0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (86)
  • R500+ (1,896)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems (Paperback, Softcover reprint of hardcover... Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Jerzy Pejas, Andrzej Piegat
R5,174 Discovery Miles 51 740 Ships in 18 - 22 working days

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. "Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms. "Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.

Number Theory in Science and Communication - With Applications in Cryptography, Physics, Digital Information, Computing, and... Number Theory in Science and Communication - With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity (Paperback, Softcover reprint of hardcover 5th ed. 2009)
Manfred Schroeder
R1,584 Discovery Miles 15 840 Ships in 18 - 22 working days

"Number Theory in Science and Communication" is a well-known introduction for non-mathematicians to this fascinating and useful branch of applied mathematics . It stresses intuitive understanding rather than abstract theory and highlights important concepts such as continued fractions, the golden ratio, quadratic residues and Chinese remainders, trapdoor functions, pseudo primes and primitive elements. Their applications to problems in the real world are one of the main themes of the book. This revised fifth edition is augmented by recent advances in coding theory, permutations and derangements and a chapter in quantum cryptography.

From reviews of earlier editions -

"I continue to find Schroeder's] Number Theory a goldmine of valuable information. It is a marvelous book, in touch with the most recent applications of number theory and written with great clarity and humor.' Philip Morrison (Scientific American)

"A light-hearted and readable volume with a wide range of applications to which the author has been a productive contributor - useful mathematics outside the formalities of theorem and proof." Martin Gardner

Information-Spectrum Methods in Information Theory (Paperback, Softcover reprint of the original 1st ed. 2001): H. Koga Information-Spectrum Methods in Information Theory (Paperback, Softcover reprint of the original 1st ed. 2001)
H. Koga; Te Sun Han
R2,724 Discovery Miles 27 240 Ships in 18 - 22 working days

From the reviews: "This book nicely complements the existing literature on information and coding theory by concentrating on arbitrary nonstationary and/or nonergodic sources and channels with arbitrarily large alphabets. Even with such generality the authors have managed to successfully reach a highly unconventional but very fertile exposition rendering new insights into many problems." -- MATHEMATICAL REVIEWS

Innovations in Digital Watermarking Techniques (Paperback, 2009 ed.): Feng-Hsing Wang Innovations in Digital Watermarking Techniques (Paperback, 2009 ed.)
Feng-Hsing Wang
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions. This book is directed to students, professors, researchers and application engineers who are interested in the area of information security.

Open Source Systems Security Certification (Paperback, Softcover reprint of hardcover 1st ed. 2009): Ernesto Damiani, Claudio... Open Source Systems Security Certification (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Ernesto Damiani, Claudio Agostino Ardagna, Nabil El Ioini
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Open Source Systems Security Certification discusses Security Certification Standards and establishes the need to certify open source tools and applications. This includes the international standard for the certification of IT products (software, firmware and hardware) Common Criteria (ISO/IEC 15408) (CC 2006), a certification officially adopted by the governments of 18 nations.

Without security certification, open source tools and applications are neither secure nor trustworthy. Open Source Systems Security Certification addresses and analyzes the urgency of security certification for security-sensible markets, such as telecommunications, government and the military, through provided case studies.

This volume is designed for professionals and companies trying to implement an Open Source Systems (OSS) aware IT governance strategy, and SMEs looking to attract new markets traditionally held by proprietary products or to reduce costs. This book is also suitable for researchers and advanced-level students.

Online Business Security Systems (Paperback, Softcover reprint of hardcover 1st ed. 2007): Godfried B. Williams Online Business Security Systems (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Godfried B. Williams
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).

Securing Biometrics Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008): Charles A. Shoniregun, Stephen... Securing Biometrics Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Charles A. Shoniregun, Stephen Crosier
R2,857 Discovery Miles 28 570 Ships in 18 - 22 working days

Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. Biometric devices are now available to capture biometric measurements such as fingerprints, palm, retinal scans, keystroke, voice recognition and facial scanning. However, the accuracy of these measurements varies, which has a direct relevance on the levels of security they offer. With the need to combat the problems related to identify theft and other security issues, society will have to compromise between security and personal freedoms. Securing Biometrics Applications investigates and identifies key impacts of biometric security applications, while discovering opportunities and challenges presented by the biometric technologies available.

