0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (86)
  • R500+ (1,899)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Secure Group Communications Over Data Networks (Paperback, Softcover reprint of hardcover 1st ed. 2005): Xukai Zou, Byrav... Secure Group Communications Over Data Networks (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
R2,626 Discovery Miles 26 260 Ships in 18 - 22 working days

The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for researchers and practitioners because many applications that require SGC are now widely used, such as teleconferencing, tele-medicine, real-time information services, distributed interactive simulations, collaborative work, grid computing, and the deployment of VPN (Virtual Private Networks). Even though considerable research accomplishments have been achieved in SGC, few books exist on this very important topic. The purpose of this book is to provide a comprehensive survey of principles and state-of-the-art techniques for secure group communications over data net works. The book is targeted towards practitioners, researchers and students in the fields of networking, security, and software applications development. The book consists of 7 chapters, which are listed and described as follows."

Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25,... Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 Proceedings (Paperback, 2010 ed.)
Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai
R2,935 Discovery Miles 29 350 Ships in 18 - 22 working days

The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in the areas of security and its applications, including: * Network and Wireless Network Security * Mobile, Ad Hoc and Sensor Network Security * Peer-to-Peer Network Security * Database and System Security * Intrusion Detection and Prevention * Internet Security, and Applications Security and Network Management * E-mail Security, Spam, Phishing, E-mail Fraud * Virus, Worms, Trojon Protection * Security Threats and Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc. ) * Ubiquitous Computing Security * Web 2. 0 Security * Cryptographic Protocols * Performance Evaluations of Protocols and Security Application There were 182 submissions to the conference and the Program Committee selected 63 papers for publication. The book is organized as a collection of papers from the First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010), the First International Workshop on Database Management Systems (DMS- 2010), and the First International Workshop on Mobile, Wireless and Networks Security (MWNS-2010).

Progress in Cryptology -- AFRICACRYPT 2009 - Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June... Progress in Cryptology -- AFRICACRYPT 2009 - Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009, Proceedings (Paperback, 2009 ed.)
Bart Preneel
R1,449 Discovery Miles 14 490 Ships in 18 - 22 working days

This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009.

The 25 papers presented together with one invited talk were carefully reviewed and selected from 70 submissions. The topics covered are hash functions, block ciphers, asymmetric encryption, digital signatures, asymmetric encryption and anonymity, key agreement protocols, cryptographic protocols, efficient implementations, and implementation attacks.

Engineering Secure Software and Systems - Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010,... Engineering Secure Software and Systems - Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings (Paperback, Edition.)
Fabio Massacci, Dan Wallach, Nicola Zannone
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

It is our pleasure to welcome you to the proceedings of the Second International Symposium on Engineering Secure Software and Systems. This unique event aimed at bringing together researchersfrom softwareen- neering and security engineering, which might help to unite and further develop the two communities in this and future editions. The parallel technical spons- ships from the ACM SIGSAC (the ACM interest group in security) and ACM SIGSOF (the ACM interest group in software engineering) is a clear sign of the importance of this inter-disciplinary research area and its potential. The di?culty of building secure software systems is no longer focused on mastering security technology such as cryptography or access control models. Other important factors include the complexity of modern networked software systems, the unpredictability of practical development life cycles, the intertw- ing of and trade-o? between functionality, security and other qualities, the d- culty of dealing with human factors, and so forth. Over the last years, an entire research domain has been building up around these problems. The conference program included two major keynotes from Any Gordon (Microsoft Research Cambridge) on the practical veri?cation of security pro- cols implementation and Angela Sasse (University College London) on security usability and an interesting blend of research, industry and idea papers.

