0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (86)
  • R500+ (1,896)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Data Privacy and Security (Paperback, Softcover reprint of the original 1st ed. 2003): David Salomon Data Privacy and Security (Paperback, Softcover reprint of the original 1st ed. 2003)
David Salomon
R2,486 Discovery Miles 24 860 Ships in 18 - 22 working days

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Features & Benefits:

* Incorporates both data encryption and data hiding

* Supplies a wealth of exercises and solutions to help readers readily understand the material

* Presents information in an accessible, nonmathematical style

* Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals

* Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography.

The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.

Disequilibrium and Self-Organisation (Paperback, Softcover reprint of the original 1st ed. 1986): C. W. Kilmister Disequilibrium and Self-Organisation (Paperback, Softcover reprint of the original 1st ed. 1986)
C. W. Kilmister
R2,665 Discovery Miles 26 650 Ships in 18 - 22 working days

Approach your problems from the right end It isn't that they can't see the solution. It is and begin with the answers. Then one day, that they can't see the problem. perhaps you will find the final question. G. K. Chesterton. The Scandal of Father 'The Hermit Clad in Crane Feathers' in R. Brown 'The point of a Pin'. van Gulik's The Chif1ese Maze Murders. Growing specialization and diversification have brought a host of monographs and textbooks on increasingly specialized topics. However, the "tree" of knowledge of mathematics and related fields does not grow only by putting forth new branches. It also happens, quite often in fact, that branches which were thought to be completely disparate are suddenly seen to be related. Further, the kind and level of sophistication of mathematics applied in various sciences has changed drastically in recent years: measure theory is used (non trivially) in regional and theoretical economics; algebraic geometry interacts with physics; the Minkowsky lemma, coding theory and the structure of water meet one another in packing and covering theory; quantum fields, crystal defects and mathematical programming profit from homotopy theory; Lie algebras are relevant to filtering; and prediction and electrical engineering can use Stein spaces. And in addition to this there are such new emerging subdisciplines as "experimental mathematics", "CFD", "completely integrable systems", "chaos, synergetics and large-scale order", which are almost impossible to fit into the existing classification schemes. They draw upon widely different sections of mathematics.

Differential Cryptanalysis of the Data Encryption Standard (Paperback, Softcover reprint of the original 1st ed. 1993): Eli... Differential Cryptanalysis of the Data Encryption Standard (Paperback, Softcover reprint of the original 1st ed. 1993)
Eli Biham, Adi Shamir
R2,855 Discovery Miles 28 550 Ships in 18 - 22 working days

DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national standard in the mid 1970s, and had resisted all attacks in the last 15 years. This book presents the first successful attack which can break the full 16 round DES faster than via exhaustive search. It describes in full detail, the novel technique of Differential Cryptanalysis, and demonstrates its applicability to a wide variety of cryptosystems and hash functions, including FEAL, Khafre, REDOC-II, LOKI, Lucifer, Snefru, N-Hash, and many modified versions of DES. The methodology used offers valuable insights to anyone interested in data security and cryptography, and points out the intricacies of developing, evaluating, testing, and implementing such schemes. This book was written by two of the fields leading researchers, and describes state-of-the-art research in a clear and completely contained manner.

Information Theory, Combinatorics, and Search Theory - In Memory of Rudolf Ahlswede (Paperback, 2013 ed.): Harout Aydinian,... Information Theory, Combinatorics, and Search Theory - In Memory of Rudolf Ahlswede (Paperback, 2013 ed.)
Harout Aydinian, Ferdinando Cicalese, Christian Deppe
R1,548 Discovery Miles 15 480 Ships in 18 - 22 working days

This volume is dedicated to the memory of Rudolf Ahlswede, who passed away in December 2010. The Festschrift contains 36 thoroughly refereed research papers from a memorial symposium, which took place in July 2011.

Thefour macro-topics of this workshop: theory of games and strategic planning; combinatorial group testing and database mining; computational biology and string matching; information coding and spreading and patrolling on networks; provide a comprehensive picture of the vision Rudolf Ahlswede put forward of a broad and systematic theory of search.