A Classical Introduction to Cryptography Exercise Book (Paperback, Softcover reprint of hardcover 1st ed. 2006): Thomas... A Classical Introduction to Cryptography Exercise Book (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, Serge Vaudenay
R1,287 Discovery Miles 12 870 Ships in 18 - 22 working days

TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK by Thomas Baignkres, Palcal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay ISBN- 10: 0-387-27934-2 e-ISBN-10: 0-387-28835-X ISBN- 13: 978-0-387-27934-3 e-ISBN- 13: 978-0-387-28835-2 Printed on acid-free paper. O 2006 Springer Science+Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed in the United States of America.

Biometrics, Computer Security Systems and Artificial Intelligence Applications (Paperback, Softcover reprint of hardcover 1st... Biometrics, Computer Security Systems and Artificial Intelligence Applications (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Khalid Saeed, Jerzy Pejas, Romuald Mosdorf
R5,160 Discovery Miles 51 600 Ships in 18 - 22 working days

This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. The book contains over 30 articles by well-known scientists and engineers. The articles are extended versions of works introduced at the ACS-CISIM 2005 conference.

Intelligence and Security Informatics - Techniques and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008):... Intelligence and Security Informatics - Techniques and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Hsinchun Chen, Christopher C. Yang
R4,060 Discovery Miles 40 600 Ships in 18 - 22 working days

The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response

Knowledge Discovery and Data Mining - The Info-Fuzzy Network (IFN) Methodology (Paperback, Softcover reprint of hardcover 1st... Knowledge Discovery and Data Mining - The Info-Fuzzy Network (IFN) Methodology (Paperback, Softcover reprint of hardcover 1st ed. 2001)
O. Maimon, M. Last
R2,624 Discovery Miles 26 240 Ships in 18 - 22 working days

This book presents a specific and unified approach to Knowledge Discovery and Data Mining, termed IFN for Information Fuzzy Network methodology. Data Mining (DM) is the science of modelling and generalizing common patterns from large sets of multi-type data. DM is a part of KDD, which is the overall process for Knowledge Discovery in Databases. The accessibility and abundance of information today makes this a topic of particular importance and need. The book has three main parts complemented by appendices as well as software and project data that are accessible from the book's web site (http: //www.eng.tau.ac.iV-maimonlifn-kdg ). Part I (Chapters 1-4) starts with the topic of KDD and DM in general and makes reference to other works in the field, especially those related to the information theoretic approach. The remainder of the book presents our work, starting with the IFN theory and algorithms. Part II (Chapters 5-6) discusses the methodology of application and includes case studies. Then in Part III (Chapters 7-9) a comparative study is presented, concluding with some advanced methods and open problems. The IFN, being a generic methodology, applies to a variety of fields, such as manufacturing, finance, health care, medicine, insurance, and human resources. The appendices expand on the relevant theoretical background and present descriptions of sample projects (including detailed results)."

Dynamics and Randomness II (Paperback, Softcover reprint of hardcover 1st ed. 2004): Alejandro Maass, Servet Martinez, Jaime... Dynamics and Randomness II (Paperback, Softcover reprint of hardcover 1st ed. 2004)
Alejandro Maass, Servet Martinez, Jaime San Martin
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days

