0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (84)
  • R500+ (1,895)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Theoretical Computer Science - Introduction to Automata, Computability, Complexity, Algorithmics, Randomization, Communication,... Theoretical Computer Science - Introduction to Automata, Computability, Complexity, Algorithmics, Randomization, Communication, and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2011)
Juraj Hromkovic
R2,866 Discovery Miles 28 660 Ships in 18 - 22 working days

Juraj Hromkovic takes the reader on an elegant route through the theoretical fundamentals of computer science. The author shows that theoretical computer science is a fascinating discipline, full of spectacular contributions and miracles. The book also presents the development of the computer scientist's way of thinking as well as fundamental concepts such as approximation and randomization in algorithmics, and the basic ideas of cryptography and interconnection network design.

Public Key Cryptography - PKC 2009 - 12th International Conference on Practice and Theory in Public Key Cryptography Irvine,... Public Key Cryptography - PKC 2009 - 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, CA, USA, March 18-20, 2009, Proceedings (Paperback, 2009 ed.)
Stanislaw Jarecki, Gene Tsudik
R1,473 Discovery Miles 14 730 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009.

The 28 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on number theory, applications and protocols, multi-party protocols, identity-based encryption, signatures, encryption, new cryptosystems and optimizations, as well as group signatures and anonymous credentials.

A Classical Introduction to Cryptography - Applications for Communications Security (Paperback, Softcover reprint of hardcover... A Classical Introduction to Cryptography - Applications for Communications Security (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Serge Vaudenay
R2,421 Discovery Miles 24 210 Ships in 18 - 22 working days

A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes.

This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes.

A Classical Introduction to Cryptography: Applications for Communications Security is designed for upper-level undergraduate and graduate-level students in computer science. This book is also suitable for researchers and practitioners in industry. A separate exercise/solution booklet is available as well, please go to www.springeronline.com under author: Vaudenay for additional details on how to purchase this booklet.

Progress in Cryptology -  INDOCRYPT 2009 - 10th International Conference on Cryptology in India, New Delhi, India, December... Progress in Cryptology - INDOCRYPT 2009 - 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings (Paperback, 2009 ed.)
Bimal Kumar Roy, Nicolas Sendrier
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.

The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.

Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009,... Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Dimitris Gritzalis, Javier Lopez
R2,697 Discovery Miles 26 970 Ships in 18 - 22 working days

It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18-20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long history. This volume contains the papers selected for presentation at SEC 2009. In response to the call for papers, 176 papers were submitted to the conference. All of them were evaluated on the basis of their novelty and technical quality, and reviewed by at least two members of the conference Program Committee. Of the papers submitted, 39 were selected for presentation at the conference; the acceptance rate was as low as 22%, thus making the conference a highly competitive forum. It is the commitment of several people that makes international conferences pos- ble. That also holds true for SEC 2009. The list of people who volunteered their time and energy to help is really long.

How to Write Good Programs - A Guide for Students (Paperback): Perdita Stevens How to Write Good Programs - A Guide for Students (Paperback)
Perdita Stevens
R592 Discovery Miles 5 920 Ships in 10 - 15 working days

Learning to program isn't just learning the details of a programming language: to become a good programmer you have to become expert at debugging, testing, writing clear code and generally unsticking yourself when you get stuck, while to do well in a programming course you have to learn to score highly in coursework and exams. Featuring tips, stories and explanations of key terms, this book teaches these skills explicitly. Examples in Python, Java and Haskell are included, helping you to gain transferable programming skills whichever language you are learning. Intended for students in Higher or Further Education studying early programming courses, it will help you succeed in, and get the most out of, your course, and support you in developing the software engineering habits that lead to good programs.

Digital Watermarking - 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings (Paperback, 2008... Digital Watermarking - 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings (Paperback, 2008 ed.)
Yun Q. Shi, Hyoung Joong Kim, Stefan Katzenbeisser
R1,462 Discovery Miles 14 620 Ships in 18 - 22 working days

th It is our great pleasure to present in this volume the proceedings of the 6 Inter- tional Workshop on Digital Watermarking (IWDW), which was held in Guangzhou, China, during December 3-5, 2007. The workshop was hosted by the Sun Yat-sen University and sponsored by both the National Science Foundation of China and the Korea Institute of Information Security and Cryptology. Since its birth in the early 1990s, digital watermarking has become a mature e- bling technology for solving security problems associated with multimedia distribution schemes. Digital watermarks are now used in applications such as broadcast monit- ing, movie fingerprinting, digital rights management, and document authentication, to name but a few. Still, many research challenges remain open, among them security and robustness issues, reversibility and authentication. Continuing the tradition of previous workshops, IWDW 2007 also featured-besides papers dealing with digital watermarking-contributions from other related fields, such as steganography, ste- nalysis and digital forensics.