Finite Fields with Applications to Coding Theory, Cryptography and Related Areas - Proceedings of the Sixth International... Finite Fields with Applications to Coding Theory, Cryptography and Related Areas - Proceedings of the Sixth International Conference on Finite Fields and Applications, held at Oaxaca, Mexico, May 21-25, 2001 (Paperback, Softcover reprint of the original 1st ed. 2002)
Gary L. Mullen, Henning Stichtenoth, Horacio Tapia-Recillas
R2,666 Discovery Miles 26 660 Ships in 18 - 22 working days

This volume represents the refereed proceedings of the "Sixth International Conference on Finite Fields and Applications (Fq6)" held in the city of Oaxaca, Mexico, between 22-26 May 200l. The conference was hosted by the Departmento do Matermiticas of the U niversidad Aut6noma Metropolitana- Iztapalapa, Nlexico. This event continued a series of biennial international conferences on Finite Fields and Applications, following earlier meetings at the University of Nevada at Las Vegas (USA) in August 1991 and August 1993, the University of Glasgow (Scotland) in July 1995, the University of Waterloo (Canada) in August 1997, and at the University of Augsburg (Ger- many) in August 1999. The Organizing Committee of Fq6 consisted of Dieter Jungnickel (University of Augsburg, Germany), Neal Koblitz (University of Washington, USA), Alfred }. lenezes (University of Waterloo, Canada), Gary Mullen (The Pennsylvania State University, USA), Harald Niederreiter (Na- tional University of Singapore, Singapore), Vera Pless (University of Illinois, USA), Carlos Renteria (lPN, Mexico). Henning Stichtenoth (Essen Univer- sity, Germany). and Horacia Tapia-Recillas, Chair (Universidad Aut6noma l'vIetropolitan-Iztapalapa. Mexico). The program of the conference consisted of four full days and one half day of sessions, with 7 invited plenary talks, close to 60 contributed talks, basic courses in finite fields. cryptography and coding theory and a series of lectures at local educational institutions. Finite fields have an inherently fascinating structure and they are im- portant tools in discrete mathematics.

Theory of Quantum Computation, Communication, and Cryptography - 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012,... Theory of Quantum Computation, Communication, and Cryptography - 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Kazuo Iwama, Yasuhito Kawano, Mio Murao
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 7th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2012, held in Tokyo, Japan, in May 2012. The 12 papers presented were carefully reviewed and selected for inclusion in this book. They contain original research on the rapidly growing, interdisciplinary field of quantum computation, communication and cryptography. Topics addressed are such as quantum algorithms, quantum computation models, quantum complexity theory, simulation of quantum systems, quantum programming languages, quantum cryptography, quantum communication, quantum estimation, quantum measurement, quantum tomography, completely positive maps, decoherence, quantum noise, quantum coding theory, fault-tolerant quantum computing, entanglement theory, and quantum teleportation.

The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno,... The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers (Paperback, 2009)
Vashek Matyas, Simone Fischer-Hubner, Daniel Cvrcek, Petr Svenda
R2,652 Discovery Miles 26 520 Ships in 18 - 22 working days

What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 1-7, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.

The Semantics of Relationships - An Interdisciplinary Perspective (Paperback, Softcover reprint of the original 1st ed. 2002):... The Semantics of Relationships - An Interdisciplinary Perspective (Paperback, Softcover reprint of the original 1st ed. 2002)
R. Green, C.A. Bean, Sung Hyon Myaeng
R1,394 Discovery Miles 13 940 Ships in 18 - 22 working days

The genesis of this volume was the participation of the editors in an ACMlSIGIR (Association for Computing Machinery/Special Interest Group on Information Retrieval) workshop entitled "Beyond Word Relations" (Hetzler, 1997). This workshop examined a number of relationship types with significance for information retrieval beyond the conventional topic-matching relationship. From this shared participation came the idea for an edited volume on relationships, with chapters to be solicited from researchers and practitioners throughout the world. Ultimately, one volume became two volumes. The first volume, Relationships in the Organization of Knowledge (Bean & Green, 200 I), examines the role of relationships in knowledge organization theory and practice, with emphasis given to thesaural relationships and integration across systems, languages, cultures, and disciplines. This second volume examines relationships in a broader array of contexts. The two volumes should be seen as companions, each informing the other. As with the companion volume, we are especially grateful to the authors who willingly accepted challenges of space and time to produce chapters that summarize extensive bodies of research. The value of the volume clearly resides in the quality of the individual chapters. In naming this volume The Semantics of Relationships: An Interdisciplinary Perspective, we wanted to highlight the fact that relationships are not just empty connectives. Relationships constitute important conceptual units and make significant contributions to meaning.

Secure Data Management - 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012, Proceedings (Paperback, 2012 ed.):... Secure Data Management - 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012, Proceedings (Paperback, 2012 ed.)
Willem Jonker, Milan Petkovic
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, in August 27, 2012. The 12 revised full papers presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on privacy protection, access control, secure storage on the cloud, and trust on the Web.

