th International Conference, INFOSCALE 2014, Seoul, South Korea, September 25-26, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Jason J. Jung, Costin Badica, Attila Kiss
R1,568 Discovery Miles 15 680 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Scalable Information Systems, INFOSCALE 2014, held in September 2014 in Seoul, South Korea. The 9 revised full papers presented were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics such as scalable data analysis and big data applications.

Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers... Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Carlos Cid, Christian Rechberger
R1,625 Discovery Miles 16 250 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theory; stream ciphers; hash functions; advanced constructions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bitcoin - Guide Book for Beginners
Keizer Soeze Hardcover R1,151 R967 Discovery Miles 9 670
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,551 Discovery Miles 25 510
Ransomware Revolution: The Rise of a…
Matthew Ryan Hardcover R5,086 Discovery Miles 50 860
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,221 Discovery Miles 12 210
Introduction to Bitcoin
David Ricardo Hardcover R799 Discovery Miles 7 990
Blockchain - Novice to Expert - 2…
Keizer Soeze Hardcover R1,081 R913 Discovery Miles 9 130
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730
Bitcoin and Cryptocurrency Technologies…
Keizer Soeze Hardcover R1,968 R1,611 Discovery Miles 16 110
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190

 

Partners