0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (86)
  • R500+ (1,899)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Digital-Forensics and Watermarking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012,... Digital-Forensics and Watermarking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Yun Q. Shi, Fernando Perez-Gonzalez, Hyoung Joong Kim
R2,830 Discovery Miles 28 300 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.

Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November... Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings (Paperback, 2013 ed.)
Kazuo Sakiyama, Masayuki Terada
R1,418 Discovery Miles 14 180 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in Okinawa, Japan, in November 2013. The 20 revised selected papers presented in this volume were carefully reviewed and selected from 63 submissions. They are organized in topical sections named: software and system security, cryptanalysis, privacy and cloud computing, public key cryptosystems, and security protocols.

Dynamics of Information Systems - Theory and Applications (Paperback, 2010 ed.): Michael Hirsch, Panos M. Pardalos, Robert... Dynamics of Information Systems - Theory and Applications (Paperback, 2010 ed.)
Michael Hirsch, Panos M. Pardalos, Robert Murphey
R3,810 Discovery Miles 38 100 Ships in 18 - 22 working days

Our understanding of information and information dynamics has outgrown classical information theory. The theory does not account for the value or influence of information within the context of a system or network and does not explain how these properties might influence how information flows though and interacts with a system. The invited chapters in this collection present new theories, methods, and applications that address some of these limitations.

Dynamics of Information Systems presents state-of-the-art research explaining the importance of information in the evolution of a distributed or networked system. This book presents techniques for measuring the value or significance of information within the context of a system. Each chapter reveals a unique topic or perspective from experts in this exciting area of research.

These newly developed techniques have numerous applications including: the detection of terrorist networks, the design of highly functioning businesses and computer systems, modeling the distributed sensory and control physiology of animals, quantum entanglement and genome modeling, multi-robotic systems design, as well as industrial and manufacturing safety.

Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised... Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Andrew A. Adams, Michael Brenner, Matthew Smith
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan. The 16 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WAHC workshop was to bring together professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, secure function evaluation, private information retrieval or searchable encryption to present, discuss, and share the latest findings in the field, and to exchange ideas that address real-world problems with practical solutions using homomorphic cryptography.

Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012.... Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings (Paperback, 2012 ed.)
Willy Susilo, Yi Mu, Jennifer Seberry
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.

Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013,... Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Emmanuel Prouff
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013. The 13 revised full papers presented together with two invited talks were carefully selected from 39 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.

Sensor Networks - Where Theory Meets Practice (Paperback, 2009 ed.): Gianluigi Ferrari Sensor Networks - Where Theory Meets Practice (Paperback, 2009 ed.)
Gianluigi Ferrari
R4,042 Discovery Miles 40 420 Ships in 18 - 22 working days

The idea of this book comes from the observation that sensor networks represent a topic of interest from both theoretical and practical perspectives. The title und- lines that sensor networks offer the unique opportunity of clearly linking theory with practice. In fact, owing to their typical low-cost, academic researchers have the opportunity of implementing sensor network testbeds to check the validity of their theories, algorithms, protocols, etc., in reality. Likewise, a practitioner has the opportunity of understanding what are the principles behind the sensor networks under use and, thus, how to properly tune some accessible network parameters to improve the performance. On the basis of the observations above, the book has been structured in three parts: PartIisdenotedas"Theory,"sincethetopicsofits vechaptersareapparently "detached" from real scenarios; Part II is denoted as "Theory and Practice," since the topics of its three chapters, altough theoretical, have a clear connection with speci c practical scenarios; Part III is denoted as "Practice," since the topics of its ve chapters are clearly related to practical applications.

Cryptographic Hardware and Embedded Systems -- CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23,... Cryptographic Hardware and Embedded Systems -- CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings (Paperback, 2013 ed.)
Guido Marco Bertoni, Jean-Sebastien Coron
R1,464 Discovery Miles 14 640 Ships in 18 - 22 working days

This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.

iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April... iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers (Paperback, 2010 ed.)
Jan Camenisch, Dogan Kesdogan
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand

The LLL Algorithm - Survey and Applications (Paperback, 2010 ed.): Phong Q. Nguyen, Brigitte Vallee The LLL Algorithm - Survey and Applications (Paperback, 2010 ed.)
Phong Q. Nguyen, Brigitte Vallee
R5,881 Discovery Miles 58 810 Ships in 18 - 22 working days