Decrypted Secrets - Methods and Maxims of Cryptology (Paperback, 4th ed. 2007): Friedrich L. Bauer Decrypted Secrets - Methods and Maxims of Cryptology (Paperback, 4th ed. 2007)
Friedrich L. Bauer
R5,214 Discovery Miles 52 140 Ships in 18 - 22 working days

In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the unscrupulous. The revised and extended third edition of this classic reference work on cryptology offers a wealth of new technical and biographical details. The book presupposes only elementary mathematical knowledge. Spiced with exciting, amusing, and sometimes personal accounts from the history of cryptology, it will interest general a broad readership.

Advances in Cryptology - ASIACRYPT 2008 - 14th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2008 - 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008 (Paperback, 2008 ed.)
Josef Pawel Pieprzyk
R1,487 Discovery Miles 14 870 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008.

The 33 revised full papers presented together with the abstract of 1 invited lecture were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash functions, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and analysis of stream ciphers.

Critical Information Infrastructures Security - Second International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October... Critical Information Infrastructures Security - Second International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October 3-5, 2007 (Paperback, 2008 ed.)
Bernhard Hammerli
R1,430 Discovery Miles 14 300 Ships in 18 - 22 working days

This volume contains the post-proceedings of the Second International Workshop on Critical Information Infrastructure Security (CRITIS 2007), that was held during October 3-5, 2007 in Benalmadena-Costa (Malaga), Spain, and was hosted by the University of Malaga, Computer Science Department. In response to the 2007 call for papers, 75 papers were submitted. Each paper was reviewed by three members of the Program Committee, on the basis of significance, novelty, technical quality and critical infrastructures relevance of the work reported therein. At the end of the reviewing process, only 29 papers were selected for pres- tation. Revisions were not checked and the authors bear full responsibility for the content of their papers. CRITIS 2007 was very fortunate to have four exceptional invited speakers: Adrian Gheorghe (Old Dominion University, USA), Paulo Verissimo (Universidade de L- boa, Portugal), Donald Dudenhoeffer (Idaho National Labs, USA), and Jacques Bus (European Commission, INFSO Unit "Security"). The four provided a high added value to the quality of the conference with very significant talks on different and int- esting aspects of Critical Information Infrastructures. In 2007, CRITIS demonstrated its outstanding quality in this research area by - cluding ITCIP, which definitively reinforced the workshop. Additionally, the solid involvement of the IEEE community on CIP was a key factor for the success of the event. Moreover, CRITIS received sponsorship from Telecom Italia, JRC of the European Commission, IRRIIS, IFIP, and IABG, to whom we are greatly indebted."

String Processing and Information Retrieval - 15th International Symposium, SPIRE 2008, Melbourne, Australia, November 10-12,... String Processing and Information Retrieval - 15th International Symposium, SPIRE 2008, Melbourne, Australia, November 10-12, 2008. Proceedings (Paperback, 2009 ed.)
Amihood Amir, Andrew Turpin, Alistair Moffat
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days

This volumecontainsthe paperspresented atthe 15thString Processingand - formation Retrieval Symposium (SPIRE), held in Melbourne, Australia, during November 10-12, 2008. The papers presented at the symposium were selected from 54 papers s- mitted in response to the Call For Papers. Each submission was reviewed by a minimum of two, and usually three, Program Committee members, who are expertsdrawnfromaroundthe globe. Thecommittee accepted25papers (46%), with the successful authors also covering a broad rangeof continents. The paper "An E?cient Linear Space Algorithm for Consecutive Su?x Alignment Under Edit Distance" by Heikki Hyyr] o was selected for the Best Paper Award, while Dina Sokol was awarded the Best Reviewer Award for excellent contributions to the reviewing process. The program also included two invited talks: David Hawking, chief scientist at the Internet and enterprise search company Funn- back Pty. Ltd. based in Australia; and Gad Landau, from the Department of Computer Science at Haifa University, Israel. SPIRE has its origins in the South American Workshop on String Proce- ing which was ?rst held in 1993. Starting in 1998, the focus of the symposium was broadened to include the area of information retrieval due to the c- mon emphasis on information processing. The ?rst 14 meetings were held in Belo Horizonte, Brazil (1993); Valparaiso, Chile (1995); Recife, Brazil (1996); Valparaiso, Chile (1997); Santa Cruz, Bolivia (1998); Cancun, Mexico (1999); A Corun a, Spain(2000);LagunaSanRafael, Chile(2001);Lisbon, Portugal(2002); Manaus, Brazil (2003); Padova, Italy (2004); Buenos Aires, Argentina (2005); Glasgow, UK (2006); and Santiago, Chile (2007)."