This book contains the lectures given at the II Canference an Dynamics and Randamness held at the Centro de Modelamiento Matematico of the Universidad de Chile, from December 9th to 13th, 2002. This meeting brought together mathematicians, theoretical physicists, theoretical computer scientists, and graduate students interested in fields related to probability theory, ergodic theory, symbolic and topological dynamics. We would like to express our gratitude to an the participants of the conference and to the people who contributed to its orga- nization. In particular, to Pierre Collet, BerIiard Rost and Karl Petersen for their scientific advise. We want to thank warmly the authors of each chapter for their stimulating lectures and for their manuscripts devoted to a various of appealing subjects in probability and dynamics: to Jean Bertoin for his course on Some aspects of random fragmentation in con- tinuous time; to Anton Bovier for his course on Metastability and ageing in stochastic dynamics; to Steve Lalley for his course on AI- gebraic systems of generat ing functions and return probabilities for random walks; to Elon Lindenstrauss for his course on Recurrent measures and measure rigidity; to Sylvie Meleard for her course on Stochastic particle approximations for two-dimensional N avier- Stokes equations; and to Anatoly Vershik for his course on Random and universal metric spaces.

Maximum Entropy, Information Without Probability and Complex Fractals - Classical and Quantum Approach (Paperback, Softcover... Maximum Entropy, Information Without Probability and Complex Fractals - Classical and Quantum Approach (Paperback, Softcover reprint of the original 1st ed. 2000)
Guy Jumarie
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Every thought is a throw of dice. Stephane Mallarme This book is the last one of a trilogy which reports a part of our research work over nearly thirty years (we discard our non-conventional results in automatic control theory and applications on the one hand, and fuzzy sets on the other), and its main key words are Information Theory, Entropy, Maximum Entropy Principle, Linguistics, Thermodynamics, Quantum Mechanics, Fractals, Fractional Brownian Motion, Stochastic Differential Equations of Order n, Stochastic Optimal Control, Computer Vision. Our obsession has been always the same: Shannon's information theory should play a basic role in the foundations of sciences, but subject to the condition that it be suitably generalized to allow us to deal with problems which are not necessarily related to communication engineering. With this objective in mind, two questions are of utmost importance: (i) How can we introduce meaning or significance of information in Shannon's information theory? (ii) How can we define and/or measure the amount of information involved in a form or a pattern without using a probabilistic scheme? It is obligatory to find suitable answers to these problems if we want to apply Shannon's theory to science with some chance of success. For instance, its use in biology has been very disappointing, for the very reason that the meaning of information is there of basic importance, and is not involved in this approach.

Coding for Wireless Channels (Paperback, Softcover reprint of hardcover 1st ed. 2005): Ezio Biglieri Coding for Wireless Channels (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Ezio Biglieri
R1,477 Discovery Miles 14 770 Ships in 18 - 22 working days

Accessible introduction to the theoretical foundations of modern coding theory

Including numerous applications to wireless transmission systems

The author is famous in the field of coding and wireless communications for his work in the area of faded channels & communcations.

Data Mining for Design and Manufacturing - Methods and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2002):... Data Mining for Design and Manufacturing - Methods and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2002)
D. Braha
R4,230 Discovery Miles 42 300 Ships in 18 - 22 working days

Data Mining for Design and Manufacturing: Methods and Applications is the first book that brings together research and applications for data mining within design and manufacturing. The aim of the book is 1) to clarify the integration of data mining in engineering design and manufacturing, 2) to present a wide range of domains to which data mining can be applied, 3) to demonstrate the essential need for symbiotic collaboration of expertise in design and manufacturing, data mining, and information technology, and 4) to illustrate how to overcome central problems in design and manufacturing environments. The book also presents formal tools required to extract valuable information from design and manufacturing data, and facilitates interdisciplinary problem solving for enhanced decision making. Audience: The book is aimed at both academic and practising audiences. It can serve as a reference or textbook for senior or graduate level students in Engineering, Computer, and Management Sciences who are interested in data mining technologies. The book will be useful for practitioners interested in utilizing data mining techniques in design and manufacturing as well as for computer software developers engaged in developing data mining tools.