Computational aspects of geometry of numbers have been revolutionized by the Lenstra-Lenstra-Lovasz ' lattice reduction algorithm (LLL), which has led to bre- throughs in elds as diverse as computer algebra, cryptology, and algorithmic number theory. After its publication in 1982, LLL was immediately recognized as one of the most important algorithmic achievements of the twentieth century, because of its broad applicability and apparent simplicity. Its popularity has kept growing since, as testi ed by the hundreds of citations of the original article, and the ever more frequent use of LLL as a synonym to lattice reduction. As an unfortunate consequence of the pervasiveness of the LLL algorithm, researchers studying and applying it belong to diverse scienti c communities, and seldom meet. While discussing that particular issue with Damien Stehle ' at the 7th Algorithmic Number Theory Symposium (ANTS VII) held in Berlin in July 2006, John Cremona accuratelyremarkedthat 2007would be the 25th anniversaryof LLL and this deserveda meetingto celebrate that event. The year 2007was also involved in another arithmetical story. In 2003 and 2005, Ali Akhavi, Fabien Laguillaumie, and Brigitte Vallee ' with other colleagues organized two workshops on cryptology and algorithms with a strong emphasis on lattice reduction: CAEN '03 and CAEN '05, CAEN denoting both the location and the content (Cryptologie et Algori- miqueEn Normandie). Veryquicklyafterthe ANTSconference,AliAkhavi,Fabien Laguillaumie, and Brigitte Vallee ' were thus readily contacted and reacted very enthusiastically about organizing the LLL birthday conference. The organization committee was formed.

Network Intrusion Detection and Prevention - Concepts and Techniques (Paperback, 2010 ed.): Ali A. Ghorbani, Wei Lu, Mahbod... Network Intrusion Detection and Prevention - Concepts and Techniques (Paperback, 2010 ed.)
Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee
R3,785 Discovery Miles 37 850 Ships in 18 - 22 working days

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones.

Network Intrusion Detection and Prevention: Concepts and Techniques is designed for researchers and practitioners in industry. This book is suitable for advanced-level students in computer science as a reference book as well.

Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings... Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Paperback, 2013 ed.)
Colin Boyd, Leonie Simpson
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing.

Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India,... Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012, Proceedings (Paperback, 2012)
Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz Calero, Tony Thomas
R1,472 Discovery Miles 14 720 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems.

Codes, Graphs, and Systems - A Celebration of the Life and Career of G. David Forney, Jr. on the Occasion of his Sixtieth... Codes, Graphs, and Systems - A Celebration of the Life and Career of G. David Forney, Jr. on the Occasion of his Sixtieth Birthday (Paperback, Softcover reprint of the original 1st ed. 2002)
Richard E Blahut, Ralf Koetter
R4,039 Discovery Miles 40 390 Ships in 18 - 22 working days

Foreword by James L. Massey. Codes, Graphs, and Systems is an excellent reference for both academic researchers and professional engineers working in the fields of communications and signal processing. A collection of contributions from world-renowned experts in coding theory, information theory, and signal processing, the book provides a broad perspective on contemporary research in these areas. Survey articles are also included. Specific topics covered include convolutional codes and turbo codes; detection and equalization; modems; physics and information theory; lattices and geometry; and behaviors and codes on graphs. Codes, Graphs, and Systems is a tribute to the leadership and profound influence of G. David Forney, Jr. The 35 contributors to the volume have assembled their work in his honor.

Cyber Situational Awareness - Issues and Research (Paperback, 2010 ed.): Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang Cyber Situational Awareness - Issues and Research (Paperback, 2010 ed.)
Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the core of Cyber Situational Awareness. Whether the last question can be satisfactorily answered is greatly de pendent upon the cyber situational awareness capability of an enterprise. A variety of computer and network security research topics (especially some sys tems security topics) belong to or touch the scope of Cyber Situational Awareness. However, the Cyber Situational Awareness capability of an enterprise is still very limited for several reasons: * Inaccurate and incomplete vulnerability analysis, intrusion detection, and foren sics. * Lack of capability to monitor certain microscopic system/attack behavior. * Limited capability to transform/fuse/distill information into cyber intelligence. * Limited capability to handle uncertainty. * Existing system designs are not very "friendly" to Cyber Situational Awareness.

