0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (91)
  • R500+ (1,943)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Number Theoretic Methods in Cryptography - Complexity lower bounds (Paperback, Softcover reprint of the original 1st ed. 1999):... Number Theoretic Methods in Cryptography - Complexity lower bounds (Paperback, Softcover reprint of the original 1st ed. 1999)
Igor Shparlinski
R1,493 Discovery Miles 14 930 Ships in 10 - 15 working days

The book introduces new techniques which imply rigorous lower bounds on the complexity of some number theoretic and cryptographic problems. These methods and techniques are based on bounds of character sums and numbers of solutions of some polynomial equations over finite fields and residue rings. It also contains a number of open problems and proposals for further research. We obtain several lower bounds, exponential in terms of logp, on the de grees and orders of * polynomials; * algebraic functions; * Boolean functions; * linear recurring sequences; coinciding with values of the discrete logarithm modulo a prime p at suf ficiently many points (the number of points can be as small as pI/He). These functions are considered over the residue ring modulo p and over the residue ring modulo an arbitrary divisor d of p - 1. The case of d = 2 is of special interest since it corresponds to the representation of the right most bit of the discrete logarithm and defines whether the argument is a quadratic residue. We also obtain non-trivial upper bounds on the de gree, sensitivity and Fourier coefficients of Boolean functions on bits of x deciding whether x is a quadratic residue. These results are used to obtain lower bounds on the parallel arithmetic and Boolean complexity of computing the discrete logarithm. For example, we prove that any unbounded fan-in Boolean circuit. of sublogarithmic depth computing the discrete logarithm modulo p must be of superpolynomial size.

Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers... Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers (Paperback, 2012)
Frederik Armknecht, Stefan Lucks
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011. The 10 revised full papers were carefully reviewed and selected from numerour submissions. The papers span a wide spectrum of topics from foundations of cryptology, upto secret-key cryptosystems and hash functions, public-key cryptosystems, modes of operation, cryptographic protocols, hardware and software implementation of cryptosystems and their integration into secure systems, and applications such as watermarking and code obfuscation.

Security, Privacy, and Applied Cryptography Engineering - Second International Conference, SPACE 2012, Chennai, India, November... Security, Privacy, and Applied Cryptography Engineering - Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012, Proceedings (Paperback, 2012 ed.)
Andrey Bogdanov, Somitra Sanadhya
R1,939 Discovery Miles 19 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012.

The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices.

Computer Applications for Security, Control and System Engineering - International Conferences, SecTech, CA, CES3 2012, Held in... Computer Applications for Security, Control and System Engineering - International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings (Paperback, 2012 ed.)
Tai-Hoon Kim, Adrian Stoica, Wai-Chi Fang, Thanos Vasilakos, Javier Garcia Villalba, …
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology, and control and automation, and circuits, control, communication, electricity, electronics, energy, system, signal and simulation.

Image Representation and Processing - A Recursive Approach (Paperback, Softcover reprint of the original 1st ed. 1993): V.V.... Image Representation and Processing - A Recursive Approach (Paperback, Softcover reprint of the original 1st ed. 1993)
V.V. Alexandrov, Gorsky.
R1,499 Discovery Miles 14 990 Ships in 10 - 15 working days

Recently, much attention has been paid to image processing with multiresolution and hierarchical structures such as pyramids and trees. This volume deals with recursive pyramids, which combine the advantages of available multiresolution structures and which are convenient both for global and local image processing. Recursive pyramids are based on regular hierarchical (recursive) structures containing data on image fragments of different sizes. Such an image representation technique enables the effective manipulation of pictorial information as well as the development of special hardware or data structures. The major aspects of this book are two original mathematical models of greyscale and binary images represented by recursive structures. Image compression, transmission and processing are discussed using these models. A number of applications are presented, including optical character recognition, expert systems and special computer architecture for pictorial data processing. The majority of results are presented as algorithms applicable to discrete information fields of arbitrary dimensions (e.g. 2-D or 3-D images). The book is divided into six chapters: Chapter 1 provides a brief introduction. Chapter 2 then deals with recursive structures and their properties. Chapter 3 introduces pyramidal image models. Image coding and the progressive transmission of images with gradual refinement are discussed in Chapter 4. Chapters 5 and 6 are devoted to image processing with pyramidal-recursive structures and applications. The volume concludes with a comprehensive bibliography. For applied mathematicians and computer scientists whose work involves computer vision, information theory and other aspects of image representation techniques.