Complexity in Information Theory (Paperback, Softcover reprint of the original 1st ed. 1988): Yaser S.Abu- Mostafa Complexity in Information Theory (Paperback, Softcover reprint of the original 1st ed. 1988)
Yaser S.Abu- Mostafa
R2,613 Discovery Miles 26 130 Ships in 18 - 22 working days

The means and ends of information theory and computational complexity have grown significantly closer over the past decade. Common analytic tools, such as combinatorial mathematics and information flow arguments, have been the cornerstone of VLSl complexity and cooperative computation. The basic assumption of limited computing resources is the premise for cryptography, where the distinction is made between available information and accessible information. Numerous other examples of common goals and tools between the two disciplines have shaped a new research category of 'information and complexity theory'. This volume is intended to expose to the research community some of the recent significant topics along this theme. The contributions selected here are all very basic, presently active, fairly well-established, and stimulating for substantial follow-ups. This is not an encyclopedia on the subject, it is concerned only with timely contributions of sufficient coherence and promise. The styles of the six chapters cover a wide spectrum from specific mathematical results to surveys of large areas. It is hoped that the technical content and theme of this volume will help establish this general research area. I would like to thank the authors of the chapters for contributing to this volume. I also would like to thank Ed Posner for his initiative to address this subject systematically, and Andy Fyfe and Ruth Erlanson for proofreading some of the chapters.

Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers... Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers (Paperback, 2011 ed.)
Tomas Filler, Tomas Pevny, Scott Craver, Andrew Ker
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest.

Communications and Multimedia Security Issues of the New Century - IFIP TC6 / TC11 Fifth Joint Working Conference on... Communications and Multimedia Security Issues of the New Century - IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01) May 21-22, 2001, Darmstadt, Germany (Paperback, Softcover reprint of the original 1st ed. 2001)
Ralf Steinmetz, Jana Dittmann, Martin Steinebach
R5,183 Discovery Miles 51 830 Ships in 18 - 22 working days

The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance.

Progress in Cryptology -- AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12,... Progress in Cryptology -- AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings (Paperback, 2012 ed.)
Aikaterini Mitrokotsa, Serge Vaudenay
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.

Data Privacy Management and Autonomous Spontaneous Security - 7th International Workshop, DPM 2012, and 5th International... Data Privacy Management and Autonomous Spontaneous Security - 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Roberto Di Pietro, Javier Herranz, Ernesto Damiani, Radu State
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management.

Secure Data Managment - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings (Paperback, 2011 ed.):... Secure Data Managment - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings (Paperback, 2011 ed.)
Willem Jonker, Milan Petkovic
R1,716 Discovery Miles 17 160 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle, WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference . The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are organized in topical sections on privacy protection and quantification, security in cloud and sensor networks and secure data managment technologies.

A Practical Introduction to Regression Discontinuity Designs - Foundations (Paperback): Matias D. Cattaneo, Nicolas Idrobo,... A Practical Introduction to Regression Discontinuity Designs - Foundations (Paperback)
Matias D. Cattaneo, Nicolas Idrobo, Rocio Titiunik
R615 Discovery Miles 6 150 Ships in 10 - 15 working days

In this Element and its accompanying second Element, A Practical Introduction to Regression Discontinuity Designs: Extensions, Matias Cattaneo, Nicolas Idrobo, and Rociio Titiunik provide an accessible and practical guide for the analysis and interpretation of regression discontinuity (RD) designs that encourages the use of a common set of practices and facilitates the accumulation of RD-based empirical evidence. In this Element, the authors discuss the foundations of the canonical Sharp RD design, which has the following features: (i) the score is continuously distributed and has only one dimension, (ii) there is only one cutoff, and (iii) compliance with the treatment assignment is perfect. In the second Element, the authors discuss practical and conceptual extensions to this basic RD setup.

Critical Infrastructure Protection III - Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March... Critical Infrastructure Protection III - Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Charles Palmer, Sujeet Shenoi
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection III, is the third volume in the annualseriesproducedbyIFIP WorkingGroup11.10onCriticalInfrastructure Protection, an active international community of scientists, engineers, prac- tioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at Dartmouth College, Hanover, New Hampshire, March 23-25, 2009. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure protection.

Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected... Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers (Paperback)
Antoine Joux
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.