Theory of Quantum Computation, Communication, and Cryptography - Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February... Theory of Quantum Computation, Communication, and Cryptography - Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008, Revised Selected Papers (Paperback, 2008 ed.)
Yasuhito Kawano, Michele Mosca
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

TheWorkshoponTheoryofQuantumComputation, Communication, andCr- tography (TQC) focuses on theoretical aspects of quantum computation, qu- tum communication, and quantum cryptography, which are part of a larger interdisciplinary ?eld that casts information science in a quantum mechanical framework. The third TQC was held from January 30 to February 1, 2008, at the U- versity of Tokyo, Tokyo, Japan. It consisted of invited talks, contributed talks and a poster session. A selection of these contributors were invited to submit a paper to this Lecture Notes in Computer Science (LNCS) proceedings. The ?eld of quantum information processing is rapidly growing in depth and in breadth. TQC is a workshop dedicated to the presentation and discussion of original research. While most research in quantum information is published in a wide range of journals and conference proceedings in computer science, physics, mathematics and other traditional areas of science, there is a growing nicheforhigh-qualityjournalsandproceedingsdedicatedtoresearchinquantum information. TQC is one of the ?rst such conferences or workshops that has decided to publish a selection of the submissions in an o?cial proceedings of the workshop to be published in the LNCS series. We are extremely fortunate to have had the support and advice of our P- gramCommittee(listedhere)andareverygratefulforalltheirhardwork.Wealso appreciatethehelpofthefollowingadditionalreviewers: Jean-ChristianBoileau, Jop Briet, David Feder, Francois Le Gall, Hector Garcia, Tohya Hiroshima, and CaseyMyers. WealsoextendoursincerethankstothelocalOrganizingCommitteeforpulling togetherallthelocalandlogisticalaspectsoftheworkshopsosuccessfully. Lastly, many thanks to NTT for sponsoring TQC 2008, to the University of Tokyo for their generous support, and to Springer for agreeing to publish these proceedings in the LNCS seri

Information Systems, Technology and Management - 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13,... Information Systems, Technology and Management - 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings (Paperback, Edition.)
Sushil K. Prasad, Bundit Thipakorn, Mahadeo P. Jaiswal, Sartaj Sahni, Harrick M. Vin
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the 4th International Conference on Information Systems, Technology and Management, ICISTM 2010, held in Bangkok, Thailand, in March 2010. The 28 revised full papers presented together with 3 keynote lectures, 9 short papers, and 2 tutorial papers were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on information systems, information technology, information management, and applications.

Replication - Theory and Practice (Paperback, Edition.): Bernadette Charron-Bost, Fernando Pedone, Andre Schiper Replication - Theory and Practice (Paperback, Edition.)
Bernadette Charron-Bost, Fernando Pedone, Andre Schiper
R2,204 Discovery Miles 22 040 Ships in 18 - 22 working days

Replication is a topic of interest in the distributed computing, distributed systems, and database communities. Although these communities have traditionally looked at replication from different viewpoints and with different goals (e.g., performance versus fault tolerance), recent developments have led to a convergence of these different goals. The objective of this state-of-the-art survey is not to speculate about the future of replication, but rather to understand the present, to make an assessment of approximately 30 years of research on replication, and to present a comprehensive view of the achievements made during this period of time.

This book is the outcome of the seminar entitled A 30-Year Perspective on Replication, which was held at Monte Verit, Ascona, Switzerland, in November 2007. The book is organized in 13 self-contained chapters written by most of the people who have contributed to developing state-of-the-art replication techniques. It presents a comprehensive view of existing solutions, from a theoretical as well as from a practical point of view. It covers replication of processes/objects and of databases; replication for fault tolerance and replication for performance - benign faults and malicious (Byzantine) faults - thus forming a basis for both professionals and students of distributed computing, distributed systems, and databases.

Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008.... Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings (Paperback, 2008 ed.)
Liqun Chen, Mark Ryan, Guilin Wang
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

The10thInternationalConferenceonInformationandCommunicationsSecurity (ICICS) was held in Birmingham, UK, during 20-22 October 2008. The ICICS conference series is an established forum that brings together people working in di?erent ?elds of information and communications security from universities, researchinstitutes, industryandgovernmentinstitutions, andgivestheattendees the opportunity to exchange new ideas and investigate state-of-the-art devel- ments. In previous years, ICICS has taken place in China (2007, 2005, 2003, 2001, 1997), USA (2006), Spain (2004), Singapore (2002), and Australia (1999). On each occasion, as on this one, the proceedings were published in the Springer LNCS series. In total, 125 papers from 33 countries were submitted to ICICS 2008, and 27 were accepted covering multiple disciplines of information security and applied cryptography(acceptancerate22%).EachsubmissiontoICICS2008wasano- mously reviewed by three or four reviewers. We are grateful to the Programme Committee, whichwascomposedof57membersfrom12countries;wethankthem aswellasallexternalrefereesfortheirtimeandvaluedcontributionstothetough andtime-consuming reviewingprocess. In addition to the contributed speakers, the programme also featured three invitedspeakers.We aregratefulto JoshuaGuttman (The MITRE Corporation, USA), Peng Ning (North Carolina State University, USA), and Nigel Smart (University of Bristol, UK) for accepting our invitation to speak. ICICS 2008 was organised by the University of Birmingham and Hewlett Packard Laboratories. We gratefully acknowledge sponsorship from the UK - gineering and Physical Sciences Research Council (EPSRC), as well as Hewlett Packard and the University of Birmin

Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings... Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings (Paperback, 2008 ed.)
Johannes Buchmann, Jintai Ding
R1,634 Discovery Miles 16 340 Ships in 18 - 22 working days

Threedecadesagopublic-keycryptosystemsmadea revolutionarybreakthrough in cryptography. They have developed into an indispensable part of our m- ern communication system. In practical applications RSA, DSA, ECDSA, and similar public key cryptosystems are commonly used. Their security depends on assumptions about the di?culty of certain problems in number theory, such as the Integer Prime Factorization Problem or the Discrete Logarithm Problem. However, in 1994 Peter Shor showed that quantum computers could break any public-key cryptosystembased on these hard number theory problems. This means that if a reasonably powerful quantum computer could be built, it would put essentially all modern communication into peril. In 2001, Isaac Chuang and NeilGershenfeldimplemented Shor'salgorithmona7-qubitquantumcomputer. In 2007 a 16-qubit quantum computer was demonstrated by a start-up company with the prediction that a 512-qubit or even a 1024-qubit quantum computer would become available in 2008. Some physicists predicted that within the next 10 to 20 years quantum computers will be built that are su?ciently powerful to implement Shor's ideas and to break all existing public key schemes. Thus we need to look ahead to a future of quantum computers, and we need to prepare the cryptographic world for that future.

Network and Parallel Computing - IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings... Network and Parallel Computing - IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings (Paperback, 2008 ed.)
Jian Cao, Minglu Li, Min-You Wu, Jinjun Chen
R1,430 Discovery Miles 14 300 Ships in 18 - 22 working days

Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China. NPC has been a premier conference that has brought together researchers and pr- titioners from academia, industry and governments around the world to advance the theories and technologies of network and parallel computing. The goal of NPC is to establish an international forum for researchers and practitioners to present their - cellent ideas and experiences in all system fields of network and parallel computing. The main focus of NPC 2008 was on the most critical areas of network and parallel computing, network technologies, network applications, network and parallel archit- tures, and parallel and distributed software. In total, the conference received more than 140 papers from researchers and prac- tioners. Each paper was reviewed by at least two internationally renowned referees and selected based on its originality, significance, correctness, relevance, and clarity of presentation. Among the high-quality submissions, only 32 regular papers were accepted by the conferences. All of the selected conference papers are included in the conference proceedings. After the conference, some high-quality papers will be r- ommended to be published in the special issue of international journals. We were delighted to host three well-known international scholars offering the k- note speeches, Sajal K. Das from University Texas at Arlington USA, Matt Mutka from Michigan State University and David Hung-Chang Du from University of M- nesota University of Minnesota.