Trusted Systems - 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings (Paperback, 2012):... Trusted Systems - 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings (Paperback, 2012)
Chris J. Mitchell, Allan Tomlinson
R1,939 Discovery Miles 19 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully reviewed and selected from 19 submissions. The papers are organized in topical section on automated analysis, security and trust, mobile trust, security of distributed systems, evaluation and analysis, and embedded security.

Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012,... Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings (Paperback, 2012 ed.)
Tat Wing Chim, Tsz Hon Yuen
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.

Information Systems Security - 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings... Information Systems Security - 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings (Paperback, 2012 ed.)
Venkat Venkatakrishnan, Diganta Goswami
R1,544 Discovery Miles 15 440 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.

Multisensor Decision And Estimation Fusion (Paperback, Softcover reprint of the original 1st ed. 2003): Yunmin Zhu Multisensor Decision And Estimation Fusion (Paperback, Softcover reprint of the original 1st ed. 2003)
Yunmin Zhu
R4,339 Discovery Miles 43 390 Ships in 10 - 15 working days

YUNMIN ZHU In the past two decades, multi sensor or multi-source information fusion tech niques have attracted more and more attention in practice, where observations are processed in a distributed manner and decisions or estimates are made at the individual processors, and processed data (or compressed observations) are then transmitted to a fusion center where the final global decision or estimate is made. A system with multiple distributed sensors has many advantages over one with a single sensor. These include an increase in the capability, reliability, robustness and survivability of the system. Distributed decision or estimation fusion prob lems for cases with statistically independent observations or observation noises have received significant attention (see Varshney's book Distributed Detec tion and Data Fusion, New York: Springer-Verlag, 1997, Bar-Shalom's book Multitarget-Multisensor Tracking: Advanced Applications, vol. 1-3, Artech House, 1990, 1992,2000). Problems with statistically dependent observations or observation noises are more difficult and have received much less study. In practice, however, one often sees decision or estimation fusion problems with statistically dependent observations or observation noises. For instance, when several sensors are used to detect a random signal in the presence of observation noise, the sensor observations could not be statistically independent when the signal is present. This book provides a more complete treatment of the fundamentals of multi sensor decision and estimation fusion in order to deal with general random ob servations or observation noises that are correlated across the sensors."

Maximum Entropy and Bayesian Methods Garching, Germany 1998 - Proceedings of the 18th International Workshop on Maximum Entropy... Maximum Entropy and Bayesian Methods Garching, Germany 1998 - Proceedings of the 18th International Workshop on Maximum Entropy and Bayesian Methods of Statistical Analysis (Paperback, Softcover reprint of the original 1st ed. 1999)
Wolfgang Von Der Linden, Volker Dose, Rainer Fischer, Roland Preuss
R4,379 Discovery Miles 43 790 Ships in 10 - 15 working days

In 1978 Edwin T. Jaynes and Myron Tribus initiated a series of workshops to exchange ideas and recent developments in technical aspects and applications of Bayesian probability theory. The first workshop was held at the University of Wyoming in 1981 organized by C.R. Smith and W.T. Grandy. Due to its success, the workshop was held annually during the last 18 years. Over the years, the emphasis of the workshop shifted gradually from fundamental concepts of Bayesian probability theory to increasingly realistic and challenging applications. The 18th international workshop on Maximum Entropy and Bayesian Methods was held in Garching / Munich (Germany) (27-31. July 1998). Opening lectures by G. Larry Bretthorst and by Myron Tribus were dedicated to one of th the pioneers of Bayesian probability theory who died on the 30 of April 1998: Edwin Thompson Jaynes. Jaynes revealed and advocated the correct meaning of 'probability' as the state of knowledge rather than a physical property. This inter pretation allowed him to unravel longstanding mysteries and paradoxes. Bayesian probability theory, "the logic of science" - as E.T. Jaynes called it - provides the framework to make the best possible scientific inference given all available exper imental and theoretical information. We gratefully acknowledge the efforts of Tribus and Bretthorst in commemorating the outstanding contributions of E.T. Jaynes to the development of probability theory."