Cryptoeconomics - Igniting a New Era of Blockchain (Hardcover): Jian Gong, Wei Xu Cryptoeconomics - Igniting a New Era of Blockchain (Hardcover)
Jian Gong, Wei Xu
R1,980 Discovery Miles 19 800 Ships in 10 - 15 working days

"A systematic review of the structure and context of the blockchain-derived economic model... (the book) describes cryptoeconomics in connection with the game theory, behavioral economics and others in simple understandable language."-Wang Feng, founder of Linekong Interactive Group and Mars Finance, partner in Geekbang Venture Capital Blockchain technology has subverted existing perceptions and is the start of an economic revolution, called, cryptoeconomics. Blockchain is a key component of cryptoeconomics. Vlad Zamfir, a developer of Ethereum, defines this term as "a formal discipline that studies protocols that governs the production, distribution, and consumption of goods and services in a decentralized digital economy. Cryptoeconomics is a practical science that focuses on the design and characterization of these protocols". This book explains the structures of blockchain-derived economic models, their history, and their application. It uses real-world cases to illustrate the relationship between cryptoeconomics and blockchain. Blockchain technology solves trust issues. A blockchain application can restrict behavior on the blockchain through a reward and punishment system that enables consensus in an innovative way. The greatest significance of cryptoeconomics lies in guaranteeing safety, stability, activity, and order in a decentralized consensus system. Security and stability are achieved mainly by cryptographical mechanisms. Activity and order are achieved through economic mechanisms. Cryptoeconomics and Blockchain: Ignighting a New Era of Blockchain discusses the most popular consensus algorithms and optimization mechanisms. With examples explained in clear and simple terms that are easy to understand, the book also explores economic mechanisms of blockchain such as game theory and behavioral economics.

Public Key Cryptography - PKC 2009 - 12th International Conference on Practice and Theory in Public Key Cryptography Irvine,... Public Key Cryptography - PKC 2009 - 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, CA, USA, March 18-20, 2009, Proceedings (Paperback, 2009 ed.)
Stanislaw Jarecki, Gene Tsudik
R1,473 Discovery Miles 14 730 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009.

The 28 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on number theory, applications and protocols, multi-party protocols, identity-based encryption, signatures, encryption, new cryptosystems and optimizations, as well as group signatures and anonymous credentials.

Progress in Cryptology -  INDOCRYPT 2009 - 10th International Conference on Cryptology in India, New Delhi, India, December... Progress in Cryptology - INDOCRYPT 2009 - 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings (Paperback, 2009 ed.)
Bimal Kumar Roy, Nicolas Sendrier
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.

The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.

Digital Watermarking - 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings (Paperback, 2008... Digital Watermarking - 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings (Paperback, 2008 ed.)
Yun Q. Shi, Hyoung Joong Kim, Stefan Katzenbeisser
R1,462 Discovery Miles 14 620 Ships in 18 - 22 working days

th It is our great pleasure to present in this volume the proceedings of the 6 Inter- tional Workshop on Digital Watermarking (IWDW), which was held in Guangzhou, China, during December 3-5, 2007. The workshop was hosted by the Sun Yat-sen University and sponsored by both the National Science Foundation of China and the Korea Institute of Information Security and Cryptology. Since its birth in the early 1990s, digital watermarking has become a mature e- bling technology for solving security problems associated with multimedia distribution schemes. Digital watermarks are now used in applications such as broadcast monit- ing, movie fingerprinting, digital rights management, and document authentication, to name but a few. Still, many research challenges remain open, among them security and robustness issues, reversibility and authentication. Continuing the tradition of previous workshops, IWDW 2007 also featured-besides papers dealing with digital watermarking-contributions from other related fields, such as steganography, ste- nalysis and digital forensics.

Decrypted Secrets - Methods and Maxims of Cryptology (Paperback, 4th ed. 2007): Friedrich L. Bauer Decrypted Secrets - Methods and Maxims of Cryptology (Paperback, 4th ed. 2007)
Friedrich L. Bauer
R5,214 Discovery Miles 52 140 Ships in 18 - 22 working days

In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the unscrupulous. The revised and extended third edition of this classic reference work on cryptology offers a wealth of new technical and biographical details. The book presupposes only elementary mathematical knowledge. Spiced with exciting, amusing, and sometimes personal accounts from the history of cryptology, it will interest general a broad readership.

Advances in Cryptology - ASIACRYPT 2008 - 14th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2008 - 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008 (Paperback, 2008 ed.)
Josef Pawel Pieprzyk
R1,487 Discovery Miles 14 870 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008.

The 33 revised full papers presented together with the abstract of 1 invited lecture were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash functions, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and analysis of stream ciphers.

