0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (19)
  • R250 - R500 (87)
  • R500+ (1,897)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September... Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers (Paperback, 2010 ed.)
Yan Chen, Tassos D. Dimitriou, Jianying Zhou
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece.

The 19 revised full papers and 7 revised short papers were carefully reviewed and selected from 76 submissions.

The papers cover various topics such as wireless network security, network intrusion detection, security and privacy for the general internet, malware and misbehavior, sensor networks, key management, credentials and authentications, as well as secure multicast and emerging technologies.

Information Security - 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings (Paperback, 2009... Information Security - 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings (Paperback, 2009 ed.)
Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
R2,715 Discovery Miles 27 150 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009.

The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services.

Smart Spaces and Next Generation Wired/Wireless Networking - 9th International Conference, NEW2AN 2009 and Second Conference on... Smart Spaces and Next Generation Wired/Wireless Networking - 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009, Proceedings (Paperback, 2009 ed.)
Sergey Balandin, Dmitri Moltchanov, Yevgeni Koucheryavy
R1,435 Discovery Miles 14 350 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN 2009, held in conjunction with the Second Conference on Smart Spaces, ruSMART 2009 in St. Petersburg, Russia, in September 2009.

The 32 revised full papers presented were carefully reviewed and selected from a total of 82 submissions. The NEW2AN papers are organized in topical sections on teletraffic issues; traffic measurements, modeling, and control; peer-to-peer systems; security issues; wireless networks: ad hoc and mesh; and wireless networks: capacity and mobility. The ruSMART papers start with an invited talk followed by 10 papers on smart spaces.

Handbook of Biometrics (Paperback, Softcover reprint of hardcover 1st ed. 2008): Anil K. Jain, Patrick Flynn, Arun A. Ross Handbook of Biometrics (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Anil K. Jain, Patrick Flynn, Arun A. Ross
R4,289 Discovery Miles 42 890 Ships in 18 - 22 working days

Biometrics is a rapidly evolving field with applications ranging from accessing one 's computer to gaining entry into a country. The deployment of large-scale biometric systems in both commercial and government applications has increased public awareness of this technology. Recent years have seen significant growth in biometric research resulting in the development of innovative sensors, new algorithms, enhanced test methodologies and novel applications. This book addresses this void by inviting some of the prominent researchers in Biometrics to contribute chapters describing the fundamentals as well as the latest innovations in their respective areas of expertise.

Privacy, Security and Trust within the Context of Pervasive Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005):... Privacy, Security and Trust within the Context of Pervasive Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Philip Robinson, Harald Vogt, Waleed Wagealla
R2,623 Discovery Miles 26 230 Ships in 18 - 22 working days

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria.

The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic" problems, leading to a more complete understanding of the social and technical issues in pervasive computing.

Identity and Privacy in the Internet Age - 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16... Identity and Privacy in the Internet Age - 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings (Paperback, 2009 ed.)
Audun Josang, Torleiv Maseng, Svein J. Knapskog
R1,413 Discovery Miles 14 130 Ships in 18 - 22 working days

The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within computer security in the Nordic countries - thereby establishing a forum for discussions and co-operation between universities, industry and computer societies. Since then, the workshop has developed into a fully fledged inter- tional information security conference, held in the Nordic countries on a round robin basis. The 14th Nordic Conference on Secure IT Systems was held in Oslo on 14-16 October 2009. Under the theme Identity and Privacy in the Internet Age, this year's conference explored policies, strategies and technologies for protecting identities and the growing flow of personal information passing through the Internet and mobile n- works under an increasingly serious threat picture. Among the contemporary security issues discussed were security services modeling, Petri nets, attack graphs, electronic voting schemes, anonymous payment schemes, mobile ID-protocols, SIM cards, n- work embedded systems, trust, wireless sensor networks, privacy, privacy disclosure regulations, financial cryptography, PIN verification, temporal access control, random number generators, and some more. As a pre-cursor to the conference proper, the Nordic Security Day on Wednesday 14 October hosted talks by leading representatives from industry, academia and the g- ernment sector, and a press conference was given.