Image Representation and Processing - A Recursive Approach (Paperback, Softcover reprint of the original 1st ed. 1993): V.V.... Image Representation and Processing - A Recursive Approach (Paperback, Softcover reprint of the original 1st ed. 1993)
V.V. Alexandrov, Gorsky.
R1,387 Discovery Miles 13 870 Ships in 18 - 22 working days

Recently, much attention has been paid to image processing with multiresolution and hierarchical structures such as pyramids and trees. This volume deals with recursive pyramids, which combine the advantages of available multiresolution structures and which are convenient both for global and local image processing. Recursive pyramids are based on regular hierarchical (recursive) structures containing data on image fragments of different sizes. Such an image representation technique enables the effective manipulation of pictorial information as well as the development of special hardware or data structures. The major aspects of this book are two original mathematical models of greyscale and binary images represented by recursive structures. Image compression, transmission and processing are discussed using these models. A number of applications are presented, including optical character recognition, expert systems and special computer architecture for pictorial data processing. The majority of results are presented as algorithms applicable to discrete information fields of arbitrary dimensions (e.g. 2-D or 3-D images). The book is divided into six chapters: Chapter 1 provides a brief introduction. Chapter 2 then deals with recursive structures and their properties. Chapter 3 introduces pyramidal image models. Image coding and the progressive transmission of images with gradual refinement are discussed in Chapter 4. Chapters 5 and 6 are devoted to image processing with pyramidal-recursive structures and applications. The volume concludes with a comprehensive bibliography. For applied mathematicians and computer scientists whose work involves computer vision, information theory and other aspects of image representation techniques.

Cryptography and Computational Number Theory (Paperback, Softcover reprint of the original 1st ed. 2001): Kwok Y. Lam, Igor... Cryptography and Computational Number Theory (Paperback, Softcover reprint of the original 1st ed. 2001)
Kwok Y. Lam, Igor Shparlinski, Huaxiong Wang, Chaoping Xing
R1,434 Discovery Miles 14 340 Ships in 18 - 22 working days

This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99, which has been held in Singapore during the week of November 22-26, 1999. The workshop was organized by the Centre for Systems Security of the Na tional University of Singapore. We gratefully acknowledge the financial support from the Singapore National Science and Technology Board under the grant num ber RP960668/M. The idea for this workshop grew out of the recognition of the recent, rapid development in various areas of cryptography and computational number the ory. The event followed the concept of the research programs at such well-known research institutions as the Newton Institute (UK), Oberwolfach and Dagstuhl (Germany), and Luminy (France). Accordingly, there were only invited lectures at the workshop with plenty of time for informal discussions. It was hoped and successfully achieved that the meeting would encourage and stimulate further research in information and computer security as well as in the design and implementation of number theoretic cryptosystems and other related areas. Another goal of the meeting was to stimulate collaboration and more active interaction between mathematicians, computer scientists, practical cryptographers and engineers in academia, industry and government."

Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012,... Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Miroslaw Kutylowski, Moti Yung
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.

Advances in Cryptology -- ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012, Proceedings (Paperback, 2012 ed.)
Xiaoyun Wang, Kazue Sako
R1,543 Discovery Miles 15 430 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.

Applications of Data Mining in Computer Security (Paperback, Softcover reprint of the original 1st ed. 2002): Daniel Barbara,... Applications of Data Mining in Computer Security (Paperback, Softcover reprint of the original 1st ed. 2002)
Daniel Barbara, Sushil Jajodia
R2,648 Discovery Miles 26 480 Ships in 18 - 22 working days

Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security. Applications Of Data Mining In Computer Security concentrates heavily on the use of data mining in the area of intrusion detection. The reason for this is twofold. First, the volume of data dealing with both network and host activity is so large that it makes it an ideal candidate for using data mining techniques. Second, intrusion detection is an extremely critical activity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence.

