0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (84)
  • R500+ (1,895)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Complexity in Information Theory (Paperback, Softcover reprint of the original 1st ed. 1988): Yaser S.Abu- Mostafa Complexity in Information Theory (Paperback, Softcover reprint of the original 1st ed. 1988)
Yaser S.Abu- Mostafa
R2,613 Discovery Miles 26 130 Ships in 18 - 22 working days

The means and ends of information theory and computational complexity have grown significantly closer over the past decade. Common analytic tools, such as combinatorial mathematics and information flow arguments, have been the cornerstone of VLSl complexity and cooperative computation. The basic assumption of limited computing resources is the premise for cryptography, where the distinction is made between available information and accessible information. Numerous other examples of common goals and tools between the two disciplines have shaped a new research category of 'information and complexity theory'. This volume is intended to expose to the research community some of the recent significant topics along this theme. The contributions selected here are all very basic, presently active, fairly well-established, and stimulating for substantial follow-ups. This is not an encyclopedia on the subject, it is concerned only with timely contributions of sufficient coherence and promise. The styles of the six chapters cover a wide spectrum from specific mathematical results to surveys of large areas. It is hoped that the technical content and theme of this volume will help establish this general research area. I would like to thank the authors of the chapters for contributing to this volume. I also would like to thank Ed Posner for his initiative to address this subject systematically, and Andy Fyfe and Ruth Erlanson for proofreading some of the chapters.

Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers... Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers (Paperback, 2011 ed.)
Tomas Filler, Tomas Pevny, Scott Craver, Andrew Ker
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest.

Communications and Multimedia Security Issues of the New Century - IFIP TC6 / TC11 Fifth Joint Working Conference on... Communications and Multimedia Security Issues of the New Century - IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01) May 21-22, 2001, Darmstadt, Germany (Paperback, Softcover reprint of the original 1st ed. 2001)
Ralf Steinmetz, Jana Dittmann, Martin Steinebach
R5,183 Discovery Miles 51 830 Ships in 18 - 22 working days

The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance.

Progress in Cryptology -- AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12,... Progress in Cryptology -- AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings (Paperback, 2012 ed.)
Aikaterini Mitrokotsa, Serge Vaudenay
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.

Data Privacy Management and Autonomous Spontaneous Security - 7th International Workshop, DPM 2012, and 5th International... Data Privacy Management and Autonomous Spontaneous Security - 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Roberto Di Pietro, Javier Herranz, Ernesto Damiani, Radu State
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management.

Secure Data Managment - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings (Paperback, 2011 ed.):... Secure Data Managment - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings (Paperback, 2011 ed.)
Willem Jonker, Milan Petkovic
R1,716 Discovery Miles 17 160 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle, WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference . The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are organized in topical sections on privacy protection and quantification, security in cloud and sensor networks and secure data managment technologies.

Critical Infrastructure Protection III - Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March... Critical Infrastructure Protection III - Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Charles Palmer, Sujeet Shenoi
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection III, is the third volume in the annualseriesproducedbyIFIP WorkingGroup11.10onCriticalInfrastructure Protection, an active international community of scientists, engineers, prac- tioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at Dartmouth College, Hanover, New Hampshire, March 23-25, 2009. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure protection.

Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected... Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers (Paperback)
Antoine Joux
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.

Turbo Codes - Desirable and Designable (Paperback, Softcover reprint of the original 1st ed. 2004): Alexandre Giulietti, Bruno... Turbo Codes - Desirable and Designable (Paperback, Softcover reprint of the original 1st ed. 2004)
Alexandre Giulietti, Bruno Bougard, Liesbet Van Der Perre
R2,619 Discovery Miles 26 190 Ships in 18 - 22 working days

PREFACE The increasing demand on high data rate and quality of service in wireless communication has to cope with limited bandwidth and energy resources. More than 50 years ago, Shannon has paved the way to optimal usage of bandwidth and energy resources by bounding the spectral efficiency vs. signal to noise ratio trade-off. However, as any information theorist, Shannon told us what is the best we can do but not how to do it [1]. In this view, turbo codes are like a dream come true: they allow approaching the theoretical Shannon capacity limit very closely. However, for the designer who wants to implement these codes, at first sight they appear to be a nightmare. We came a huge step closer in striving the theoretical limit, but see the historical axiom repeated on a different scale: we know we can achieve excellent performance with turbo codes, but not how to realize this in real devices.

Information Systems Security - 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings... Information Systems Security - 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings (Paperback, 2012 ed.)
Venkat Venkatakrishnan, Diganta Goswami
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.