Information Dynamics - Foundations and Applications (Paperback, Softcover reprint of the original 1st ed. 2001): Gustavo Deco,... Information Dynamics - Foundations and Applications (Paperback, Softcover reprint of the original 1st ed. 2001)
Gustavo Deco, Bernd Schurmann
R1,523 Discovery Miles 15 230 Ships in 10 - 15 working days

This book offers a new, theoretical approach to information dynamics, i.e., information processing in complex dynamical systems. The presentation establishes a consistent theoretical framework for the problem of discovering knowledge behind empirical, dynamical data and addresses applications in information processing and coding in dynamical systems. This will be an essential reference for those in neural computing, information theory, nonlinear dynamics and complex systems modeling.

Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings... Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings (Paperback, 2012 ed.)
Audun Josang, Bengt Carlsson
R1,939 Discovery Miles 19 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management.

Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India,... Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012, Proceedings (Paperback, 2012)
Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz Calero, Tony Thomas
R1,591 Discovery Miles 15 910 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems.

Digital Communication - Principles and System Modelling (Paperback, 2010 ed.): Apurba Das Digital Communication - Principles and System Modelling (Paperback, 2010 ed.)
Apurba Das
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

"Digital Communications" presents the theory and application of the philosophy of Digital Communication systems in a unique but lucid form. The book inserts equal importance to the theory and application aspect of the subject whereby the authors selected a wide class of problems.

The Salient features of the book are:

1. The foundation of Fourier series, Transform and wavelets are introduces in a unique way but in lucid language.

2. The application area is rich and resemblance to the present trend of research, as we are attached with those areas professionally.

3. Elegant exercise section is designed in such a way that, the readers can get the flavor of the subject and get attracted towards the future scopes of the subject.

4. Unparallel tabular, flow chart based and pictorial methodology description will be there for sustained impression of the proposed design/algorithms in mind.

Cryptography and Computational Number Theory (Paperback, Softcover reprint of the original 1st ed. 2001): Kwok Y. Lam, Igor... Cryptography and Computational Number Theory (Paperback, Softcover reprint of the original 1st ed. 2001)
Kwok Y. Lam, Igor Shparlinski, Huaxiong Wang, Chaoping Xing
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99, which has been held in Singapore during the week of November 22-26, 1999. The workshop was organized by the Centre for Systems Security of the Na tional University of Singapore. We gratefully acknowledge the financial support from the Singapore National Science and Technology Board under the grant num ber RP960668/M. The idea for this workshop grew out of the recognition of the recent, rapid development in various areas of cryptography and computational number the ory. The event followed the concept of the research programs at such well-known research institutions as the Newton Institute (UK), Oberwolfach and Dagstuhl (Germany), and Luminy (France). Accordingly, there were only invited lectures at the workshop with plenty of time for informal discussions. It was hoped and successfully achieved that the meeting would encourage and stimulate further research in information and computer security as well as in the design and implementation of number theoretic cryptosystems and other related areas. Another goal of the meeting was to stimulate collaboration and more active interaction between mathematicians, computer scientists, practical cryptographers and engineers in academia, industry and government."

Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Comuuter Network... Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Comuuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings (Paperback, 2012 ed.)
Igor Kotenko, Victor Skormin
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.

