0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (86)
  • R500+ (1,946)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings (Paperback, 2013):... Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings (Paperback, 2013)
Roderick Bloem, Peter Lipp
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013. The revised full papers focus on the theory, technologies and applications of trusted systems. They cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.

Trustworthy Global Computing - 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised... Trustworthy Global Computing - 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Catuscia Palamidessi, Mark D. Ryan
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on Trustworthy Global Computing, TGC 2012, held in Newcastle upon Tyne, UK, in September 2012. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics in the area of global computing and reliable computation in the so-called global computers, i.e., those computational abstractions emerging in large-scale infrastructures such as service-oriented architectures, autonomic systems and cloud computing, providing frameworks, tools, algorithms and protocols for designing open-ended, large-scale applications and for reasoning about their behavior and properties in a rigorous way.

Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October... Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings (Paperback, 2013 ed.)
Benedikt Gierlichs, Sylvain Guilley, Debdeep Mukhopadhyay
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based identification schemes, and signatures.

Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings (Paperback,... Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings (Paperback, 2013 ed.)
Willy Susilo, Reza Reyhanitabar
R1,540 Discovery Miles 15 400 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.

Transactions on Data Hiding and Multimedia Security IX - Special Issue on Visual Cryptography (Paperback, 2014 ed.): Yun Q.... Transactions on Data Hiding and Multimedia Security IX - Special Issue on Visual Cryptography (Paperback, 2014 ed.)
Yun Q. Shi, Feng Liu, Weiqi Yan
R1,883 Discovery Miles 18 830 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The seven papers included in this special issue were carefully reviewed and selected from 21 submissions. They address the challenges faced by the emerging area of visual cryptography and provide the readers with an overview of the state of the art in this field of research.

Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings... Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings (Paperback, 2013 ed.)
Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013.

The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.

Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.): Xinxin Liu, Xiaolin Li Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.)
Xinxin Liu, Xiaolin Li
R1,722 Discovery Miles 17 220 Ships in 10 - 15 working days

This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.

Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013,... Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings (Paperback, 2013 ed.)
Sihan Qing, Jianying Zhou, Dongmei Liu
R1,560 Discovery Miles 15 600 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications.

Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29,... Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers (Paperback, 2014 ed.)
Aurelien Francillon, Pankaj Rohatgi
R2,285 Discovery Miles 22 850 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Card Research and Advanced Applications, CARDIS 2013, held in Berlin, Germany, in November 2013. The 17 revised full papers presented in this book were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on security technologies; attacks on masking; side channel attacks; software and protocol analysis; side channel countermeasures; and side channel and fault attacks.

Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September... Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013, Proceedings (Paperback, 2013 ed.)
Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Li Da Xu
R1,576 Discovery Miles 15 760 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.

Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September... Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings (Paperback, 2013 ed.)
Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security and authentication.

Computer Security -- ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013,... Computer Security -- ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings (Paperback, 2013 ed.)
Jason Crampton, Sushil Jajodia, Keith Mayes
R1,673 Discovery Miles 16 730 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.

The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.

Lightweight Cryptography for Security and Privacy - 2nd International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013,... Lightweight Cryptography for Security and Privacy - 2nd International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Gildas Avoine, Orhun Kara
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in Gebze, Turkey, during May 6-7, 2013. The 10 full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are grouped in topical sections on efficient Implementations and designs, block cipher cryptanalysis, wireless sensor networks, and cryptographic protocols.

Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014.... Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings (Paperback, 2014 ed.)
Jan Jurjens, Frank Piessens, Nataliia Bielova
R2,193 Discovery Miles 21 930 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.

Forward Error Correction Based On Algebraic-Geometric Theory (Paperback, 2014 ed.): Jafar A. Alzubi, Omar A. Alzubi, Thomas M.... Forward Error Correction Based On Algebraic-Geometric Theory (Paperback, 2014 ed.)
Jafar A. Alzubi, Omar A. Alzubi, Thomas M. Chen
R1,711 Discovery Miles 17 110 Ships in 10 - 15 working days

This book covers the design, construction, and implementation of algebraic-geometric codes from Hermitian curves. Matlab simulations of algebraic-geometric codes and Reed-Solomon codes compare their bit error rate using different modulation schemes over additive white Gaussian noise channel model. Simulation results of Algebraic-geometric codes bit error rate performance using quadrature amplitude modulation (16QAM and 64QAM) are presented for the first time and shown to outperform Reed-Solomon codes at various code rates and channel models. The book proposes algebraic-geometric block turbo codes. It also presents simulation results that show an improved bit error rate performance at the cost of high system complexity due to using algebraic-geometric codes and Chase-Pyndiah's algorithm simultaneously. The book proposes algebraic-geometric irregular block turbo codes (AG-IBTC) to reduce system complexity. Simulation results for AG-IBTCs are presented for the first time.