Knowledge, Complexity and Innovation Systems (Paperback, Softcover reprint of hardcover 1st ed. 2001): Manfred M. Fischer,... Knowledge, Complexity and Innovation Systems (Paperback, Softcover reprint of hardcover 1st ed. 2001)
Manfred M. Fischer, Josef Froehlich
R4,065 Discovery Miles 40 650 Ships in 18 - 22 working days

In recent years there has been growing scientific interest in the triangular relationship between knowledge. complexity and innovation systems. The concept of'innovation systems' carries the idea that innovations do not originate as isolated discrete phenomena, but are generated through the interaction of a number of actors or agents. This set of actors and interactions possess certain specific characteristics that tend to remain over time. Such characteristics are also shared by national, regional, sectoral and technological interaction systems. They can all be represented as sets of institutional] actors and interactions, whose ultimate goal is the production and diffusion of knowledge. The major theoretical and policy problem posed by these systems is that knowledge is generated not only by individuals and organisations, but also by the often complex pattern of interaction between them. To understand how organisations create new products, new production techniques and new organisational forms is important. An even more fundamental need is to understand how organisations create new knowledge if this knowledge creation lies in the mobilisation and conversion of tacit knowledge. Although much has been written about the importance of knowledge in management, little attention has been paid to how knowledge is created and how the knowledge creation process is managed. The third component of the research triangle concerns complexity."

Fast Software Encryption - 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers... Fast Software Encryption - 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers (Paperback, 2009 ed.)
Orr Dunkelman
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days

FastSoftwareEncryption2009wasthe16thin a seriesofworkshopsonsymm- ric key cryptography. Starting from 2002, it is sponsored by the International Association for Cryptologic Research (IACR). FSE 2009 was held in Leuven, Belgium, after previous venues held in Cambridge, UK (1993, 1996), Leuven, Belgium (1994, 2002), Haifa, Israel (1997), Paris, France (1998, 2005), Rome, Italy (1999), New York, USA (2000), Yokohama, Japan (2001), Lund, Sweden (2003), New Delhi, India (2004), Graz, Austria (2006), Luxembourg, Lux- bourg (2007), and Lausanne, Switzerland (2008). The workshop's main topic is symmetric key cryptography, including the designoffast andsecuresymmetrickeyprimitives,suchas block ciphers,stream ciphers, hash functions, message authentication codes, modes of operation and iteration, as well as the theoretical foundations of these primitives. This year, 76 papers were submitted to FSE including a large portion of papers on hash functions, following the NIST SHA-3 competition, whose wo- shop was held just after FSE in the same location. From the 76 papers, 24 were accepted for presentation. It is my pleasure to thank all the authors of all s- missions for the high-quality research, which is the base for the scienti?c value of the workshop. The review process was thorough (each submission received the attention of at least three reviewers), and at the end, besides the accepted papers, the Committee decided that the merits of the paper "Blockcipher-Based Hashing Revisited" entitled the authors to receive the best paper award. I wish to thank all Committee members and the referees for their hard and dedicated work.

Security in E-Learning (Paperback, Softcover reprint of hardcover 1st ed. 2005): Edgar R. Weippl Security in E-Learning (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Edgar R. Weippl
R2,629 Discovery Miles 26 290 Ships in 18 - 22 working days

As e-learning increases in popularity and reach, more people are taking online courses and need to understand the relevant security issues. This book discusses typical threats to e-learning projects, introducing how they have been and should be addressed.

Number Theory for Computing (Paperback, Softcover reprint of hardcover 2nd ed. 2002): M. E. Hellmann Number Theory for Computing (Paperback, Softcover reprint of hardcover 2nd ed. 2002)
M. E. Hellmann; Song Y. Yan
R1,679 Discovery Miles 16 790 Ships in 18 - 22 working days

This book provides a good introduction to the classical elementary number theory and the modern algorithmic number theory, and their applications in computing and information technology, including computer systems design, cryptography and network security. In this second edition proofs of many theorems have been provided, further additions and corrections were made.

