0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (91)
  • R500+ (1,943)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday (Paperback, 2013):... Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday (Paperback, 2013)
Marc Fischlin, Stefan Katzenbeisser
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

Johannes Buchmann is internationally recognized as one of the leading figures in areas of computational number theory, cryptography and information security. He has published numerous scientific papers and books spanning a very wide spectrum of interests; besides R&D he also fulfilled lots of administrative tasks for instance building up and directing his research group CDC at Darmstadt, but he also served as the Dean of the Department of Computer Science at TU Darmstadt and then went on to become Vice President of the university for six years (2001-2007). This festschrift, published in honor of Johannes Buchmann on the occasion of his 60th birthday, contains contributions by some of his colleagues, former students and friends. The papers give an overview of Johannes Buchmann's research interests, ranging from computational number theory and the hardness of cryptographic assumptions to more application-oriented topics such as privacy and hardware security. With this book we celebrate Johannes Buchmann's vision and achievements.

Selected Areas in Cryptography (Paperback, Softcover reprint of the original 1st ed. 1997): Evangelos Kranakis, Paul C.Van... Selected Areas in Cryptography (Paperback, Softcover reprint of the original 1st ed. 1997)
Evangelos Kranakis, Paul C.Van Oorschot
R2,822 Discovery Miles 28 220 Ships in 10 - 15 working days

Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area. Selected Areas in Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Security in the Information Society - Visions and Perspectives (Paperback, Softcover reprint of the original 1st ed. 2002):... Security in the Information Society - Visions and Perspectives (Paperback, Softcover reprint of the original 1st ed. 2002)
M.Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan
R4,438 Discovery Miles 44 380 Ships in 10 - 15 working days

Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as Information gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking.Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: * Information Security Management; * Standards of Information Security; * Threats and Attacks to Information; * Education and Curriculum for Information Security; * Social and Ethical Aspects of Information Security; * Information Security Services; * Multilateral Security; * Applications of Information Security; * Infrastructure for Information Security * Advanced Topics in Security; * Legislation for Information Security; * Modeling and Analysis for Information Security; * Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt.

Preserving Privacy in Data Outsourcing (Paperback, 2011 ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Paperback, 2011 ed.)
Sara Foresti
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Foreword by Pierangela Samarati

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data; it allows the data owner to outsource not only the data but the security policy itself. The last section of this book investigates the problem of executing queries over possible data distributed at different servers. Case Studies will be provided.

About this book:

Exclusively focuses on addressing protection of confidential information in the emerging data outsourcing scenarios.

Presents relevant and critical novel problems and novel techniques, a precious reference point to students, researchers, and developers in this field.

Provides a comprehensive overview of the data protection problem in outsourcing scenarios, as well as a rigorous analysis and formalization of the problem and solutions to it.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Security Protocols XVII - 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers (Paperback, 2013... Security Protocols XVII - 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers (Paperback, 2013 ed.)
Bruce Christianson, James A Malcolm, Vashek Matyas, Michael Roe
R1,546 Discovery Miles 15 460 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols, SP 2009, held in Cambridge, UK, in April 2009. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Brief Encounters". In the old days, security protocols were typically run first as preliminaries to, and later to maintain, relatively stable continuing relationships between relatively unchanging individual entities. Pervasive computing, e-bay and second life have shifted the ground: we now frequently desire a secure commitment to a particular community of entities, but relatively transient relationships with individual members of it, and we are often more interested in validating attributes than identity. The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.

Data Privacy Management and Autonomous Spontaneous Security - 7th International Workshop, DPM 2012, and 5th International... Data Privacy Management and Autonomous Spontaneous Security - 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Roberto Di Pietro, Javier Herranz, Ernesto Damiani, Radu State
R1,537 Discovery Miles 15 370 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management.

Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November... Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings (Paperback, 2013 ed.)
Kazuo Sakiyama, Masayuki Terada
R1,532 Discovery Miles 15 320 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in Okinawa, Japan, in November 2013. The 20 revised selected papers presented in this volume were carefully reviewed and selected from 63 submissions. They are organized in topical sections named: software and system security, cryptanalysis, privacy and cloud computing, public key cryptosystems, and security protocols.

Secure IT Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings (Paperback,... Secure IT Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings (Paperback, 2013 ed.)
Hanne Riis Nielsen, Dieter Gollmann
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013. The 18 revised regular papers together with 3 short papers and one invited talk were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security policies, information flow, security experiences, Web security, and network security.

Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25-... Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings (Paperback, 2013 ed.)
Ed Dawson
R1,558 Discovery Miles 15 580 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.

Critical Information Infrastructure Security - 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9,... Critical Information Infrastructure Security - 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers (Paperback, 2013 ed.)
Sandro Bologna, Bernhard Hammerli, Dimitris Gritzalis, Stephen Wolthusen
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with all areas of critical infrastructure protection research.

Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers (Paperback, 2012... Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers (Paperback, 2012 ed.)
Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, UK, in April 2012. Following the tradition of this workshop series, each paper war revised by the authors to incorporate ideas from the workshop, and is followed in these proceedings by an edited transcription of the presentation and ensuing discussion. The volume contains 14 papers with their transcriptions as well as an introduction, i.e. 29 contributions in total. The theme of the workshop was "Bringing protocols to life."

