0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (90)
  • R500+ (1,936)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

VLSI-SoC: Advanced Topics on Systems on a Chip - A Selection of Extended Versions of the Best Papers of the Fourteenth... VLSI-SoC: Advanced Topics on Systems on a Chip - A Selection of Extended Versions of the Best Papers of the Fourteenth International Conference on Very Large Scale Integration of System on Chip (VLSI-SoC2007), October 15-17, 2007, Atlanta, USA (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Ricardo Reis, Vincent Mooney, Paul Hasler
R2,935 Discovery Miles 29 350 Ships in 10 - 15 working days

This book contains extended and revised versions of the best papers that were presented during the fifteenth edition of the IFIP/IEEE WG10.5 International Conference on Very Large Scale Integration, a global System-on-a-Chip Design & CAD conference. The 15th conference was held at the Georgia Institute of Technology, Atlanta, USA (October 15-17, 2007). Previous conferences have taken place in Edinburgh, Trondheim, Vancouver, Munich, Grenoble, Tokyo, Gramado, Lisbon, Montpellier, Darmstadt, Perth and Nice. The purpose of this conference, sponsored by IFIP TC 10 Working Group 10.5 and by the IEEE Council on Electronic Design Automation (CEDA), is to provide a forum to exchange ideas and show industrial and academic research results in the field of microelectronics design. The current trend toward increasing chip integration and technology process advancements brings about stimulating new challenges both at the physical and system-design levels, as well in the test of these systems. VLSI-SoC conferences aim to address these exciting new issues.

Handbook of Multibiometrics (Paperback, Softcover reprint of hardcover 1st ed. 2006): Arun A. Ross, Karthik Nandakumar, Anil K.... Handbook of Multibiometrics (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Arun A. Ross, Karthik Nandakumar, Anil K. Jain
R3,903 Discovery Miles 39 030 Ships in 10 - 15 working days

Details multimodal biometrics and its exceptional utility for increasingly reliable human recognition systems.

Reveals the substantial advantages of multimodal systems over conventional identification methods.

The United States of Anonymous - How the First Amendment Shaped Online Speech (Hardcover): Jeff Kosseff The United States of Anonymous - How the First Amendment Shaped Online Speech (Hardcover)
Jeff Kosseff
R686 R576 Discovery Miles 5 760 Save R110 (16%) Ships in 10 - 15 working days

In The United States of Anonymous, Jeff Kosseff explores how the right to anonymity has shaped American values, politics, business, security, and discourse, particularly as technology has enabled people to separate their identities from their communications. Legal and political debates surrounding online privacy often focus on the Fourth Amendment's protection against unreasonable searches and seizures, overlooking the history and future of an equally powerful privacy right: the First Amendment's protection of anonymity. The United States of Anonymous features extensive and engaging interviews with people involved in the highest profile anonymity cases, as well as with those who have benefited from, and been harmed by, anonymous communications. Through these interviews, Kosseff explores how courts have protected anonymity for decades and, likewise, how law and technology have allowed individuals to control how much, if any, identifying information is associated with their communications. From blocking laws that prevent Ku Klux Klan members from wearing masks to restraining Alabama officials from forcing the NAACP to disclose its membership lists, and to refusing companies' requests to unmask online critics, courts have recognized that anonymity is a vital part of our free speech protections. The United States of Anonymous weighs the tradeoffs between the right to hide identity and the harms of anonymity, concluding that we must maintain a strong, if not absolute, right to anonymous speech.

Algebraic and Stochastic Coding Theory (Hardcover): Dave K. Kythe, Prem K. Kythe Algebraic and Stochastic Coding Theory (Hardcover)
Dave K. Kythe, Prem K. Kythe
R4,853 Discovery Miles 48 530 Ships in 12 - 17 working days

Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes. It then examines codes based on the Galois field theory as well as their application in BCH and especially the Reed-Solomon codes that have been used for error correction of data transmissions in space missions. The major outlook in coding theory seems to be geared toward stochastic processes, and this book takes a bold step in this direction. As research focuses on error correction and recovery of erasures, the book discusses belief propagation and distributions. It examines the low-density parity-check and erasure codes that have opened up new approaches to improve wide-area network data transmission. It also describes modern codes, such as the Luby transform and Raptor codes, that are enabling new directions in high-speed transmission of very large data to multiple users. This robust, self-contained text fully explains coding problems, illustrating them with more than 200 examples. Combining theory and computational techniques, it will appeal not only to students but also to industry professionals, researchers, and academics in areas such as coding theory and signal and image processing.