RFID Security and Privacy - Concepts, Protocols, and Architectures (Paperback, Softcover reprint of hardcover 1st ed. 2008):... RFID Security and Privacy - Concepts, Protocols, and Architectures (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Dirk Henrici
R4,009 Discovery Miles 40 090 Ships in 18 - 22 working days

In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: "There must exist better solutions. " I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller ], whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me to do it. The paper became a success, and many other papers about new concepts and solutions followed. Now the answer is obvious: There exist better solutions. I have dealt with the topic over the past years. Now I want to share the basics as well as current research results with the reader. This book is surely not a bedside reading. But with all the presented concepts, it can broaden the mind of the reader concerning security, privacy, and RFIDsystems. Iwishthe reader many new insights. There are many people I would like to thank. First of all, my thanks go to my ] supervisor, Prof. Dr. Paul Muller. He gave me room for creativity and plenty of rope to work on my own."

Multiple Access Communications - 4th International Workshop, MACOM 2011, Trento, Italy, September 12-13, 2011. Proceedings... Multiple Access Communications - 4th International Workshop, MACOM 2011, Trento, Italy, September 12-13, 2011. Proceedings (Paperback, 2011)
Claudio Sacchi, Boris Bellalta, Alexey Vinel, Fabrizio Granelli, Yan Zhang, …
R1,741 Discovery Miles 17 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Workshop on Multiple Access Communications, MACOM 2011, held in Trento, Italy, in September 2011. The 21 full papers presented were carefully reviewed and selected from more than 40 submissions. They are divided in topical sections on cognitive radio; MAC protocols; communications theory; special session on MAC protocols for WSNs; system analysis and scheduling; and queuing systems.

Information, Coding and Mathematics - Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday (Paperback,... Information, Coding and Mathematics - Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday (Paperback, Softcover reprint of hardcover 1st ed. 2002)
Mario Blaum, Patrick G. Farrell, Henk C.A. van Tilborg
R4,038 Discovery Miles 40 380 Ships in 18 - 22 working days

Information, Coding and Mathematics is a classic reference for both professional and academic researchers working in error-correction coding and decoding, Shannon theory, cryptography, digital communications, information security, and electronic engineering. The work represents a collection of contributions from leading experts in turbo coding, cryptography and sequences, Shannon theory and coding bounds, and decoding theory and applications. All of the contributors have individually and collectively dedicated their work as a tribute to the outstanding work of Robert J. McEliece. Information, Coding and Mathematics covers the latest advances in the widely used and rapidly developing field of information and communication technology.

Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008): Keith Mayes,... Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Keith Mayes, Konstantinos Markantonakis
R3,347 Discovery Miles 33 470 Ships in 18 - 22 working days

Providing a broad overview of the many card systems and solutions in practical use today, this state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book cannot be found to match both the breadth and depth of content. The book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study. A step-by-step approach educates the reader and by the end of the book the reader should be able to play an educated role in a smart card related project.

Guide to Elliptic Curve Cryptography (Paperback, Softcover reprint of the original 1st ed. 2004): Darrel Hankerson, Alfred J.... Guide to Elliptic Curve Cryptography (Paperback, Softcover reprint of the original 1st ed. 2004)
Darrel Hankerson, Alfred J. Menezes, Scott Vanstone
R3,366 Discovery Miles 33 660 Ships in 18 - 22 working days

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.

Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application.
Features & Benefits:

* Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems

* Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology

* Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic
* Distills complex mathematics and algorithms for easy understanding
* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software tools
This comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.

Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings (Paperback, Edition.)
Masayuki Abe
R1,522 Discovery Miles 15 220 Ships in 18 - 22 working days

ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Coding and Cryptography Research Group of Nanyang Technological University. It was also supported by the Singapore Tourism Board, and co-sponsored by the - tional Research Foundation of Singapore, Lee Foundation, IBM Singapore Ltd., O'Connor'sSingaporeLtd., Pu?ersoftLtd., PrivylinkLtd., Hewlett-PackardS- gaporeLtd., JardineOneSolutionLtd., andSingaporeMathematicalSociety.San Ling chaired the conference and I served as the Program Chair. There were 216 valid submissions. The Program Committee aided by 221 external reviewers spent 83 days on reviews and discussions. They spared no e?ort to increase the quality of their reviews. Every paper received at least three independent reviews, and papers from the committee members received ?ve reviews. In total, there were more than 730 reviews followed by intensive discussion. This long and tough process, wrapped up with an intensive face-- facemeeting by the committeemembers convenedatUCSanta Barbara, yielded 35 accepted papers. I regret not being able to select more of such high-quality papers due to space limitations. The proceedings include the revised versions of the accepted papers. The authors are fully responsible for their contents."

