0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (101)
  • R500+ (1,927)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Foundations of Security Analysis and Design VII - FOSAD 2012 / 2013 Tutorial Lectures (Paperback, 2014 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design VII - FOSAD 2012 / 2013 Tutorial Lectures (Paperback, 2014 ed.)
Alessandro Aldini, Javier Lopez, Fabio Martinelli
R2,255 Discovery Miles 22 550 Ships in 10 - 15 working days

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.

Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014,... Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, Proceedings (Paperback, 2014 ed.)
Emiliano De Cristofaro, Steven J. Murdoch
R2,405 Discovery Miles 24 050 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies, PETS 2014, held in Amsterdam, The Netherlands, in July 2014.The 16 full papers presented were carefully selected from 86 submissions. Topics addressed by the papers published in these proceedings include study of privacy erosion, designs of privacy-preserving systems, censorship resistance, social networks and location privacy."

Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014,... Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II (Paperback, 2014 ed.)
Juan A. Garay, Rosario Gennaro
R3,002 Discovery Miles 30 020 Ships in 10 - 15 working days

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.

Impossibility Results for Distributed Computing (Paperback): Hagit Attiya, Faith Ellen Impossibility Results for Distributed Computing (Paperback)
Hagit Attiya, Faith Ellen
R1,203 Discovery Miles 12 030 Ships in 10 - 15 working days

To understand the power of distributed systems, it is necessary to understand their inherent limitations: what problems cannot be solved in particular systems, or without sufficient resources (such as time or space). This book presents key techniques for proving such impossibility results and applies them to a variety of different problems in a variety of different system models. Insights gained from these results are highlighted, aspects of a problem that make it difficult are isolated, features of an architecture that make it inadequate for solving certain problems efficiently are identified, and different system models are compared.

Healthcare Information Privacy and Security - Regulatory Compliance and Data Security in the Age of Electronic Health Records... Healthcare Information Privacy and Security - Regulatory Compliance and Data Security in the Age of Electronic Health Records (Paperback, 1st ed.)
Bernard Peter Robichau
R2,553 Discovery Miles 25 530 Ships in 10 - 15 working days

Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of fines and damage to their reputations. Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records outlines the new regulatory regime, and it also provides IT professionals with the processes and protocols, standards, and governance tools they need to maintain a secure and legal environment for data and records. It's a concrete resource that will help you understand the issues affecting the law and regulatory compliance, privacy, and security in the enterprise. As healthcare IT security expert Bernard Peter Robichau II shows, the success of a privacy and security initiative lies not just in proper planning but also in identifying who will own the implementation and maintain technologies and processes. From executive sponsors to system analysts and administrators, a properly designed security program requires that that the right people are assigned to the right tasks and have the tools they need. Robichau explains how to design and implement that program with an eye toward long-term success. Putting processes and systems in place is, of course, only the start. Robichau also shows how to manage your security program and maintain operational support including ongoing maintenance and policy updates. (Because regulations never sleep!) This book will help you devise solutions that include: Identity and access management systems Proper application design Physical and environmental safeguards Systemwide and client-based security configurations Safeguards for patient data Training and auditing procedures Governance and policy administration Healthcare Information Privacy and Security is the definitive guide to help you through the process of maintaining privacy and security in the healthcare industry. It will help you keep health information safe, and it will help keep your organization-whether local clinic or major hospital system-on the right side of the law.

Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014.... Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings (Paperback, 2014 ed.)
Ioana Boureanu, Philippe Owesarski, Serge Vaudenay
R3,151 Discovery Miles 31 510 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.