XML for Bioinformatics (Paperback, Softcover reprint of hardcover 1st ed. 2005): Ethan Cerami XML for Bioinformatics (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Ethan Cerami
R1,689 Discovery Miles 16 890 Ships in 10 - 15 working days

Introduction The goal of this book is to introduce XML to a bioinformatics audience. It does so by introducing the fundamentals of XML, Document Type De?nitions (DTDs), XML Namespaces, XML Schema, and XML parsing, and illustrating these concepts with speci?c bioinformatics case studies. The book does not assume any previous knowledge of XML and is geared toward those who want a solid introduction to fundamental XML concepts. The book is divided into nine chapters: Chapter 1: Introduction to XML for Bioinformatics. This chapter provides an introduction to XML and describes the use of XML in biological data exchange. A bird's-eye view of our ?rst case study, the Distributed Annotation System (DAS), is provided and we examine a sample DAS XML document. The chapter concludes with a discussion of the pros and cons of using XML in bioinformatic applications. Chapter 2: Fundamentals of XML and BSML. This chapter introduces the fundamental concepts of XML and the Bioinformatic Sequence Markup Language (BSML). We explore the origins of XML, de?ne basic rules for XML document structure, and introduce XML Na- spaces. We also explore several sample BSML documents and visualize these documents in the TM Rescentris Genomic Workspace Viewer.

Information and Randomness - An Algorithmic Perspective (Paperback, Softcover reprint of hardcover 2nd ed. 2002): Cristian S.... Information and Randomness - An Algorithmic Perspective (Paperback, Softcover reprint of hardcover 2nd ed. 2002)
Cristian S. Calude
R1,851 Discovery Miles 18 510 Ships in 10 - 15 working days

The first edition of the monograph Information and Randomness: An Algorithmic Perspective by Crist ian Calude was published in 1994. In my Foreword I said: "The research in algorithmic information theory is already some 30 years old. However, only the recent years have witnessed a really vigorous growth in this area. . . . The present book by Calude fits very well in our series. Much original research is presented. . . making the approach richer in consequences than the classical one. Remarkably, however, the text is so self-contained and coherent that the book may also serve as a textbook. All proofs are given in the book and, thus, it is not necessary to consult other sources for classroom instruction. " The vigorous growth in the study of algorithmic information theory has continued during the past few years, which is clearly visible in the present second edition. Many new results, examples, exercises and open prob lems have been added. The additions include two entirely new chapters: "Computably Enumerable Random Reals" and "Randomness and Incom pleteness." The really comprehensive new bibliography makes the book very valuable for a researcher. The new results about the characterization of computably enumerable random reals, as well as the fascinating Omega Numbers, should contribute much to the value of the book as a textbook. The author has been directly involved in these results that have appeared in the prestigious journals Nature, New Scientist and Pour la Science."

Trends in Logic - 50 Years of Studia Logica (Paperback, Softcover reprint of hardcover 1st ed. 2003): Vincent F Hendricks,... Trends in Logic - 50 Years of Studia Logica (Paperback, Softcover reprint of hardcover 1st ed. 2003)
Vincent F Hendricks, Jacek Malinowski
R4,471 Discovery Miles 44 710 Ships in 10 - 15 working days

In 1953, exactly 50 years ago to this day, the first volume of Studia Logica appeared under the auspices of The Philosophical Committee of The Polish Academy of Sciences. Now, five decades later the present volume is dedicated to a celebration of this 50th Anniversary of Studia Logica. The volume features a series of papers by distinguished scholars reflecting both the aim and scope of this journal for symbolic logic.
The Anniversary volume offers contributions from J. van Benthem, W. Buszkowski, M.L. Dalla Chiara, M. Fitting, J.M. Font, R. Giuntini, R. Goldblatt, V. Marra, D. Mundici, R. Leporini, S.P. Odintsov, H. Ono, G. Priest, H. Wansing, V.R. Wojcicki and J. Zygmunt.