Secure Broadcast Communication - In Wired and Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2003):... Secure Broadcast Communication - In Wired and Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2003)
Adrian Perrig, J. D. Tygar
R2,638 Discovery Miles 26 380 Ships in 18 - 22 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings... Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings (Paperback, Edition.)
Javier Lopez, Gene Tsudik
R1,479 Discovery Miles 14 790 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

Advances in Cryptology - Proceedings of Crypto 83 (Paperback, Softcover reprint of the original 1st ed. 1984): David Chaum Advances in Cryptology - Proceedings of Crypto 83 (Paperback, Softcover reprint of the original 1st ed. 1984)
David Chaum
R1,465 Discovery Miles 14 650 Ships in 18 - 22 working days

An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen years ago. The intrinsic fascination of the field certainly is part of the explanation. Another factor may be that many sense the importance and potential consequences of this work, as we move into the information age. I believe that the various meetings devoted to cryptology over the past few years have contributed quite significantly to the formation of this community, by allowing those in the field to get to know each other and by providing for rapid exchange of ideas. CRYPTO 83 was once again truly the cryptologic event of the year. Many of the most active participants continue to attend each year, and attendance continues to grow at a healthy rate. The informal and collegial atmosphere and the beach side setting which contribute to the popularity of the event were again supported by flawless weather. The absence of parallel sessions seemed to provide a welcome opportunity to keep abreast of developments in the various areas of activity. Each session of the meeting organized by the program committee is repre sented by a section in the present volume. The papers were accepted by the program committee based on abstracts, and appear here without having been otherwise refereed. The last section contains papers presented at the informal rump session. A keyword index and an author index to the papers is provided at the end of the volume."

Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings... Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings (Paperback, Edition.)
Simone Fischer-Hubner, Nicholas Hopper
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2011, held in Waterloo, Canada, in July 2011.
The 15 revised full papers were carefully reviewed and selected from 61 submissions. The papers address design and realization of privacy services for the Internet, other data systems and communication networks. Presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems the volume also features novel technical contributions from other communities such as law, business, and data protection authorities, that present their perspectives on technological issues.

Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers... Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers (Paperback, 2012)
Frederik Armknecht, Stefan Lucks
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011. The 10 revised full papers were carefully reviewed and selected from numerour submissions. The papers span a wide spectrum of topics from foundations of cryptology, upto secret-key cryptosystems and hash functions, public-key cryptosystems, modes of operation, cryptographic protocols, hardware and software implementation of cryptosystems and their integration into secure systems, and applications such as watermarking and code obfuscation.

Chaos-Based Digital Communication Systems - Operating Principles, Analysis Methods, and Performance Evaluation (Paperback,... Chaos-Based Digital Communication Systems - Operating Principles, Analysis Methods, and Performance Evaluation (Paperback, Softcover reprint of hardcover 1st ed. 2003)
Francis C.M. Lau, Chi K. Tse
R3,998 Discovery Miles 39 980 Ships in 18 - 22 working days

One of the first books in this area, this text focuses on important aspects of the system operation, analysis and performance evaluation of selected chaos-based digital communications systems a hot topic in communications and signal processing. "

Principles of Secure Network Systems Design (Paperback, Softcover reprint of the original 1st ed. 2002): H. Lawson Principles of Secure Network Systems Design (Paperback, Softcover reprint of the original 1st ed. 2002)
H. Lawson; Sumit Ghosh
R1,393 Discovery Miles 13 930 Ships in 18 - 22 working days

A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.

NETWORKING 2011 - 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part II... NETWORKING 2011 - 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part II (Paperback, Edition.)
Jordi Domingo-Pascual, Pietro Manzoni, Sergio Palazzo, Ana Pont, Caterina Scoglio
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

The two-volume set LNCS 6640 and 6641 constitutes the refereed proceedings of the 10th International IFIP TC 6 Networking Conference held in Valencia, Spain, in May 2011. The 64 revised full papers presented were carefully reviewed and selected from a total of 294 submissions. The papers feature innovative research in the areas of applications and services, next generation Internet, wireless and sensor networks, and network science. The second volume includes 28 papers organized in topical sections on peer-to-peer, pricing, resource allocation, resource allocation radio, resource allocation wireless, social networks, and TCP.

Agent-Based Models of Social Life - Fundamentals (Paperback): Michael Laver Agent-Based Models of Social Life - Fundamentals (Paperback)
Michael Laver
R589 Discovery Miles 5 890 Ships in 10 - 15 working days

Social interactions are rich, complex, and dynamic. One way to understand these is to model interactions that fascinate us. Some of the more realistic and powerful models are computer simulations. Simple, elegant and powerful, tools are available in user-friendly free software to help you design, build and run your own models of social interactions that intrigue you, and do this on the most basic laptop computer. Focusing on a well-known model of housing segregation, this Element is about how to unleash that power, setting out the fundamentals of what is now known as 'agent based modeling'.