Global Initiatives to Secure Cyberspace - An Emerging Landscape (Paperback, Softcover reprint of hardcover 1st ed. 2009):... Global Initiatives to Secure Cyberspace - An Emerging Landscape (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Michael Portnoy, Seymour Goodman
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations promoting global initiatives to secure cyberspace. The authors provide a breakdown and analysis of organizations by type, - cluding international, regional, private-public, and non-governmental organi- tions. Concluding with a discussion of the progress made in recent years, the study explores current trends regarding the effectiveness and scope of coverage provided by these organizations and addresses several questions concerning the overall state of international cyber security. The authors would like to thank Mr. Anthony Rutkowski for generously p- viding his time, guidance, and support. The authors would also like to thank the International Telecommunication Union (ITU) Telecommunication Development Sector (ITU-D) and the United States National Science Foundation (NSF Grant R3772) for partially supporting the research conducted in this study. In addition, the authors would like to thank the Georgia Institute of Technology's Center for International Strategy, Technology, and Policy (CISTP) for assistance in hosting the Cyber Security Organization Catalog, and the Georgia Tech Information Se- rity Center (GTISC) for cooperation and promotion of this study. Table of Contents 1 The International Landscape of Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 A Brief History of Global Responses to Cyber Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Understanding Intrusion Detection through Visualization (Paperback, Softcover reprint of hardcover 1st ed. 2006): Stefan... Understanding Intrusion Detection through Visualization (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Stefan Axelsson, David Sands
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Computer security - the protection of data and computer systems from intentional, malicious intervention - is attracting increasing attention. Much work has gone into development of tools to detect ongoing or already perpetrated attacks, but a key shortfall in current intrusion detection systems is the high number of false alarms they produce. This book analyzes the false alarm problem, then applies results from the field of information visualization to the problem of intrusion detection. Four different visualization approaches are presented, mainly applied to data from web server access logs.

Topics in Geometry, Coding Theory and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2007): Arnaldo Garcia,... Topics in Geometry, Coding Theory and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Arnaldo Garcia, Henning Stichtenoth
R1,388 Discovery Miles 13 880 Ships in 18 - 22 working days

The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppas discovery of algebraic geometry codes around 1980, many applications of function fields were found in different areas of mathematics and information theory. This book presents survey articles on some of these new developments. The topics focus on material which has not yet been presented in other books or survey articles.

Critical Infrastructure Protection II (Paperback, Softcover reprint of hardcover 1st ed. 2008): Mauricio Papa, Sujeet Shenoi Critical Infrastructure Protection II (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Mauricio Papa, Sujeet Shenoi
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.

This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working... Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Steve Furnell; Edited by (ghost editors) Paul Dowland; Edited by Bhavani Thuraisingham, X.Sean Wang
R2,679 Discovery Miles 26 790 Ships in 18 - 22 working days

This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D.

Asymmetry: The Foundation of Information (Paperback, Softcover reprint of hardcover 1st ed. 2007): Scott J. Muller Asymmetry: The Foundation of Information (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Scott J. Muller
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book gathers concepts of information across diverse fields -physics, electrical engineering and computational science - surveying current theories, discussing underlying notions of symmetry, and showing how the capacity of a system to distinguish itself relates to information. The author develops a formal methodology using group theory, leading to the application of Burnside's Lemma to count distinguishable states. This provides a tool to quantify complexity and information capacity in any physical system.

Net-Centric Approaches to Intelligence and National Security (Paperback, Softcover reprint of hardcover 1st ed. 2005): Roy... Net-Centric Approaches to Intelligence and National Security (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Roy Ladner, Frederick E. Petry
R2,625 Discovery Miles 26 250 Ships in 18 - 22 working days