Secret Language - Codes, Tricks, Spies, Thieves, and Symbols (Paperback): Barry J Blake Secret Language - Codes, Tricks, Spies, Thieves, and Symbols (Paperback)
Barry J Blake
R366 R332 Discovery Miles 3 320 Save R34 (9%) Ships in 12 - 17 working days

This book is about language that is designed to mean what it does not seem to mean. Ciphers and codes conceal messages and protect secrets. Symbol and magic hide meanings to delight or imperil. Languages made to baffle and confuse let insiders talk openly without being understood by those beyond the circle. Barry Blake looks at these and many more. He explores the history and uses of the slangs and argots of schools and trades. He traces the centuries-old cants used by sailors and criminals in Britain, among them Polari, the mix of Italian, Yiddish, and slang once spoken among strolling players and circus folk and taken up by gays in the twentieth century. He examines the sacred languages of ancient cults and religions, uncovers the workings of onomancy, spells, and gematria, looks into the obliqueness of allusion and parody, and celebrates the absurdities of euphemism and jargon. Secret Language takes the reader on fascinating excursions down obscure byways of language, ranging across time and culture. With revelations on every page it will entertain anyone with an urge to know more about the most arcane and curious uses of language.

Modern Cryptography, Probabilistic Proofs and Pseudorandomness (Paperback, Softcover reprint of hardcover 1st ed. 1999): Oded... Modern Cryptography, Probabilistic Proofs and Pseudorandomness (Paperback, Softcover reprint of hardcover 1st ed. 1999)
Oded Goldreich
R3,684 Discovery Miles 36 840 Ships in 10 - 15 working days

Cryptography is one of the most active areas in current mathematics research and applications. This book focuses on cryptography along with two related areas: the study of probabilistic proof systems, and the theory of computational pseudorandomness. Following a common theme that explores the interplay between randomness and computation, the important notions in each field are covered, as well as novel ideas and insights.

Universal Compression and Retrieval (Paperback, Softcover reprint of hardcover 1st ed. 1994): R. Krichevsky Universal Compression and Retrieval (Paperback, Softcover reprint of hardcover 1st ed. 1994)
R. Krichevsky
R4,468 Discovery Miles 44 680 Ships in 10 - 15 working days

Objectives Computer and communication practice relies on data compression and dictionary search methods. They lean on a rapidly developing theory. Its exposition from a new viewpoint is the purpose of the book. We start from the very beginning and finish with the latest achievements of the theory, some of them in print for the first time. The book is intended for serving as both a monograph and a self-contained textbook. Information retrieval is the subject of the treatises by D. Knuth (1973) and K. Mehlhorn (1987). Data compression is the subject of source coding. It is a chapter of information theory. Its up-to-date state is presented in the books of Storer (1988), Lynch (1985), T. Bell et al. (1990). The difference between them and the present book is as follows. First. We include information retrieval into source coding instead of discussing it separately. Information-theoretic methods proved to be very effective in information search. Second. For many years the target of the source coding theory was the estimation of the maximal degree of the data compression. This target is practically bit today. The sought degree is now known for most of the sources. We believe that the next target must be the estimation of the price of approaching that degree. So, we are concerned with trade-off between complexity and quality of coding. Third. We pay special attention to universal families that contain a good com pressing map for every source in a set."

Advances in Digital Forensics - IFIP International Conference on Digital Forensics, National Center for Forensic Science,... Advances in Digital Forensics - IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005 (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Mark Pollitt, Sujeet Shenoi
R2,938 Discovery Miles 29 380 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure systems.

Advances in Digital Forensics describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include:

  • Themes and Issues in Digital Forensics
  • Investigative Techniques
  • Network Forensics
  • Portable Electronic Device Forensics
  • Linux and File System Forensics
  • Applications and Techniques

This book is the first volume of a new series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in February 2005.

Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Mark Pollitt is President of Digital Evidence Professional Services, Inc., Ellicott City, Maryland, USA. Mr. Pollitt, who is retired from the Federal Bureau of Investigation (FBI), served as the Chief of the FBI's Computer Analysis Response Team, and Director of the Regional Computer Forensic Laboratory National Program.

Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.

For more information about IFIP, please visit www.ifip.org.