Security for Telecommunications Networks (Paperback, Softcover reprint of hardcover 1st ed. 2008): Patrick Traynor, Patrick... Security for Telecommunications Networks (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Patrick Traynor, Patrick McDaniel, Thomas La Porta
R2,427 Discovery Miles 24 270 Ships in 18 - 22 working days

This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in computer science and electrical engineering.

Multivariate Public Key Cryptosystems (Paperback, Softcover reprint of hardcover 1st ed. 2006): Jintai Ding, Jason E. Gower,... Multivariate Public Key Cryptosystems (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Jintai Ding, Jason E. Gower, Dieter S Schmidt
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

Multivariate public key cryptosystems (MPKC) is a fast-developing area in cryptography. This book systematically presents the subject matter for a broad audience and is the first book to focus on this exciting new topic. Information security experts in industry can use the book as a guide for understanding what is needed to implement these cryptosystems for practical applications, and researchers in both computer science and mathematics will find it a good starting point for exploring this new field. It is also suitable as a textbook for advanced-level students.

New Approaches for Security, Privacy and Trust in Complex Environments - Proceedings of the IFIP TC 11 22nd International... New Approaches for Security, Privacy and Trust in Complex Environments - Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Hein Venter, Mariki Eloff, Les Labuschagne, Jan Eloff, Rossouw von Solms
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

The current IT environment deals with novel, complex approaches such as information privacy, trust, digital forensics, management, and human aspects. This volume includes papers offering research contributions that focus both on access control in complex environments as well as other aspects of computer security and privacy.

Embedded Security in Cars - Securing Current and Future Automotive IT Applications (Paperback, Softcover reprint of hardcover... Embedded Security in Cars - Securing Current and Future Automotive IT Applications (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Kerstin Lemke, Christof Paar, Marko Wolf
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive IT systems against manipulation or intrusion has only recently started to emerge.

Lemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive applications. After an introductory chapter written by the editors themselves, the contributions from experienced experts of different disciplines are structured into three parts. "Security in the Automotive Domain" describes applications for which IT security is crucial, like immobilizers, tachographs, and software updates. "Embedded Security Technologies" details security technologies relevant for automotive applications, e.g., symmetric and asymmetric cryptography, and wireless security. "Business Aspects of IT Systems in Cars" shows the need for embedded security in novel applications like location-based navigation systems and personalization.

The first book in this area of fast-growing economic and scientific importance, it is indispensable for both researchers in software or embedded security and professionals in the automotive industry.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Teachers' Manual for Freehand Drawing in…
Walter 1836-1886 Smith Hardcover R886 Discovery Miles 8 860
Sewing
Anonymous Hardcover R769 Discovery Miles 7 690
The Educator As Assessor In The Senior…
J.M. Dreyer, A.S. Mawela Paperback R241 Discovery Miles 2 410
Tom Brown's School Days / by Thomas…
Thomas Hughes, Charles Swain Thomas Hardcover R890 Discovery Miles 8 900
The Public School English Composition…
Frederick Henry 1863-1917 Sykes Hardcover R887 Discovery Miles 8 870
An English Spelling Book, With Reading…
William Corry Hardcover R768 Discovery Miles 7 680
Element's of Algebra - Designed for the…
John Herbert Sangster Hardcover R886 Discovery Miles 8 860
The Public School Arithmetic - Based on…
J a (James Alexander) 18 McLellan, A F (Albert Flintoft) Ames Hardcover R919 Discovery Miles 9 190
Geography Notes - For 3rd, 4th and 5th…
George E. Henderson Hardcover R759 Discovery Miles 7 590
An Abridged History of Canada…
W H (William Henry) 1839- Withrow, G Mercer (Graeme Mercer) 1830 Adam Hardcover R838 Discovery Miles 8 380

 

Partners