Multi-Carrier Digital Communications - Theory and Applications of OFDM (Paperback, Softcover reprint of the original 2nd ed.... Multi-Carrier Digital Communications - Theory and Applications of OFDM (Paperback, Softcover reprint of the original 2nd ed. 2004)
Ahmad R. S. Bahai, Burton R. Saltzberg, Mustafa Ergen
R2,917 Discovery Miles 29 170 Ships in 18 - 22 working days

ulti-carrier modulation' Orthogonal Frequency Division Multi- Mplexing (OFDM) particularly' has been successfully applied to a wide variety of digital communications applications over the past several years. Although OFDM has been chosen as the physical layer standard for a diversity of important systems' the theory' algorithms' and implementation techniques remain subjects of current interest. This is clear from the high volume of papers appearing in technical journals and conferences. Multi-carrier modulation continues to evolve rapidly. It is hoped that this book will remain a valuable summary of the technology' p- viding an understanding of new advances as well as the present core technology. The Intended Audience This book is intended to be a concise summary of the present state of the art of the theory and practice of OFDM technology. The authors believe that the time is ripe for such a treatment. Particularly based on one of the author's long experience in development of wireless systems (AB), and the other's in wireline systems (BS)' we have - tempted to present a unified presentation of OFDM performance and xviii implementation over a wide variety of channels. It is hoped that this will prove valuable both to developers of such systems and to researchers and graduate students involved in analysis of digital communications.

Agent-Based Models of Social Life - Fundamentals (Paperback): Michael Laver Agent-Based Models of Social Life - Fundamentals (Paperback)
Michael Laver
R589 Discovery Miles 5 890 Ships in 10 - 15 working days

Social interactions are rich, complex, and dynamic. One way to understand these is to model interactions that fascinate us. Some of the more realistic and powerful models are computer simulations. Simple, elegant and powerful, tools are available in user-friendly free software to help you design, build and run your own models of social interactions that intrigue you, and do this on the most basic laptop computer. Focusing on a well-known model of housing segregation, this Element is about how to unleash that power, setting out the fundamentals of what is now known as 'agent based modeling'.

Agent-Based Models of Polarization and Ethnocentrism (Paperback): Michael Laver Agent-Based Models of Polarization and Ethnocentrism (Paperback)
Michael Laver
R586 Discovery Miles 5 860 Ships in 10 - 15 working days

Building on the Cambridge Element Agent Based Models of Social Life: Fundamentals (Cambridge, 2020), we move on to the next level. We do this by building agent based models of polarization and ethnocentrism. In the process, we develop: stochastic models, which add a crucial element of uncertainty to human interaction; models of human interactions structured by social networks; and 'evolutionary' models in which agents using more effective decision rules are more likely to survive and prosper than others. The aim is to leave readers with an effective toolkit for building, running and analyzing agent based modes of social interaction.

Trusted Systems - 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings (Paperback, 2012):... Trusted Systems - 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings (Paperback, 2012)
Chris J. Mitchell, Allan Tomlinson
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully reviewed and selected from 19 submissions. The papers are organized in topical section on automated analysis, security and trust, mobile trust, security of distributed systems, evaluation and analysis, and embedded security.

Communications and Cryptography - Two Sides of One Tapestry (Paperback, Softcover reprint of the original 1st ed. 1994):... Communications and Cryptography - Two Sides of One Tapestry (Paperback, Softcover reprint of the original 1st ed. 1994)
Richard E Blahut, Daniel J. Costello Jr, Ueli Maurer, Thomas Mittelholzer
R5,233 Discovery Miles 52 330 Ships in 18 - 22 working days

Information theory is an exceptional field in many ways. Technically, it is one of the rare fields in which mathematical results and insights have led directly to significant engineering payoffs. Professionally, it is a field that has sustained a remarkable degree of community, collegiality and high standards. James L. Massey, whose work in the field is honored here, embodies the highest standards of the profession in his own career. The book covers the latest work on: block coding, convolutional coding, cryptography, and information theory. The 44 contributions represent a cross-section of the world's leading scholars, scientists and researchers in information theory and communication. The book is rounded off with an index and a bibliography of publications by James Massey.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Quantum Computing for High School…
Yuly Billig Hardcover R781 R680 Discovery Miles 6 800
Readings from CRYPTOLOGIA on the Enigma…
Brian J. Winkel, Cipher Deavors, … Hardcover R2,798 Discovery Miles 27 980
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Stream Ciphers and Number Theory, Volume…
Thomas W Cusick, Cunsheng Ding, … Hardcover R2,957 Discovery Miles 29 570
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Recent Advances in Multimedia Signal…
Mislav Grgic, Kresimir Delac, … Hardcover R4,131 Discovery Miles 41 310
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Algebraic Geometry Modeling In…
Edgar Martinez-Moro Hardcover R2,933 Discovery Miles 29 330

 

Partners