Theoretical Computer Science - Introduction to Automata, Computability, Complexity, Algorithmics, Randomization, Communication,... Theoretical Computer Science - Introduction to Automata, Computability, Complexity, Algorithmics, Randomization, Communication, and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2011)
Juraj Hromkovic
R2,937 Discovery Miles 29 370 Ships in 10 - 15 working days

Juraj Hromkovic takes the reader on an elegant route through the theoretical fundamentals of computer science. The author shows that theoretical computer science is a fascinating discipline, full of spectacular contributions and miracles. The book also presents the development of the computer scientist's way of thinking as well as fundamental concepts such as approximation and randomization in algorithmics, and the basic ideas of cryptography and interconnection network design.

Video Coding with Superimposed Motion-Compensated Signals - Applications to H.264 and Beyond (Paperback, Softcover reprint of... Video Coding with Superimposed Motion-Compensated Signals - Applications to H.264 and Beyond (Paperback, Softcover reprint of the original 1st ed. 2004)
Markus Flierl, Bernd Girod
R2,891 Discovery Miles 28 910 Ships in 10 - 15 working days

Appendices 133 A Mathematical Results 133 A.1 Singularities of the Displacement Error Covariance Matrix 133 A.2 A Class of Matrices and their Eigenvalues 134 A.3 Inverse of the Power Spectral Density Matrix 134 A.4 Power Spectral Density of a Frame 136 Glossary 137 References 141 Index 159 Preface This book aims to capture recent advances in motion compensation for - ficient video compression. It investigates linearly combined motion comp- sated signals and generalizes the well known superposition for bidirectional prediction in B-pictures. The number of superimposed signals and the sel- tion of reference pictures will be important aspects of the discussion. The application oriented part of the book employs this concept to the well known ITU-T Recommendation H.263 and continues with the improvements by superimposed motion-compensated signals for the emerging ITU-T R- ommendation H.264 and ISO/IEC MPEG-4 (Part 10). In addition, it discusses a new approach for wavelet-based video coding. This technology is currently investigated by MPEG to develop a new video compression standard for the mid-term future.

Information Dynamics and Open Systems - Classical and Quantum Approach (Paperback, Softcover reprint of hardcover 1st ed.... Information Dynamics and Open Systems - Classical and Quantum Approach (Paperback, Softcover reprint of hardcover 1st ed. 1997)
Roman S. Ingarden, A. Kossakowski, M. Ohya
R5,772 Discovery Miles 57 720 Ships in 10 - 15 working days

This book has a long history of more than 20 years. The first attempt to write a monograph on information-theoretic approach to thermodynamics was done by one of the authors (RSI) in 1974 when he published, in the preprint form, two volumes of the book "Information Theory and Thermodynamics" concerning classical and quantum information theory, [153] (220 pp.), [154] (185 pp.). In spite of the encouraging remarks by some of the readers, the physical part of this book was never written except for the first chapter. Now this material is written completely anew and in much greater extent. A few years earlier, in 1970, second author of the present book, (AK), a doctoral student and collaborator of RSI in Toruli, published in Polish, also as a preprint, his habilitation dissertation "Information-theoretical decision scheme in quantum statistical mechanics" [196] (96 pp.). This small monograph presented his original results in the physical part of the theory developed in the Torun school. Unfortunately, this preprint was never published in English. The present book contains all these results in a much more modern and developed form.

Public-Key Cryptography (Paperback, Softcover reprint of the original 2nd ed. 1996): Arto Salomaa Public-Key Cryptography (Paperback, Softcover reprint of the original 2nd ed. 1996)
Arto Salomaa
R1,537 Discovery Miles 15 370 Ships in 10 - 15 working days

Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." "Alex M. Andrew, Kybernetes, March 1992"

Formal Aspects in Security and Trust - IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer... Formal Aspects in Security and Trust - IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Theo Dimitrakos, Fabio Martinelli
R2,915 Discovery Miles 29 150 Ships in 10 - 15 working days

Second International Workshop on Formal Aspects in Security and Trust is an essential reference for both academic and professional researchers in the field of security and trust.

Because of the complexity and scale of deployment of emerging ICT systems based on web service and grid computing concepts, we also need to develop new, scalable, and more flexible foundational models of pervasive security enforcement across organizational borders and in situations where there is high uncertainty about the identity and trustworthiness of the participating networked entites. On the other hand, the increasingly complex set of building activities sharing different resources but managed with different policies calls for new and business-enabling models of trust between members of virtual organizations and communities that span the boundaries of physical enterprises and loosely structured groups of individuals.