Computer Security - ESORICS 2008 - 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008.... Computer Security - ESORICS 2008 - 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008. Proceedings (Paperback, 2008 ed.)
Sushil Jajodia
R1,495 Discovery Miles 14 950 Ships in 18 - 22 working days

These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security--ESORICS 2008--held October 6-8, 2008 in Torremolinos (Malaga), Spain, and hosted by the University of Malaga, C- puter Science Department. ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in different European countries. From 2002 it has taken place yearly. It attracts an international audience from both the academic and industrial communities. In response to the call for papers, 168 papers were submitted to the symposium. These papers were evaluated on the basis of their significance, novelty, and technical quality. Each paper was reviewed by at least three members of the Program Comm- tee. The Program Committee meeting was held electronically, holding intensive d- cussion over a period of two weeks. Finally, 37 papers were selected for presentation at the symposium, giving an acceptance rate of 22%.

Quantum Communication and Quantum Networking - First International Conference, QuantumComm 2009, Naples, Italy, October 26-30,... Quantum Communication and Quantum Networking - First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009, Revised Selected Papers (Paperback, Edition.)
Alexander Sergienko, Saverio Pascazio, Paolo Villoresi
R1,417 Discovery Miles 14 170 Ships in 18 - 22 working days

QUANTUMCOMM 2009--the International Conference on Quantum Communi- tion and Quantum Networking (from satellite to nanoscale)--took place in Vico Equense near Naples, Italy, during October 26-30, 2009. The conference made a significant step toward stimulating direct dialogue between the communities of quantum physics and quantum information researchers who work with photons, atoms, and electrons in pursuit of the common goal of investigating and utilizing the transfer of physical information between quantum systems. This meeting brought together experts in quantum communication, quantum inf- mation processing, quantum nanoscale physics, quantum photonics, and networking. In the light of traditional approaches to quantum information processing, quantum communication mainly deals with encoding and securely distributing quantum states of light in optical fiber or in free space in order to provide the technical means for quantum cryptography applications. Exciting advances in the area of quantum c- munication over the last decade have made the metropolitan quantum network a re- ity. Several papers presented at this meeting have demonstrated that quantum crypt- raphy is approaching the point of becoming a high-tech application rather than a - search subject. The natural distance limitation of quantum cryptography has been significantly augmented using ideas of global quantum communication with stab- orbit satellites. The results presented at this conference demonstrated that practical secure satellite communication is clearly within reach.

Cryptology and Network Security - 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings... Cryptology and Network Security - 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings (Paperback, 2009 ed.)
Juan A. Garay, Akira Otsuka
R2,723 Discovery Miles 27 230 Ships in 18 - 22 working days

The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan, during December 12-14, 2009. The conference was jointly co-organized by the NationalInstituteofAdvancedIndustrialScienceandTechnology(AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). In ad- tion, the event was supported by the Special Interest Group on Computer Se- rity (CSEC), IPSJ, Japan, the Japan Technical Group on Information Security (ISEC), IEICE, the Japan Technical Committee on Information and Com- nication System Security(ICSS), IEICE, and the Society of Information Theory and its Applications (SITA), Japan, and co-sponsored by the National Ins- tute of Information and Communications Technology, Japan, ComWorth Co., LTD, Japan, Hitachi, Ltd., Hokuriku Telecommunication Network Co., Inc., and Internet Initiative Japan Inc. The conference received 109 submissions from 24 countries, out of which 32 were accepted for publication in these proceedings. At least three Program Committee (PC) members reviewed each submitted paper, while submissions co-authored by a PC member were submitted to the more stringent evaluation of ?ve PC members. In addition to the PC members, many external reviewers joinedthereviewprocessintheirparticularareasofexpertise. Wewerefortunate to have this energetic team of experts, and are deeply grateful to all of them for their hard work, which included a very active discussion phase-almost as long as the initial individual reviewing period. The paper submission, review and discussion processes were e?ectively and e?ciently made possible by the Web-based system iChair.

Information Hiding - 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers... Information Hiding - 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers (Paperback, 2008 ed.)
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow
R1,433 Discovery Miles 14 330 Ships in 18 - 22 working days

th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19-21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applications. We received a total of 64 papers from all over the globe, and would like to take this opportunity to thank all the authors who submitted their paper to IH 2008 and thus contributed to the consolidation of the reputation of the conference. The papers were refereed by at least three revi- ers who provided detailed comments, which was followed by discussion amongst the Program Committee members. Only 25 papers were selected for presentation. This rigorous review process will certainly strengthen Information Hiding's po- tion as the top forum of our community.