Digital-Forensics and Watermarking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012,... Digital-Forensics and Watermarking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Yun Q. Shi, Fernando Perez-Gonzalez, Hyoung Joong Kim
R3,066 Discovery Miles 30 660 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.

Financial Cryptography and Data Security - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised... Financial Cryptography and Data Security - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Ahmad-Reza Sadeghi
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval.

Security and Trust Management - 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013, Proceedings (Paperback,... Security and Trust Management - 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013, Proceedings (Paperback, 2013 ed.)
Rafael Accorsi, Silvio Ranise
R1,939 Discovery Miles 19 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013). The 15 revised full papers including two invited talks were carefully reviewed and selected from 47 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

Theory of Quantum Computation, Communication, and Cryptography - 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011,... Theory of Quantum Computation, Communication, and Cryptography - 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papers (Paperback, 2014)
Dave Bacon, Miguel Martin-Delgado, Martin Roetteler
R2,101 Discovery Miles 21 010 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2011, held in Madrid, Spain, in May 2011. The 14 revised papers presented were carefully selected from numerous submissions. The papers present new and original research and cover a large range of topics in quantum computation, communication and cryptography, a new and interdisciplinary field at the intersection of computer science, information theory and quantum mechanics.

Engineering Secure Future Internet Services and Systems - Current Research (Paperback, 2014 ed.): Maritta Heisel, Wouter... Engineering Secure Future Internet Services and Systems - Current Research (Paperback, 2014 ed.)
Maritta Heisel, Wouter Joosen, Javier Lopez, Fabio Martinelli
R2,629 Discovery Miles 26 290 Ships in 10 - 15 working days

This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers. The engineering approach of the Network of Excellence NESSoS, funded by the European Commission, is based on the principle of addressing security concerns from the very beginning in all software development phases, thus contributing to reduce the amount of software vulnerabilities and enabling the systematic treatment of security needs through the engineering process. The 15 papers included in this volume deal with the main NESSoS research areas: security requirements for Future Internet services; creating secure service architectures and secure service design; supporting programming environments for secure and composable services; enabling security assurance and integrating former results in a risk-aware and cost-aware software life-cycle.

Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July... Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings (Paperback, 2013 ed.)
Lingyu Wang, Basit Shafiq
R1,529 Discovery Miles 15 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The 16 revised full and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing.

Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013,... Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Emmanuel Prouff
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013. The 13 revised full papers presented together with two invited talks were carefully selected from 39 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.

Availability, Reliability, and Security in Information Systems and HCI - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain... Availability, Reliability, and Security in Information Systems and HCI - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedings (Paperback, 2013 ed.)
Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Li Da Xu
R1,587 Discovery Miles 15 870 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Security, CD-ARES 2013, held in Regensburg, Germany, in September 2013. The 21 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: economic, ethical, legal, multilingual, organizational and social aspects; context-oriented information integration; data/information management as a service; context-oriented information integration and location-aware computing; security and privacy; risk management and business continuity; and security and privacy and location based applications. Also included are 15 papers from a special session on Human-Computer Interaction and Knowledge Discovery (HCI-KDD 2013).

Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14,... Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Sabrina de Capitani di Vimercati, Chris Mitchell
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols, Public Key Infrastructure, Wireless Authentication and Revocation, Certificate and Trusted Computing, and Digital Structures.

Codes, Systems, and Graphical Models (Paperback, 2001 ed.): Brian Marcus, Joachim Rosenthal Codes, Systems, and Graphical Models (Paperback, 2001 ed.)
Brian Marcus, Joachim Rosenthal
R1,593 Discovery Miles 15 930 Ships in 10 - 15 working days

Coding theory, system theory, and symbolic dynamics have much in common. A major new theme in this area of research is that of codes and systems based on graphical models. This volume contains survey and research articles from leading researchers at the interface of these subjects.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Web Services - Concepts, Methodologies…
Information Reso Management Association Hardcover R9,718 Discovery Miles 97 180
Coding for Kids Ages 10 and Up - Coding…
Bob Mather Hardcover R933 Discovery Miles 9 330
Visualizing Information Using SVG and…
Vladimir Geroimenko, Chaomei Chen Hardcover R4,396 Discovery Miles 43 960
Web Services - Concepts, Methodologies…
Information Reso Management Association Hardcover R9,718 Discovery Miles 97 180
Introduction Coding - Learn Python With…
Python Accademy Hardcover R756 R662 Discovery Miles 6 620
Java Foundations - Pearson New…
John Lewis, Peter DePasquale, … Paperback R2,777 Discovery Miles 27 770
Managing Chaos - Digital Governance by…
Lisa Welchman Paperback R975 Discovery Miles 9 750
Web Engineering
Carson Thomas Hardcover R3,574 R3,230 Discovery Miles 32 300
Lean Startup - How to Apply the Lean…
Greg Caldwell Hardcover R635 R567 Discovery Miles 5 670
The Definitive Guide to Stellent Content…
Brian Huff Hardcover R1,643 Discovery Miles 16 430

 

Partners