The development of net-centric approaches for intelligence and national security applications has become a major concern in many areas such as defense, intelligence and national and international law enforcement agencies. In this volume we consider the web architectures and recent developments that make n- centric approaches for intelligence and national security possible. These include developments in information integration and recent advances in web services including the concept of the semantic web. Discovery, analysis and management of web-available data pose a number of interesting challenges for research in w- based management systems. Intelligent agents and data mining are some of the techniques that can be employed. A number of specific systems that are net-centric based in various areas of military applications, intelligence and law enforcement are presented that utilize one or more of such techniques The opening chapter overviews the concepts related to ontologies which now form much of the basis of the possibility of sharing of information in the Semantic Web. In the next chapter an overview of Web Services and examples of the use of Web Services for net-centric operations as applied to meteorological and oceanographic (MetOc) data is presented and issues related to the Navy's use of MetOc Web Services are discussed. The third chapter focuses on metadata as conceived to support the concepts of a service-oriented architecture and, in particular, as it relates to the DoD Net-Centric Data Strategy and the NCES core services.

Privacy-Respecting Intrusion Detection (Paperback, Softcover reprint of hardcover 1st ed. 2007): Ulrich Flegel Privacy-Respecting Intrusion Detection (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Ulrich Flegel
R3,772 Discovery Miles 37 720 Ships in 18 - 22 working days

Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. Also, it limits the recovery of personal data to pseudonyms involved in a detected misuse scenario. The book includes case studies demonstrating this theory, and solutions that are constructively validated by providing algorithms.

Intrusion Detection Systems (Paperback, Softcover reprint of hardcover 1st ed. 2008): Roberto Di Pietro, Luigi V. Mancini Intrusion Detection Systems (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Roberto Di Pietro, Luigi V. Mancini
R4,215 Discovery Miles 42 150 Ships in 18 - 22 working days

To defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls are widely deployed to monitor networks and hosts. These various IDSs will flag alerts when suspicious events are observed. This book is an edited volume by world class leaders within computer network and information security presented in an easy-to-follow style. It introduces defense alert systems against computer and network attacks. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more.

Global Security, Safety, and Sustainability - 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009,... Global Security, Safety, and Sustainability - 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009, Proceedings (Paperback, 2009 ed.)
Hamid Jahankhani, Ali G. Hessami, Feng Hsu
R1,396 Discovery Miles 13 960 Ships in 18 - 22 working days

The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The 2009 two-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, s- cial events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors. The conference provided an opportunity for systems scientists, assurance researchers, owners, ope- tors and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in these challenging domains while networking with the leading researchers and solution providers. ICGS3 2009 received paper submissions from more than 20 different countries around the world. Only 28 papers were selected and were presented as full papers. The program also included three keynote lectures by leading researchers, security professionals and government representatives. June 2009 Hamid Jahankhani Ali Hessami Feng Hsu

Advanced Intelligent Environments (Paperback, Softcover reprint of hardcover 1st ed. 2009): Wolfgang Minker, Michael Weber,... Advanced Intelligent Environments (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Wolfgang Minker, Michael Weber, Hani Hagras, Victor Callagan, Achilles Kameas
R4,015 Discovery Miles 40 150 Ships in 18 - 22 working days

Over the last decade a number of research areas have contributed to the concept of advanced intelligent environments, these include ubiquitous computing, pervasive computing, embedded intelligence, intelligent user interfaces, human factors, intelligent buildings, mobile communications, domestic robots, intelligent sensors, artistic and architectural design and ambient intelligence. Undeniably, multimodal spoken language dialogue interaction is a key factor in ensuring natural interaction and therefore of particular interest for advanced intelligent environments. It will therefore represent one focus of the proposed book. The book will cover all key topics in the field of intelligent environments from a variety of leading researchers. It will bring together several perspectives in research and development in the area.