Critical Information Infrastructures Security - Second International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October... Critical Information Infrastructures Security - Second International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October 3-5, 2007 (Paperback, 2008 ed.)
Bernhard Hammerli
R1,430 Discovery Miles 14 300 Ships in 18 - 22 working days

This volume contains the post-proceedings of the Second International Workshop on Critical Information Infrastructure Security (CRITIS 2007), that was held during October 3-5, 2007 in Benalmadena-Costa (Malaga), Spain, and was hosted by the University of Malaga, Computer Science Department. In response to the 2007 call for papers, 75 papers were submitted. Each paper was reviewed by three members of the Program Committee, on the basis of significance, novelty, technical quality and critical infrastructures relevance of the work reported therein. At the end of the reviewing process, only 29 papers were selected for pres- tation. Revisions were not checked and the authors bear full responsibility for the content of their papers. CRITIS 2007 was very fortunate to have four exceptional invited speakers: Adrian Gheorghe (Old Dominion University, USA), Paulo Verissimo (Universidade de L- boa, Portugal), Donald Dudenhoeffer (Idaho National Labs, USA), and Jacques Bus (European Commission, INFSO Unit "Security"). The four provided a high added value to the quality of the conference with very significant talks on different and int- esting aspects of Critical Information Infrastructures. In 2007, CRITIS demonstrated its outstanding quality in this research area by - cluding ITCIP, which definitively reinforced the workshop. Additionally, the solid involvement of the IEEE community on CIP was a key factor for the success of the event. Moreover, CRITIS received sponsorship from Telecom Italia, JRC of the European Commission, IRRIIS, IFIP, and IABG, to whom we are greatly indebted."

String Processing and Information Retrieval - 15th International Symposium, SPIRE 2008, Melbourne, Australia, November 10-12,... String Processing and Information Retrieval - 15th International Symposium, SPIRE 2008, Melbourne, Australia, November 10-12, 2008. Proceedings (Paperback, 2009 ed.)
Amihood Amir, Andrew Turpin, Alistair Moffat
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days

This volumecontainsthe paperspresented atthe 15thString Processingand - formation Retrieval Symposium (SPIRE), held in Melbourne, Australia, during November 10-12, 2008. The papers presented at the symposium were selected from 54 papers s- mitted in response to the Call For Papers. Each submission was reviewed by a minimum of two, and usually three, Program Committee members, who are expertsdrawnfromaroundthe globe. Thecommittee accepted25papers (46%), with the successful authors also covering a broad rangeof continents. The paper "An E?cient Linear Space Algorithm for Consecutive Su?x Alignment Under Edit Distance" by Heikki Hyyr] o was selected for the Best Paper Award, while Dina Sokol was awarded the Best Reviewer Award for excellent contributions to the reviewing process. The program also included two invited talks: David Hawking, chief scientist at the Internet and enterprise search company Funn- back Pty. Ltd. based in Australia; and Gad Landau, from the Department of Computer Science at Haifa University, Israel. SPIRE has its origins in the South American Workshop on String Proce- ing which was ?rst held in 1993. Starting in 1998, the focus of the symposium was broadened to include the area of information retrieval due to the c- mon emphasis on information processing. The ?rst 14 meetings were held in Belo Horizonte, Brazil (1993); Valparaiso, Chile (1995); Recife, Brazil (1996); Valparaiso, Chile (1997); Santa Cruz, Bolivia (1998); Cancun, Mexico (1999); A Corun a, Spain(2000);LagunaSanRafael, Chile(2001);Lisbon, Portugal(2002); Manaus, Brazil (2003); Padova, Italy (2004); Buenos Aires, Argentina (2005); Glasgow, UK (2006); and Santiago, Chile (2007)."