Turbo Codes - Desirable and Designable (Paperback, Softcover reprint of the original 1st ed. 2004): Alexandre Giulietti, Bruno... Turbo Codes - Desirable and Designable (Paperback, Softcover reprint of the original 1st ed. 2004)
Alexandre Giulietti, Bruno Bougard, Liesbet Van Der Perre
R2,619 Discovery Miles 26 190 Ships in 18 - 22 working days

PREFACE The increasing demand on high data rate and quality of service in wireless communication has to cope with limited bandwidth and energy resources. More than 50 years ago, Shannon has paved the way to optimal usage of bandwidth and energy resources by bounding the spectral efficiency vs. signal to noise ratio trade-off. However, as any information theorist, Shannon told us what is the best we can do but not how to do it [1]. In this view, turbo codes are like a dream come true: they allow approaching the theoretical Shannon capacity limit very closely. However, for the designer who wants to implement these codes, at first sight they appear to be a nightmare. We came a huge step closer in striving the theoretical limit, but see the historical axiom repeated on a different scale: we know we can achieve excellent performance with turbo codes, but not how to realize this in real devices.

Information Systems Security - 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings... Information Systems Security - 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings (Paperback, 2012 ed.)
Venkat Venkatakrishnan, Diganta Goswami
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.

Secure Broadcast Communication - In Wired and Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2003):... Secure Broadcast Communication - In Wired and Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2003)
Adrian Perrig, J. D. Tygar
R2,638 Discovery Miles 26 380 Ships in 18 - 22 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings... Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings (Paperback, Edition.)
Javier Lopez, Gene Tsudik
R1,479 Discovery Miles 14 790 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

Advances in Cryptology - Proceedings of Crypto 83 (Paperback, Softcover reprint of the original 1st ed. 1984): David Chaum Advances in Cryptology - Proceedings of Crypto 83 (Paperback, Softcover reprint of the original 1st ed. 1984)
David Chaum
R1,465 Discovery Miles 14 650 Ships in 18 - 22 working days

An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen years ago. The intrinsic fascination of the field certainly is part of the explanation. Another factor may be that many sense the importance and potential consequences of this work, as we move into the information age. I believe that the various meetings devoted to cryptology over the past few years have contributed quite significantly to the formation of this community, by allowing those in the field to get to know each other and by providing for rapid exchange of ideas. CRYPTO 83 was once again truly the cryptologic event of the year. Many of the most active participants continue to attend each year, and attendance continues to grow at a healthy rate. The informal and collegial atmosphere and the beach side setting which contribute to the popularity of the event were again supported by flawless weather. The absence of parallel sessions seemed to provide a welcome opportunity to keep abreast of developments in the various areas of activity. Each session of the meeting organized by the program committee is repre sented by a section in the present volume. The papers were accepted by the program committee based on abstracts, and appear here without having been otherwise refereed. The last section contains papers presented at the informal rump session. A keyword index and an author index to the papers is provided at the end of the volume."

Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings... Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings (Paperback, Edition.)
Simone Fischer-Hubner, Nicholas Hopper
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2011, held in Waterloo, Canada, in July 2011.
The 15 revised full papers were carefully reviewed and selected from 61 submissions. The papers address design and realization of privacy services for the Internet, other data systems and communication networks. Presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems the volume also features novel technical contributions from other communities such as law, business, and data protection authorities, that present their perspectives on technological issues.

Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers... Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers (Paperback, 2012)
Frederik Armknecht, Stefan Lucks
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011. The 10 revised full papers were carefully reviewed and selected from numerour submissions. The papers span a wide spectrum of topics from foundations of cryptology, upto secret-key cryptosystems and hash functions, public-key cryptosystems, modes of operation, cryptographic protocols, hardware and software implementation of cryptosystems and their integration into secure systems, and applications such as watermarking and code obfuscation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ministry Of Crime - An Underworld…
Mandy Wiener Paperback R290 R263 Discovery Miles 2 630
Just Earth - How A Fairer World Will…
Tony Juniper Hardcover R522 Discovery Miles 5 220
Staten Island Slayings - Murderers…
Patricia M. Salmon Paperback R488 R453 Discovery Miles 4 530
Phenomenology in Adaptation Planning…
Hendricus Andy Simarmata Hardcover R2,512 R1,881 Discovery Miles 18 810
Data-Driven Solutions to Transportation…
Yinhai Wang, Ziqiang Zeng Paperback R2,058 Discovery Miles 20 580
The Mystery of Mary Stuart
Andrew Lang Paperback R677 Discovery Miles 6 770
Blood On Her Hands - South Africa's Most…
Tanya Farber Paperback R300 R268 Discovery Miles 2 680
Beyond the Tape - The Life and Many…
Marie Cassidy Paperback R461 Discovery Miles 4 610
Natural Disasters
D.E. Alexander Hardcover R4,366 Discovery Miles 43 660
Computational Approaches to the Network…
Liangyue Li, Hanghang Tong Hardcover R1,405 Discovery Miles 14 050

 

Partners