Information Security Applications - 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised... Information Security Applications - 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers (Paperback, 2012 ed.)
Dong Hoon Lee, Moti Yung
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.

Cryptology and Network Security - 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012.... Cryptology and Network Security - 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings (Paperback, 2012 ed.)
Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis
R1,531 Discovery Miles 15 310 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selected from 99 submissions. The papers are organized in topical sections on cryptanalysis; network security; cryptographic protocols; encryption; and s-box theory.

Codes, Graphs, and Systems - A Celebration of the Life and Career of G. David Forney, Jr. on the Occasion of his Sixtieth... Codes, Graphs, and Systems - A Celebration of the Life and Career of G. David Forney, Jr. on the Occasion of his Sixtieth Birthday (Paperback, Softcover reprint of the original 1st ed. 2002)
Richard E Blahut, Ralf Koetter
R4,378 Discovery Miles 43 780 Ships in 10 - 15 working days

Foreword by James L. Massey. Codes, Graphs, and Systems is an excellent reference for both academic researchers and professional engineers working in the fields of communications and signal processing. A collection of contributions from world-renowned experts in coding theory, information theory, and signal processing, the book provides a broad perspective on contemporary research in these areas. Survey articles are also included. Specific topics covered include convolutional codes and turbo codes; detection and equalization; modems; physics and information theory; lattices and geometry; and behaviors and codes on graphs. Codes, Graphs, and Systems is a tribute to the leadership and profound influence of G. David Forney, Jr. The 35 contributors to the volume have assembled their work in his honor.

Spyware and Adware (Paperback, 2011 ed.): John Aycock Spyware and Adware (Paperback, 2011 ed.)
John Aycock
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.

Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings... Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings (Paperback, 2012 ed.)
Yang Xiang, Javier Lopez, C.-C.Jay Kuo, Wanlei Zhou
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Australia, in December 2012. The 30 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 105 submissions. The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn systems, network and cloud security, wireless security, security protocols and models.

Mathematics and Computer Science II - Algorithms, Trees, Combinatorics and Probabilities (Paperback, Softcover reprint of the... Mathematics and Computer Science II - Algorithms, Trees, Combinatorics and Probabilities (Paperback, Softcover reprint of the original 1st ed. 2002)
Brigitte Chauvin, Philippe Flajolet, Daniele Gardy, Abdelkader Mokkadem
R2,952 Discovery Miles 29 520 Ships in 10 - 15 working days

This is the second volume in a series of innovative proceedings entirely devoted to the connections between mathematics and computer science. Here mathematics and computer science are directly confronted and joined to tackle intricate problems in computer science with deep and innovative mathematical approaches.

The book serves as an outstanding tool and a main information source for a large public in applied mathematics, discrete mathematics and computer science, including researchers, teachers, graduate students and engineers. It provides an overview of the current questions in computer science and the related modern and powerful mathematical methods. The range of applications is very wide and reaches beyond computer science.

Elliptic Curves and Their Applications to Cryptography - An Introduction (Paperback, Softcover reprint of the original 1st ed.... Elliptic Curves and Their Applications to Cryptography - An Introduction (Paperback, Softcover reprint of the original 1st ed. 1999)
Andreas Enge
R6,282 Discovery Miles 62 820 Ships in 10 - 15 working days

Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems. Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the elegant mathematical theory underlying cryptosystems is considerably more involved than for other systems, this text requires the reader to have only an elementary knowledge of basic algebra. The text nevertheless leads to problems at the forefront of current research, featuring chapters on point counting algorithms and security issues. The Adopted unifying approach treats with equal care elliptic curves over fields of even characteristic, which are especially suited for hardware implementations, and curves over fields of odd characteristic, which have traditionally received more attention. Elliptic Curves and Their Applications: An Introduction has been used successfully for teaching advanced undergraduate courses. It will be of greatest interest to mathematicians, computer scientists, and engineers who are curious about elliptic curve cryptography in practice, without losing the beauty of the underlying mathematics.

Finite Commutative Rings and Their Applications (Paperback, Softcover reprint of the original 1st ed. 2002): Gilberto Bini,... Finite Commutative Rings and Their Applications (Paperback, Softcover reprint of the original 1st ed. 2002)
Gilberto Bini, Flaminio Flamini
R2,843 Discovery Miles 28 430 Ships in 10 - 15 working days

Foreword by Dieter Jungnickel Finite Commutative Rings and their Applications answers a need for an introductory reference in finite commutative ring theory as applied to information and communication theory. This book will be of interest to both professional and academic researchers in the fields of communication and coding theory. The book is a concrete and self-contained introduction to finite commutative local rings, focusing in particular on Galois and Quasi-Galois rings. The reader is provided with an active and concrete approach to the study of the purely algebraic structure and properties of finite commutative rings (in particular, Galois rings) as well as to their applications to coding theory. Finite Commutative Rings and their Applications is the first to address both theoretical and practical aspects of finite ring theory. The authors provide a practical approach to finite rings through explanatory examples, thereby avoiding an abstract presentation of the subject. The section on Quasi-Galois rings presents new and unpublished results as well. The authors then introduce some applications of finite rings, in particular Galois rings, to coding theory, using a solid algebraic and geometric theoretical background.