Precoding Techniques for Digital Communication Systems (Paperback, Softcover reprint of hardcover 1st ed. 2008): C.C. Kuo,... Precoding Techniques for Digital Communication Systems (Paperback, Softcover reprint of hardcover 1st ed. 2008)
C.C. Kuo, Shang-ho Tsai, Layla Tadjpour, Yu-hao Chang
R2,663 Discovery Miles 26 630 Ships in 18 - 22 working days

During the past two decades, many communication techniques have been developed to achieve various goals such as higher data rate, more robust link quality, andmoreusercapacityinmorerigorouschannelconditions.Themost well known are, for instance, CDMA, OFDM, MIMO, multiuser OFDM, and UWB systems.All these systems havetheir ownunique superioritywhile they also induce other drawbacks that limit the system performance. Conventional way to overcome the drawback is to impose most of the computational e?ort in the receiver side and let the transmitter design much simpler than receiver. The fact is that, however, by leveraging reasonable computational e?ort to the transmitter, the receiver design can be greatly simpli?ed. For instance, multiaccess interference (MAI) has long been considered to limit the perf- mance of multiuser systems. Popular solutions to mitigate MAI issue include multiuser detection (MUD) or sophisticated signal processing for interference cancellation such as PIC or SIC. However, those solutions impose great b- den in the receiver. In this case, precoding o?er good solutions to achieve simple transceiver designs as we will mention later in this book. This book is intended to provide a comprehensive review of precoding techniques for digital communications systems from a signal processing p- spective. The variety of selected precoding techniques and their applications makes this book quite di?erent from other texts about precoding techniques in digital communication engineering

A Classical Introduction to Cryptography - Applications for Communications Security (Paperback, Softcover reprint of hardcover... A Classical Introduction to Cryptography - Applications for Communications Security (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Serge Vaudenay
R2,217 Discovery Miles 22 170 Ships in 18 - 22 working days

A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes.

This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes.

A Classical Introduction to Cryptography: Applications for Communications Security is designed for upper-level undergraduate and graduate-level students in computer science. This book is also suitable for researchers and practitioners in industry. A separate exercise/solution booklet is available as well, please go to www.springeronline.com under author: Vaudenay for additional details on how to purchase this booklet.

Access Control Systems - Security, Identity Management and Trust Models (Paperback, Softcover reprint of hardcover 1st ed.... Access Control Systems - Security, Identity Management and Trust Models (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Messaoud Benantar
R3,083 Discovery Miles 30 830 Ships in 18 - 22 working days

This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind access control models, and addresses emerging access control mechanisms.

Information and Its Role in Nature (Paperback, Softcover reprint of hardcover 1st ed. 2005): Juan G. Roederer Information and Its Role in Nature (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Juan G. Roederer
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Information and Its Role in Nature presents an in-depth interdisciplinary discussion of the concept of information and its role in the control of natural processes. After a brief review of classical and quantum information theory, the author addresses numerous central questions, including: Is information reducible to the laws of physics and chemistry? Does the Universe, in its evolution, constantly generate new information? Or are information and information-processing exclusive attributes of living systems, related to the very definition of life? If so, what is the role of information in classical and quantum physics? In what ways does information-processing in the human brain bring about self-consciousness? Accessible to graduate students and professionals from all scientific disciplines, this stimulating book will help to shed light on many controversial issues at the heart of modern science.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Image Processing Based on Partial…
Xue-Cheng Tai, Knut-Andreas Lie, … Hardcover R5,213 Discovery Miles 52 130
L(2) Approaches in Several Complex…
Takeo Ohsawa Hardcover R3,128 Discovery Miles 31 280
Rational Belief - Structure, Grounds…
Robert Audi Hardcover R3,568 Discovery Miles 35 680
Simplicial Methods for Higher Categories…
Simona Paoli Hardcover R2,755 R1,971 Discovery Miles 19 710
The Phenomenal Self
Barry Dainton Hardcover R3,771 Discovery Miles 37 710
Linear Programming: Mathematics, Theory…
M. J. Panik Hardcover R5,416 Discovery Miles 54 160
Nonlinear Optimization - Models and…
William P. Fox Hardcover R2,811 Discovery Miles 28 110
Invitation to Linear Programming and…
David C. Vella Hardcover R3,000 R2,539 Discovery Miles 25 390
Analytic Hilbert Modules
Xiaoman Chen, Kunyu Guo Hardcover R5,484 Discovery Miles 54 840
Mathematics for Engineers and…
Huw Fox, William Bolton Paperback R1,292 Discovery Miles 12 920

 

Partners