Agent-Based Models of Polarization and Ethnocentrism (Paperback): Michael Laver Agent-Based Models of Polarization and Ethnocentrism (Paperback)
Michael Laver
R586 Discovery Miles 5 860 Ships in 10 - 15 working days

Building on the Cambridge Element Agent Based Models of Social Life: Fundamentals (Cambridge, 2020), we move on to the next level. We do this by building agent based models of polarization and ethnocentrism. In the process, we develop: stochastic models, which add a crucial element of uncertainty to human interaction; models of human interactions structured by social networks; and 'evolutionary' models in which agents using more effective decision rules are more likely to survive and prosper than others. The aim is to leave readers with an effective toolkit for building, running and analyzing agent based modes of social interaction.

Delusions of Intelligence - Enigma, Ultra, and the End of Secure Ciphers (Paperback): R.A. Ratcliff Delusions of Intelligence - Enigma, Ultra, and the End of Secure Ciphers (Paperback)
R.A. Ratcliff
R825 Discovery Miles 8 250 Ships in 10 - 15 working days

In 1974, the British government admitted that its WWII secret intelligence organization had read Germany's ciphers on a massive scale. The intelligence from these decrypts influenced the Atlantic, the Eastern Front and Normandy. Why did the Germans never realize the Allies had so thoroughly penetrated their communications? As German intelligence experts conducted numerous internal investigations that all certified their ciphers' security, the Allies continued to break more ciphers and plugged their own communication leaks. How were the Allies able to so thoroughly exploit Germany's secret messages? How did they keep their tremendous success a secret? What flaws in Germany's organization allowed this counterintelligence failure and how can today's organizations learn to avoid similar disasters? This book, the first comparative study of WWII SIGINT (Signals Intelligence), analyzes the characteristics that allowed the Allies SIGINT success and that fostered the German blindness to Enigma's compromise.

Optimal Time-Domain Noise Reduction Filters - A Theoretical Study (Paperback, 2011 ed.): Jacob Benesty, Jingdong Chen Optimal Time-Domain Noise Reduction Filters - A Theoretical Study (Paperback, 2011 ed.)
Jacob Benesty, Jingdong Chen
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Additive noise is ubiquitous in acoustics environments and can affect the intelligibility and quality of speech signals. Therefore, a so-called noise reduction algorithm is required to mitigate the effect of the noise that is picked up by the microphones. This work proposes a general framework in the time domain for the single and multiple microphone cases, from which it is very convenient to derive, study, and analyze all kind of optimal noise reduction filters. Not only that all known algorithms can be deduced from this approach, shedding more light on how they function, but new ones can be discovered as well.

Public Key Cryptography -- PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography,... Public Key Cryptography -- PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012, Proceedings (Paperback, 2012)
Marc Fischlin, Johannes Buchmann, Mark Manulis
R1,528 Discovery Miles 15 280 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012, Proceedings (Paperback, 2012 ed.)
David Pointcheval, Thomas Johansson
R1,537 Discovery Miles 15 370 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012. The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices.

Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings... Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings (Paperback, 2012 ed.)
Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, …
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mensa Killer Sudoku - More than 200 of…
Gareth Moore, Mensa Ltd Paperback R368 R333 Discovery Miles 3 330
A Textbook of Data Structures and…
Vijayalakshmi P Hardcover R3,522 Discovery Miles 35 220
10 Cool Lego Mindstorm Robotics…
Syngress Paperback R541 Discovery Miles 5 410
Physical-Layer Security for Cooperative…
Yulong Zou, Jia Zhu Hardcover R2,653 Discovery Miles 26 530
Algebraic Geometry and Number Theory…
Hussein Mourtada, Celal Cem Sarioglu, … Hardcover R2,791 R2,019 Discovery Miles 20 190
Recommender Systems for Technology…
Nikos Manouselis, Hendrik Drachsler, … Hardcover R3,423 Discovery Miles 34 230
Advanced Topics of Topology
Francisco Bulnes Hardcover R3,062 Discovery Miles 30 620
Using Internet Primary Sources to Teach…
James M. Shiveley, Phillip J.Van Fossen Hardcover R1,896 Discovery Miles 18 960
Data Integrity and Quality
Santhosh Kumar Balan Hardcover R3,068 Discovery Miles 30 680
101 Water Wise Ways
Helen Moffett Paperback  (1)
R150 R139 Discovery Miles 1 390

 

Partners