Turbo Codes - Desirable and Designable (Paperback, Softcover reprint of the original 1st ed. 2004): Alexandre Giulietti, Bruno... Turbo Codes - Desirable and Designable (Paperback, Softcover reprint of the original 1st ed. 2004)
Alexandre Giulietti, Bruno Bougard, Liesbet Van Der Perre
R2,836 Discovery Miles 28 360 Ships in 10 - 15 working days

PREFACE The increasing demand on high data rate and quality of service in wireless communication has to cope with limited bandwidth and energy resources. More than 50 years ago, Shannon has paved the way to optimal usage of bandwidth and energy resources by bounding the spectral efficiency vs. signal to noise ratio trade-off. However, as any information theorist, Shannon told us what is the best we can do but not how to do it [1]. In this view, turbo codes are like a dream come true: they allow approaching the theoretical Shannon capacity limit very closely. However, for the designer who wants to implement these codes, at first sight they appear to be a nightmare. We came a huge step closer in striving the theoretical limit, but see the historical axiom repeated on a different scale: we know we can achieve excellent performance with turbo codes, but not how to realize this in real devices.

Progress in Cryptology - INDOCRYPT 2012 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14,... Progress in Cryptology - INDOCRYPT 2012 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, Proceedings (Paperback, 2012)
Steven Galbraith, Mridul Nandi
R1,605 Discovery Miles 16 050 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Synchronizing E-Security (Paperback, Softcover reprint of the original 1st ed. 2004): Godfried B. Williams Synchronizing E-Security (Paperback, Softcover reprint of the original 1st ed. 2004)
Godfried B. Williams
R2,821 Discovery Miles 28 210 Ships in 10 - 15 working days

Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user.

Advances in Information Technology - 5th International Conference, IAIT 2012, Bangkok, Thailand, December 6-7, 2012,... Advances in Information Technology - 5th International Conference, IAIT 2012, Bangkok, Thailand, December 6-7, 2012, Proceedings (Paperback, 2012 ed.)
Borworn Papasratorn, Nipon Charoenkitkarn, Kittichai Lavangnananda, Wichian Chutimaskul, Vajirasak Vanijja
R1,496 Discovery Miles 14 960 Ships in 10 - 15 working days

This book constitutes the proceedings of the 5th International Conference on Advances in Information Technology, IAIT 2012, held in Bangkok, Thailand, in December 2012. The 18 revised papers presented in this volume were carefully reviewed and selected from 37 submissions. They deal with all areas related to applied information technology, such as e-service; information and communication technology; intelligent systems; information management; and platform technology.

Applications of Data Mining in Computer Security (Paperback, Softcover reprint of the original 1st ed. 2002): Daniel Barbara,... Applications of Data Mining in Computer Security (Paperback, Softcover reprint of the original 1st ed. 2002)
Daniel Barbara, Sushil Jajodia
R2,868 Discovery Miles 28 680 Ships in 10 - 15 working days

Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security. Applications Of Data Mining In Computer Security concentrates heavily on the use of data mining in the area of intrusion detection. The reason for this is twofold. First, the volume of data dealing with both network and host activity is so large that it makes it an ideal candidate for using data mining techniques. Second, intrusion detection is an extremely critical activity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence.

Secure Broadcast Communication - In Wired and Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2003):... Secure Broadcast Communication - In Wired and Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2003)
Adrian Perrig, J. D. Tygar
R2,858 Discovery Miles 28 580 Ships in 10 - 15 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
R for SAS and SPSS Users
Robert A. Muenchen Hardcover R4,659 Discovery Miles 46 590
A First Course in the Finite Element…
Daryl Logan Paperback R1,438 R1,333 Discovery Miles 13 330
The Data Quality Blueprint - A Practical…
John Parkinson Hardcover R1,703 Discovery Miles 17 030
CompTIA Data+ DA0-001 Exam Cram
Akhil Behl, Sivasubramanian Digital product license key R1,769 R1,084 Discovery Miles 10 840
Algorithms for Data and Computation…
Alex X. Liu, Rui Li Hardcover R3,916 Discovery Miles 39 160
Markov Processes and Quantum Theory
Masao Nagasawa Hardcover R3,908 Discovery Miles 39 080
Inductive Databases and Constraint-Based…
Saso Dzeroski, Bart Goethals, … Hardcover R3,148 Discovery Miles 31 480
Growth Curve Models and Applications…
Ratan Dasgupta Hardcover R4,439 R3,581 Discovery Miles 35 810
Smart Information Systems…
Frank Hopfgartner Hardcover R3,327 R2,220 Discovery Miles 22 200
Fundamentals of Data Engineering - Plan…
Joe Reis Paperback R1,569 R1,377 Discovery Miles 13 770

 

Partners