Forward Error Correction Based On Algebraic-Geometric Theory (Paperback, 2014 ed.): Jafar A. Alzubi, Omar A. Alzubi, Thomas M.... Forward Error Correction Based On Algebraic-Geometric Theory (Paperback, 2014 ed.)
Jafar A. Alzubi, Omar A. Alzubi, Thomas M. Chen
R1,658 Discovery Miles 16 580 Ships in 10 - 15 working days

This book covers the design, construction, and implementation of algebraic-geometric codes from Hermitian curves. Matlab simulations of algebraic-geometric codes and Reed-Solomon codes compare their bit error rate using different modulation schemes over additive white Gaussian noise channel model. Simulation results of Algebraic-geometric codes bit error rate performance using quadrature amplitude modulation (16QAM and 64QAM) are presented for the first time and shown to outperform Reed-Solomon codes at various code rates and channel models. The book proposes algebraic-geometric block turbo codes. It also presents simulation results that show an improved bit error rate performance at the cost of high system complexity due to using algebraic-geometric codes and Chase-Pyndiah's algorithm simultaneously. The book proposes algebraic-geometric irregular block turbo codes (AG-IBTC) to reduce system complexity. Simulation results for AG-IBTCs are presented for the first time.

Engineering Secure Future Internet Services and Systems - Current Research (Paperback, 2014 ed.): Maritta Heisel, Wouter... Engineering Secure Future Internet Services and Systems - Current Research (Paperback, 2014 ed.)
Maritta Heisel, Wouter Joosen, Javier Lopez, Fabio Martinelli
R2,577 Discovery Miles 25 770 Ships in 10 - 15 working days

This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers. The engineering approach of the Network of Excellence NESSoS, funded by the European Commission, is based on the principle of addressing security concerns from the very beginning in all software development phases, thus contributing to reduce the amount of software vulnerabilities and enabling the systematic treatment of security needs through the engineering process. The 15 papers included in this volume deal with the main NESSoS research areas: security requirements for Future Internet services; creating secure service architectures and secure service design; supporting programming environments for secure and composable services; enabling security assurance and integrating former results in a risk-aware and cost-aware software life-cycle.

CompTIA A+(r) Certification All-in-One For Dummies (r), 5th Edition (Paperback, 5th Edition): Ge Clarke CompTIA A+(r) Certification All-in-One For Dummies (r), 5th Edition (Paperback, 5th Edition)
Ge Clarke
R981 R888 Discovery Miles 8 880 Save R93 (9%) Ships in 12 - 17 working days

Fully updated to cover the 2019 exam release! CompTIA's A+ certification is an essential certification to building a successful IT career. Test takers must pass both 90-question exams to be certified, and this book--plus online test bank--will help you reach your certification goal. The 9 minibooks map to the exam's objectives, and include new content on Windows 10, Scripting, Linux, and mobile devices. You'll learn about how computers work, networking, computer repair and troubleshooting, security, permissions, and customer service. You'll also find test-taking advice and a review of the types of questions you'll see on the exam. Use the online test bank to test your knowledge and prepare for the exam Get up to speed on operating system basics Find out how to manage the operating system Discover maintenance and troubleshooting tips Inside is all the knowledge you need to pass the new A+ exam!

The Economics of Financial and Medical Identity Theft (Paperback, 2012 ed.): L. Jean Camp, M. Eric Johnson The Economics of Financial and Medical Identity Theft (Paperback, 2012 ed.)
L. Jean Camp, M. Eric Johnson
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear.

The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book.

The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided.

Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings (Paperback, 2014 ed.)
Phong Q. Nguyen, Elisabeth Oswald
R1,596 Discovery Miles 15 960 Ships in 10 - 15 working days

This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.

Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014,... Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings (Paperback, 2014 ed.)
Xinyi Huang, Jianying Zhou
R3,116 Discovery Miles 31 160 Ships in 10 - 15 working days

This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.