The papers presented in this volume address the challenges posed by "ambient intelligence space" as a future paradigm and the need for a set of concepts, tools and methodologies to enable the user's trust and confidence in the underlying computing infrastructure.

This state-of-the-art volume presents selected papers from the 2nd International Workshop on Formal Aspects in Security and Trust, held in conjuuctions with the 18th IFIP World Computer Congress, August 2004, in Toulouse, France.

The collection will be important not only for computer security experts and researchers but also for teachers and adminstrators interested in security methodologies and research.

Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30... Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Ryoichi Sasaki, Eiji Okamoto, Hiroshi Yoshiura
R4,542 Discovery Miles 45 420 Ships in 10 - 15 working days

Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.

Multimedia Encryption and Watermarking (Paperback, Softcover reprint of hardcover 1st ed. 2005): Borko Furht, Edin Muharemagic,... Multimedia Encryption and Watermarking (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Borko Furht, Edin Muharemagic, Daniel Socek
R4,455 Discovery Miles 44 550 Ships in 10 - 15 working days

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property. Part I, Digital Rights Management (DRM) for Multimedia, introduces DRM concepts and models for multimedia content protection, and presents the key players. Part II, Multimedia Cryptography, provides an overview of modern cryptography, with the focus on modern image, video, speech, and audio encryption techniques. This book also provides an advanced concept of visual and audio sharing techniques. Part III, Digital Watermarking, introduces the concept of watermarking for multimedia, classifies watermarking applications, and evaluates various multimedia watermarking concepts and techniques, including digital watermarking techniques for binary images. Multimedia Encryption and Watermarking is designed for researchers and practitioners, as well as scientists and engineers who design and develop systems for the protection of digital multimedia content. This volume is also suitable as a textbook for graduate courses on multimedia security.

Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government - 5th IFIP Conference on e-Commerce, e-Business, and... Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government - 5th IFIP Conference on e-Commerce, e-Business, and e-Government (I3E'2005), October 28-30 2005, Poznan, Poland (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Matohisa Funabashi, Adam Grzech
R4,548 Discovery Miles 45 480 Ships in 10 - 15 working days

2.1 E-Government: e-Governance and e-Democracy The term Electronic Government (e-Government), as an expression, was coined after the example of Electronic Commerce. In spite of being a relatively recent expression, e-Government designates a field of activity that has been with us for several decades and which has attained a high level of penetration in many countries2. What has been observed over the recent years is a shift on the broadness of the e-Government concept. The ideas inside e-Governance and e- Democracy are to some extent promising big changes in public administration. The demand now is not only simply delivering a service - line. It is to deliver complex and new services, which are all citizen-centric. Another important demand is related to the improvement of citizen's participation in governmental processes and decisions so that the governments' transparency and legitimacy are enforced. In order to fulfill these new demands, a lot of research has been done over the recent years (see Section 3) but many challenges are still to be faced, not only in the technological field, but also in the political and social aspects.

Quality Of Protection - Security Measurements and Metrics (Paperback, Softcover reprint of hardcover 1st ed. 2006): Dieter... Quality Of Protection - Security Measurements and Metrics (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin
R5,702 Discovery Miles 57 020 Ships in 10 - 15 working days

Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. Information security in the business setting has matured in the last few decades. Standards such as IS017799, the Common Criteria (ISO15408), and a number of industry certifications and risk analysis methodologies have raised the bar for good security solutions from a business perspective.

Designed for a professional audience composed of researchers and practitioners in industry, Quality of Protection: Security Measurements and Metrics is also suitable for advanced-level students in computer science.

Coding Theory and Number Theory (Paperback, Softcover reprint of hardcover 1st ed. 2003): T. Hiramatsu, Gunter Koehler Coding Theory and Number Theory (Paperback, Softcover reprint of hardcover 1st ed. 2003)
T. Hiramatsu, Gunter Koehler
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