Introduction to Convolutional Codes with Applications (Paperback, Softcover reprint of the original 1st ed. 1994): Ajay Dholakia Introduction to Convolutional Codes with Applications (Paperback, Softcover reprint of the original 1st ed. 1994)
Ajay Dholakia
R4,339 Discovery Miles 43 390 Ships in 10 - 15 working days

Introduction to Convolutional Codes with Applications is an introduction to the basic concepts of convolutional codes, their structure and classification, various error correction and decoding techniques for convolutionally encoded data, and some of the most common applications. The definition and representations, distance properties, and important classes of convolutional codes are also discussed in detail. The book provides the first comprehensive description of table-driven correction and decoding of convolutionally encoded data. Complete examples of Viterbi, sequential, and majority-logic decoding technique are also included, allowing a quick comparison among the different decoding approaches. Introduction to Convolutional Codes with Applications summarizes the research of the last two decades on applications of convolutional codes in hybrid ARQ protocols. A new classification allows a natural way of studying the underlying concepts of hybrid schemes and accommodates all of the new research. A novel application of fast decodable invertible convolutional codes for lost packet recovery in high speed networks is described. This opens the door for using convolutional coding for error recovery in high speed networks. Practicing communications, electronics, and networking engineers who want to get a better grasp of the underlying concepts of convolutional coding and its applications will greatly benefit by the simple and concise style of explanation. An up-to-date bibliography of over 300 papers is included. Also suitable for use as a textbook or a reference text in an advanced course on coding theory with emphasis on convolutional codes.

Communications and Cryptography - Two Sides of One Tapestry (Paperback, Softcover reprint of the original 1st ed. 1994):... Communications and Cryptography - Two Sides of One Tapestry (Paperback, Softcover reprint of the original 1st ed. 1994)
Richard E Blahut, Daniel J. Costello Jr, Ueli Maurer, Thomas Mittelholzer
R5,675 Discovery Miles 56 750 Ships in 10 - 15 working days

Information theory is an exceptional field in many ways. Technically, it is one of the rare fields in which mathematical results and insights have led directly to significant engineering payoffs. Professionally, it is a field that has sustained a remarkable degree of community, collegiality and high standards. James L. Massey, whose work in the field is honored here, embodies the highest standards of the profession in his own career. The book covers the latest work on: block coding, convolutional coding, cryptography, and information theory. The 44 contributions represent a cross-section of the world's leading scholars, scientists and researchers in information theory and communication. The book is rounded off with an index and a bibliography of publications by James Massey.

From Statistical Physics to Statistical Inference and Back (Paperback, Softcover reprint of the original 1st ed. 1994): P.... From Statistical Physics to Statistical Inference and Back (Paperback, Softcover reprint of the original 1st ed. 1994)
P. Grassberger, J.P. Nadal
R5,604 Discovery Miles 56 040 Ships in 10 - 15 working days

Physicists, when modelling physical systems with a large number of degrees of freedom, and statisticians, when performing data analysis, have developed their own concepts and methods for making the `best' inference. But are these methods equivalent, or not? What is the state of the art in making inferences? The physicists want answers. More: neural computation demands a clearer understanding of how neural systems make inferences; the theory of chaotic nonlinear systems as applied to time series analysis could profit from the experience already booked by the statisticians; and finally, there is a long-standing conjecture that some of the puzzles of quantum mechanics are due to our incomplete understanding of how we make inferences. Matter enough to stimulate the writing of such a book as the present one. But other considerations also arise, such as the maximum entropy method and Bayesian inference, information theory and the minimum description length. Finally, it is pointed out that an understanding of human inference may require input from psychologists. This lively debate, which is of acute current interest, is well summarized in the present work.

Cooperative Networking in a Heterogeneous Wireless Medium (Paperback, 2013 ed.): Muhammad Ismail, Weihua Zhuang Cooperative Networking in a Heterogeneous Wireless Medium (Paperback, 2013 ed.)
Muhammad Ismail, Weihua Zhuang
R1,466 Discovery Miles 14 660 Ships in 10 - 15 working days

This brief focuses on radio resource allocation in a heterogeneous wireless medium. It presents radio resource allocation algorithms with decentralized implementation, which support both single-network and multi-homing services. The brief provides a set of cooperative networking algorithms, which rely on the concepts of short-term call traffic load prediction, network cooperation, convex optimization, and decomposition theory. In the proposed solutions, mobile terminals play an active role in the resource allocation operation, instead of their traditional role as passive service recipients in the networking environment.