Selected Areas in Cryptography - 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised... Selected Areas in Cryptography - 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Michael J. Jacobson, Vincent Rijmen, Rei Safavi-Naini
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary,in Calgary, Alberta, Canada, during August 13-14, 2009. There were 74 participants from 19 countries. Previous workshops in this series were held at Queens University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of - terloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), Concordia University in Montreal (2006), University of Ottawa (2007), and Mount Allison University in Sackville (2008). The themes for SAC 2009 were: 1. Design and analysis of symmetric key primitives and cryptosystems, incl- ing block and stream ciphers, hash functions, and MAC algorithms 2. E?cient implementations of symmetric and public key algorithms 3. Mathematical and algorithmic aspects of applied cryptology 4. Privacy enhancing cryptographic systems This included the traditional themes (the ?rst three) together with a special theme for 2009 workshop (fourth theme).

Forensics in Telecommunications, Information and Multimedia - Second International Conference, e-Forensics 2009, Adelaide,... Forensics in Telecommunications, Information and Multimedia - Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Matthew Sorell
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

The Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics 2009) took place in Adelaide, South Australia during January 19-21, 2009, at the Australian National Wine Centre, University of Adelaide. In addition to the peer-reviewed academic papers presented in this volume, the c- ference featured a significant number of plenary contributions from recognized - tional and international leaders in digital forensic investigation. Keynote speaker Andy Jones, head of security research at British Telecom, outlined the emerging challenges of investigation as new devices enter the market. These - clude the impact of solid-state memory, ultra-portable devices, and distributed storage - also known as cloud computing. The plenary session on Digital Forensics Practice included Troy O'Malley, Que- sland Police Service, who outlined the paperless case file system now in use in Que- sland, noting that efficiency and efficacy gains in using the system have now meant that police can arrive at a suspect's home before the suspect! Joseph Razik, represe- ing Patrick Perrot of the Institut de Recherche Criminelle de la Gendarmerie Nati- ale, France, summarized research activities in speech, image, video and multimedia at the IRCGN. The plenary session on The Interaction Between Technology and Law brought a legal perspective to the technological challenges of digital forensic investigation.

Protecting Persons While Protecting the People - Second Annual Workshop on Information Privacy and National Security, ISIPS... Protecting Persons While Protecting the People - Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers (Paperback, 2009 ed.)
Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of C- munication and Information at Rutgers University, was held on May 12, 2008 at the Hyatt Regency, New Brunswick, New Jersey, USA. A few of the papers in this volume were produced through a multi-step process. First, we recorded the talk given by each author at the workshop in May 2008. Next, we transcribed the recording. The authors then produced a draft of their paper from these transcriptions, refining each draft until the final version. Although the papers are not verbatim transcriptions of the talks given, some do retain the informal and conv- sational quality of the presentations. In one instance we have included some material from the question-and-answer period after the talk, since the material covered proved to be relevant and interesting. The majority of authors, however, preferred to include a more formal paper based on the material presented at the workshop.

Software and Data Technolgoies - Third International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008 (Paperback,... Software and Data Technolgoies - Third International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008 (Paperback, 2009 ed.)
Jose Cordeiro, Boris Shishkov, Alpesh Kumar Ranchordas, Markus Helfert
R1,394 Discovery Miles 13 940 Ships in 18 - 22 working days

This book contains the best papers of the Third International Conference on Software and Data Technologies (ICSOFT 2008), held in Porto, Portugal, which was organized by the Institute for Systems and Technologies of Information, Communication and Control (INSTICC), co-sponsored by the Workflow Management Coalition (WfMC), in cooperation with the Interdisciplinary Institute for Collaboration and Research on Enterprise Systems and Technology (IICREST). The purpose of ICSOFT 2008 was to bring together researchers, engineers and practitioners interested in information technology and software development. The conference tracks were "Software Engineering", "Information Systems and Data Management", "Programming Languages", "Distributed and Parallel Systems" and "Knowledge Engineering". Being crucial for the development of information systems, software and data te- nologies encompass a large number of research topics and applications: from imp- mentation-related issues to more abstract theoretical aspects of software engineering; from databases and data-warehouses to management information systems and kno- edge-base systems; next to that, distributed systems, pervasive computing, data qu- ity and other related topics are included in the scope of this conference.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Recent Advances in Multimedia Signal…
Mislav Grgic, Kresimir Delac, … Hardcover R4,131 Discovery Miles 41 310
Radical transparency and digital…
Luke Heemsbergen Hardcover R2,676 Discovery Miles 26 760
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160
Technical Articles about the Voynich…
National Security Agency Hardcover R697 Discovery Miles 6 970
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
New Research on the Voynich Manuscript…
National Security Agency Hardcover R691 Discovery Miles 6 910

 

Partners