This book grew out of our lectures given in the Oberseminar on 'Cod ing Theory and Number Theory' at the Mathematics Institute of the Wiirzburg University in the Summer Semester, 2001. The coding the ory combines mathematical elegance and some engineering problems to an unusual degree. The major advantage of studying coding theory is the beauty of this particular combination of mathematics and engineering. In this book we wish to introduce some practical problems to the math ematician and to address these as an essential part of the development of modern number theory. The book consists of five chapters and an appendix. Chapter 1 may mostly be dropped from an introductory course of linear codes. In Chap ter 2 we discuss some relations between the number of solutions of a diagonal equation over finite fields and the weight distribution of cyclic codes. Chapter 3 begins by reviewing some basic facts from elliptic curves over finite fields and modular forms, and shows that the weight distribution of the Melas codes is represented by means of the trace of the Hecke operators acting on the space of cusp forms. Chapter 4 is a systematic study of the algebraic-geometric codes. For a long time, the study of algebraic curves over finite fields was the province of pure mathematicians. In the period 1977 - 1982, V. D. Goppa discovered an amazing connection between the theory of algebraic curves over fi nite fields and the theory of q-ary codes."

Introduction to Cryptography - Principles and Applications (Paperback, Softcover reprint of hardcover 2nd ed. 2007): Hans... Introduction to Cryptography - Principles and Applications (Paperback, Softcover reprint of hardcover 2nd ed. 2007)
Hans Delfs, Helmut Knebl
R1,818 Discovery Miles 18 180 Ships in 10 - 15 working days

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.

Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working... Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Steve Furnell; Edited by (ghost editors) Paul Dowland; Edited by Bhavani Thuraisingham, X.Sean Wang
R2,956 Discovery Miles 29 560 Ships in 10 - 15 working days

This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D.

The Codes of Life - The Rules of Macroevolution (Paperback, Softcover reprint of hardcover 1st ed. 2008): Marcello Barbieri The Codes of Life - The Rules of Macroevolution (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Marcello Barbieri
R7,264 Discovery Miles 72 640 Ships in 10 - 15 working days

Building on a range of disciplines from biology and anthropology to philosophy and linguistics this book draws on the expertise of leading names in the study of organic, mental and cultural codes brought together by the emerging discipline of biosemiotics.

The book s 18 chapters present a range of experimental evidence which suggests that the genetic code was only the first in a long series of organic codes, and that it has been the appearance of new codes organic, mental and cultural that paved the way for the major transitions in the history of life.

While the existence of many organic codes has been proposed since the 1980s, this volume represents the first multi-authored attempt to deal with the range of codes relevant to life, and to reveal the ubiquitous role of coding mechanisms in both organic and mental evolution. This creates the conditions for a synthesis of biology and linguistics that finally overcomes the old divide between nature and culture.

The book will appeal to all those interested in the origins and evolution of life, including biologists (from molecular and cellular biologists to evolutionary and developmental biologists), ecologists, anthropologists, psychologists, philosophers of science, linguists, and researchers interested in the history of science, the origins of life, artificial life and intelligence, and information theory and communication technology."

Primality Testing and Integer Factorization in Public-Key Cryptography (Paperback, Softcover reprint of hardcover 2nd ed.... Primality Testing and Integer Factorization in Public-Key Cryptography (Paperback, Softcover reprint of hardcover 2nd ed. 2009)
Song Y. Yan
R4,470 Discovery Miles 44 700 Ships in 10 - 15 working days

Intended for advanced level students in computer science and mathematics, this key text, now in a brand new edition, provides a survey of recent progress in primality testing and integer factorization, with implications for factoring based public key cryptography. For this updated and revised edition, notable new features include a comparison of the Rabin-Miller probabilistic test in RP, the Atkin-Morain elliptic curve test in ZPP and the AKS deterministic test.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Arithmetic and Algebraic Circuits
Antonio Lloris Ruiz, Encarnacion Castillo Morales, … Hardcover R5,196 Discovery Miles 51 960
TLS Mastery
Michael W Lucas Hardcover R995 R876 Discovery Miles 8 760
Introduction to Bitcoin
David Ricardo Hardcover R765 Discovery Miles 7 650
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,596 Discovery Miles 25 960
The Economics of Blockchain and…
James L. Caton Hardcover R2,965 Discovery Miles 29 650
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
Bitcoin and Cryptocurrency Technologies…
Keizer Soeze Hardcover R2,020 R1,631 Discovery Miles 16 310
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
New Research on the Voynich Manuscript…
National Security Agency Hardcover R526 Discovery Miles 5 260
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,508 R1,231 Discovery Miles 12 310

 

Partners