Distributed Computing by Oblivious Mobile Robots (Paperback): Paola Flocchini, Giuseppe Prencipe, Nicola Santoro Distributed Computing by Oblivious Mobile Robots (Paperback)
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro
R1,258 Discovery Miles 12 580 Ships in 10 - 15 working days

The study of what can be computed by a team of autonomous mobile robots, originally started in robotics and AI, has become increasingly popular in theoretical computer science (especially in distributed computing), where it is now an integral part of the investigations on computability by mobile entities. The robots are identical computational entities located and able to move in a spatial universe; they operate without explicit communication and are usually unable to remember the past; they are extremely simple, with limited resources, and individually quite weak. However, collectively the robots are capable of performing complex tasks, and form a system with desirable fault-tolerant and self-stabilizing properties. The research has been concerned with the computational aspects of such systems. In particular, the focus has been on the minimal capabilities that the robots should have in order to solve a problem. This book focuses on the recent algorithmic results in the field of distributed computing by oblivious mobile robots (unable to remember the past). After introducing the computational model with its nuances, we focus on basic coordination problems: pattern formation, gathering, scattering, leader election, as well as on dynamic tasks such as flocking. For each of these problems, we provide a snapshot of the state of the art, reviewing the existing algorithmic results. In doing so, we outline solution techniques, and we analyze the impact of the different assumptions on the robots' computability power. Table of Contents: Introduction / Computational Models / Gathering and Convergence / Pattern Formation / Scatterings and Coverings / Flocking / Other Directions

E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected... E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Aggelos Kiayias, Helger Lipmaa
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, pret a voter and trivitas, and experiences.

SDMA for Multipath Wireless Channels - Limiting Characteristics and Stochastic Models (Paperback, Softcover reprint of the... SDMA for Multipath Wireless Channels - Limiting Characteristics and Stochastic Models (Paperback, Softcover reprint of the original 1st ed. 2004)
Igor P. Kovalyov
R2,839 Discovery Miles 28 390 Ships in 10 - 15 working days

Space Division Multiple Access is one of the most promising methods in solving the capacity problem of wireless communication systems. This book defines formulae that can be used to evaluate the limit capacity of multipath wireless channels in a particular receiving region with size limitation.

Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings (Paperback,... Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings (Paperback, 2012 ed.)
Dieter Gollmann, Felix C. Freiling
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.

Progress in Cryptology - LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin... Progress in Cryptology - LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings (Paperback, 2012 ed.)
Alejandro Hevia, Gregory Neven
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Fan Girls and the Media - Creating…
Adrienne Trier-Bieniek Hardcover R1,961 Discovery Miles 19 610
Predictive Modeling with SAS Enterprise…
Kattamuri S Sarma Hardcover R2,386 Discovery Miles 23 860
Social Issues in Sport Communication…
Terry L. Rentner, David P. Burns Paperback R1,457 Discovery Miles 14 570
UV-visible Spectrophotometry of Water…
Olivier Thomas, Christopher Burgess Hardcover R6,627 Discovery Miles 66 270
GNU Octave 4.2 Reference Manual
John W. Eaton, David Bateman, … Hardcover R3,327 R2,702 Discovery Miles 27 020
Producing High-Quality Figures Using…
Charlie Chunhua Liu Paperback R1,935 Discovery Miles 19 350
Implementing CDISC Using SAS - An…
Chris Holland, Jack Shostak Hardcover R1,760 Discovery Miles 17 600
A Promised Land
Barack Obama Hardcover  (6)
R930 R795 Discovery Miles 7 950
Electron Spin Resonance - Volume 12B
M.C.R. Symons Hardcover R10,491 Discovery Miles 104 910
Exchange Rate Chaos - 25 Years of…
Charles R Geisst Hardcover R5,587 Discovery Miles 55 870

 

Partners