Linear Network Error Correction Coding (Paperback, 2014 ed.): Xuan Guang, Zhen Zhang Linear Network Error Correction Coding (Paperback, 2014 ed.)
Xuan Guang, Zhen Zhang
R1,750 Discovery Miles 17 500 Ships in 10 - 15 working days

There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences similar to algebraic coding, and also briefly discuss the main results following the other approach, that uses the theory of rank metric codes for network error correction of representing messages by subspaces. This book starts by establishing the basic linear network error correction (LNEC) model and then characterizes two equivalent descriptions. Distances and weights are defined in order to characterize the discrepancy of these two vectors and to measure the seriousness of errors. Similar to classical error-correcting codes, the authors also apply the minimum distance decoding principle to LNEC codes at each sink node, but use distinct distances. For this decoding principle, it is shown that the minimum distance of a LNEC code at each sink node can fully characterize its error-detecting, error-correcting and erasure-error-correcting capabilities with respect to the sink node. In addition, some important and useful coding bounds in classical coding theory are generalized to linear network error correction coding, including the Hamming bound, the Gilbert-Varshamov bound and the Singleton bound. Several constructive algorithms of LNEC codes are presented, particularly for LNEC MDS codes, along with an analysis of their performance. Random linear network error correction coding is feasible for noncoherent networks with errors. Its performance is investigated by estimating upper bounds on some failure probabilities by analyzing the information transmission and error correction. Finally, the basic theory of subspace codes is introduced including the encoding and decoding principle as well as the channel model, the bounds on subspace codes, code construction and decoding algorithms.

Theory of Quantum Computation, Communication, and Cryptography - 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011,... Theory of Quantum Computation, Communication, and Cryptography - 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papers (Paperback, 2014)
Dave Bacon, Miguel Martin-Delgado, Martin Roetteler
R2,048 Discovery Miles 20 480 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2011, held in Madrid, Spain, in May 2011. The 14 revised papers presented were carefully selected from numerous submissions. The papers present new and original research and cover a large range of topics in quantum computation, communication and cryptography, a new and interdisciplinary field at the intersection of computer science, information theory and quantum mechanics.

Information Security Applications - 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised... Information Security Applications - 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers (Paperback, 2014)
Yongdae Kim, Heejo Lee, Adrian Perrig
R2,244 Discovery Miles 22 440 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.

Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1 (Paperback): RA... Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1 (Paperback)
RA Grimes
R599 Discovery Miles 5 990 Ships in 12 - 17 working days

Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized 'crackers' to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today's computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day--HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication--will be virtually useless. . . unless you prepare. Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book: Gives a simple quantum mechanics primer Explains how quantum computing will break current cryptography Offers practical advice for preparing for a post-quantum world Presents the latest information on new cryptographic methods Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.

Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on... Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings (Paperback, 2014 ed.)
Martin Abadi, Steve Kremer
R2,359 Discovery Miles 23 590 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.

Classical, Semi-classical and Quantum Noise (Paperback, 2012 ed.): Leon Cohen, H. Vincent Poor, Marlan O. Scully Classical, Semi-classical and Quantum Noise (Paperback, 2012 ed.)
Leon Cohen, H. Vincent Poor, Marlan O. Scully
R4,952 Discovery Miles 49 520 Ships in 10 - 15 working days

David Middleton was a towering figure of 20th Century engineering and science and one of the founders of statistical communication theory. During the second World War, the young David Middleton, working with Van Fleck, devised the notion of the matched filter, which is the most basic method used for detecting signals in noise. Over the intervening six decades, the contributions of Middleton have become classics. This collection of essays by leading scientists, engineers and colleagues of David are in his honor and reflect the wide influence that he has had on many fields. Also included is the introduction by Middleton to his forthcoming book, which gives a wonderful view of the field of communication, its history and his own views on the field that he developed over the past 60 years. Focusing on classical noise modeling and applications, Classical, Semi-Classical and Quantum Noise includes coverage of statistical communication theory, non-stationary noise, molecular footprints, noise suppression, Quantum error correction, and other related topics.

Public-Key Cryptography -- PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos... Public-Key Cryptography -- PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings (Paperback, 2014 ed.)
Hugo Krawczyk
R1,587 Discovery Miles 15 870 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.

Transactions on Data Hiding and Multimedia Security IX - Special Issue on Visual Cryptography (Paperback, 2014 ed.): Yun Q.... Transactions on Data Hiding and Multimedia Security IX - Special Issue on Visual Cryptography (Paperback, 2014 ed.)
Yun Q. Shi, Feng Liu, Weiqi Yan
R1,830 Discovery Miles 18 300 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The seven papers included in this special issue were carefully reviewed and selected from 21 submissions. They address the challenges faced by the emerging area of visual cryptography and provide the readers with an overview of the state of the art in this field of research.

Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum,... Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings (Paperback, 2014 ed.)
Gregorio Martinez Perez, Sabu M. Thampi, Ryan Ko, Lei Shu
R3,094 Discovery Miles 30 940 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following workshops: Second International Workshop on Security in Self-Organising Networks (Self Net 2014); Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2014); Second International Workshop on Trust and Privacy in Cyberspace (Cyber Trust 2014).

Information Theoretic Security - 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings... Information Theoretic Security - 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (Paperback, 2014 ed.)
Carles Padro
R2,198 Discovery Miles 21 980 Ships in 10 - 15 working days

This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.

Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014.... Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings (Paperback, 2014 ed.)
Jan Jurjens, Frank Piessens, Nataliia Bielova
R2,141 Discovery Miles 21 410 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.

MIMO Communication for Cellular Networks (Paperback, 2012 ed.): Howard Huang, Constantinos B. Papadias, Sivarama Venkatesan MIMO Communication for Cellular Networks (Paperback, 2012 ed.)
Howard Huang, Constantinos B. Papadias, Sivarama Venkatesan
R3,279 Discovery Miles 32 790 Ships in 10 - 15 working days

As the theoretical foundations of multiple-antenna techniques evolve and as these multiple-input multiple-output (MIMO) techniques become essential for providing high data rates in wireless systems, there is a growing need to understand the performance limits of MIMO in practical networks. To address this need, "MIMO Communication for Cellular Networks "presents a systematic description of MIMO technology classes and a framework for MIMO system design that takes into account the essential physical-layer features of practical cellular networks.

In contrast to works that focus on the theoretical performance of abstract MIMO channels, "MIMO Communication for Cellular Networks "emphasizes the practical performance of realistic MIMO systems. A unified set of system simulation results highlights relative performance gains of different MIMO techniques and provides insights into how best to use multiple antennas in cellular networks under various conditions.

"MIMO Communication for Cellular Networks" describes single-user, multiuser, network MIMO technologies and system-level aspects of cellular networks, including channel modeling, resource scheduling, interference mitigation, and simulation methodologies. The key concepts are presented with sufficient generality to be applied to a wide range of wireless systems, including those based on cellular standards such as LTE, LTE-Advanced, WiMAX, and WiMAX2. The book is intended for use by graduate students, researchers, and practicing engineers interested in the physical-layer design of state-of-the-art wireless systems.

Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Hardcover, 1st ed. 2023):... Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Hardcover, 1st ed. 2023)
Zhiyong Zheng, Kun Tian, Fengxia Liu
R1,304 R1,237 Discovery Miles 12 370 Save R67 (5%) Ships in 9 - 15 working days

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,473 Discovery Miles 24 730
Blockchain - Novice to Expert - 2…
Keizer Soeze Hardcover R1,081 R875 Discovery Miles 8 750
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R798 Discovery Miles 7 980
Bitcoin - Guide Book for Beginners
Keizer Soeze Hardcover R1,151 R928 Discovery Miles 9 280
Technical Articles about the Voynich…
National Security Agency Hardcover R568 Discovery Miles 5 680
Modern Cryptography Primer - Theoretical…
Czeslaw Koscielny, Miroslaw Kurkowski, … Hardcover R2,524 Discovery Miles 25 240
Protecting Privacy through Homomorphic…
Kristin Lauter, Wei Dai, … Hardcover R2,977 Discovery Miles 29 770
Blockchain Gaps - From Myth to Real Life
Shin'ichiro Matsuo, Nat Sakimura Hardcover R2,309 Discovery Miles 23 090

 

Partners