Theory of Quantum Computation, Communication, and Cryptography - Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February... Theory of Quantum Computation, Communication, and Cryptography - Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008, Revised Selected Papers (Paperback, 2008 ed.)
Yasuhito Kawano, Michele Mosca
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

TheWorkshoponTheoryofQuantumComputation, Communication, andCr- tography (TQC) focuses on theoretical aspects of quantum computation, qu- tum communication, and quantum cryptography, which are part of a larger interdisciplinary ?eld that casts information science in a quantum mechanical framework. The third TQC was held from January 30 to February 1, 2008, at the U- versity of Tokyo, Tokyo, Japan. It consisted of invited talks, contributed talks and a poster session. A selection of these contributors were invited to submit a paper to this Lecture Notes in Computer Science (LNCS) proceedings. The ?eld of quantum information processing is rapidly growing in depth and in breadth. TQC is a workshop dedicated to the presentation and discussion of original research. While most research in quantum information is published in a wide range of journals and conference proceedings in computer science, physics, mathematics and other traditional areas of science, there is a growing nicheforhigh-qualityjournalsandproceedingsdedicatedtoresearchinquantum information. TQC is one of the ?rst such conferences or workshops that has decided to publish a selection of the submissions in an o?cial proceedings of the workshop to be published in the LNCS series. We are extremely fortunate to have had the support and advice of our P- gramCommittee(listedhere)andareverygratefulforalltheirhardwork.Wealso appreciatethehelpofthefollowingadditionalreviewers: Jean-ChristianBoileau, Jop Briet, David Feder, Francois Le Gall, Hector Garcia, Tohya Hiroshima, and CaseyMyers. WealsoextendoursincerethankstothelocalOrganizingCommitteeforpulling togetherallthelocalandlogisticalaspectsoftheworkshopsosuccessfully. Lastly, many thanks to NTT for sponsoring TQC 2008, to the University of Tokyo for their generous support, and to Springer for agreeing to publish these proceedings in the LNCS seri

Information Systems, Technology and Management - 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13,... Information Systems, Technology and Management - 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings (Paperback, Edition.)
Sushil K. Prasad, Bundit Thipakorn, Mahadeo P. Jaiswal, Sartaj Sahni, Harrick M. Vin
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the 4th International Conference on Information Systems, Technology and Management, ICISTM 2010, held in Bangkok, Thailand, in March 2010. The 28 revised full papers presented together with 3 keynote lectures, 9 short papers, and 2 tutorial papers were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on information systems, information technology, information management, and applications.

Replication - Theory and Practice (Paperback, Edition.): Bernadette Charron-Bost, Fernando Pedone, Andre Schiper Replication - Theory and Practice (Paperback, Edition.)
Bernadette Charron-Bost, Fernando Pedone, Andre Schiper
R2,204 Discovery Miles 22 040 Ships in 18 - 22 working days

Replication is a topic of interest in the distributed computing, distributed systems, and database communities. Although these communities have traditionally looked at replication from different viewpoints and with different goals (e.g., performance versus fault tolerance), recent developments have led to a convergence of these different goals. The objective of this state-of-the-art survey is not to speculate about the future of replication, but rather to understand the present, to make an assessment of approximately 30 years of research on replication, and to present a comprehensive view of the achievements made during this period of time.

This book is the outcome of the seminar entitled A 30-Year Perspective on Replication, which was held at Monte Verit, Ascona, Switzerland, in November 2007. The book is organized in 13 self-contained chapters written by most of the people who have contributed to developing state-of-the-art replication techniques. It presents a comprehensive view of existing solutions, from a theoretical as well as from a practical point of view. It covers replication of processes/objects and of databases; replication for fault tolerance and replication for performance - benign faults and malicious (Byzantine) faults - thus forming a basis for both professionals and students of distributed computing, distributed systems, and databases.

Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008.... Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings (Paperback, 2008 ed.)
Liqun Chen, Mark Ryan, Guilin Wang
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

The10thInternationalConferenceonInformationandCommunicationsSecurity (ICICS) was held in Birmingham, UK, during 20-22 October 2008. The ICICS conference series is an established forum that brings together people working in di?erent ?elds of information and communications security from universities, researchinstitutes, industryandgovernmentinstitutions, andgivestheattendees the opportunity to exchange new ideas and investigate state-of-the-art devel- ments. In previous years, ICICS has taken place in China (2007, 2005, 2003, 2001, 1997), USA (2006), Spain (2004), Singapore (2002), and Australia (1999). On each occasion, as on this one, the proceedings were published in the Springer LNCS series. In total, 125 papers from 33 countries were submitted to ICICS 2008, and 27 were accepted covering multiple disciplines of information security and applied cryptography(acceptancerate22%).EachsubmissiontoICICS2008wasano- mously reviewed by three or four reviewers. We are grateful to the Programme Committee, whichwascomposedof57membersfrom12countries;wethankthem aswellasallexternalrefereesfortheirtimeandvaluedcontributionstothetough andtime-consuming reviewingprocess. In addition to the contributed speakers, the programme also featured three invitedspeakers.We aregratefulto JoshuaGuttman (The MITRE Corporation, USA), Peng Ning (North Carolina State University, USA), and Nigel Smart (University of Bristol, UK) for accepting our invitation to speak. ICICS 2008 was organised by the University of Birmingham and Hewlett Packard Laboratories. We gratefully acknowledge sponsorship from the UK - gineering and Physical Sciences Research Council (EPSRC), as well as Hewlett Packard and the University of Birmin

Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings... Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings (Paperback, 2008 ed.)
Johannes Buchmann, Jintai Ding
R1,634 Discovery Miles 16 340 Ships in 18 - 22 working days

Threedecadesagopublic-keycryptosystemsmadea revolutionarybreakthrough in cryptography. They have developed into an indispensable part of our m- ern communication system. In practical applications RSA, DSA, ECDSA, and similar public key cryptosystems are commonly used. Their security depends on assumptions about the di?culty of certain problems in number theory, such as the Integer Prime Factorization Problem or the Discrete Logarithm Problem. However, in 1994 Peter Shor showed that quantum computers could break any public-key cryptosystembased on these hard number theory problems. This means that if a reasonably powerful quantum computer could be built, it would put essentially all modern communication into peril. In 2001, Isaac Chuang and NeilGershenfeldimplemented Shor'salgorithmona7-qubitquantumcomputer. In 2007 a 16-qubit quantum computer was demonstrated by a start-up company with the prediction that a 512-qubit or even a 1024-qubit quantum computer would become available in 2008. Some physicists predicted that within the next 10 to 20 years quantum computers will be built that are su?ciently powerful to implement Shor's ideas and to break all existing public key schemes. Thus we need to look ahead to a future of quantum computers, and we need to prepare the cryptographic world for that future.

Network and Parallel Computing - IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings... Network and Parallel Computing - IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings (Paperback, 2008 ed.)
Jian Cao, Minglu Li, Min-You Wu, Jinjun Chen
R1,430 Discovery Miles 14 300 Ships in 18 - 22 working days

Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China. NPC has been a premier conference that has brought together researchers and pr- titioners from academia, industry and governments around the world to advance the theories and technologies of network and parallel computing. The goal of NPC is to establish an international forum for researchers and practitioners to present their - cellent ideas and experiences in all system fields of network and parallel computing. The main focus of NPC 2008 was on the most critical areas of network and parallel computing, network technologies, network applications, network and parallel archit- tures, and parallel and distributed software. In total, the conference received more than 140 papers from researchers and prac- tioners. Each paper was reviewed by at least two internationally renowned referees and selected based on its originality, significance, correctness, relevance, and clarity of presentation. Among the high-quality submissions, only 32 regular papers were accepted by the conferences. All of the selected conference papers are included in the conference proceedings. After the conference, some high-quality papers will be r- ommended to be published in the special issue of international journals. We were delighted to host three well-known international scholars offering the k- note speeches, Sajal K. Das from University Texas at Arlington USA, Matt Mutka from Michigan State University and David Hung-Chang Du from University of M- nesota University of Minnesota.

Computer Security - ESORICS 2008 - 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008.... Computer Security - ESORICS 2008 - 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008. Proceedings (Paperback, 2008 ed.)
Sushil Jajodia
R1,495 Discovery Miles 14 950 Ships in 18 - 22 working days

These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security--ESORICS 2008--held October 6-8, 2008 in Torremolinos (Malaga), Spain, and hosted by the University of Malaga, C- puter Science Department. ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in different European countries. From 2002 it has taken place yearly. It attracts an international audience from both the academic and industrial communities. In response to the call for papers, 168 papers were submitted to the symposium. These papers were evaluated on the basis of their significance, novelty, and technical quality. Each paper was reviewed by at least three members of the Program Comm- tee. The Program Committee meeting was held electronically, holding intensive d- cussion over a period of two weeks. Finally, 37 papers were selected for presentation at the symposium, giving an acceptance rate of 22%.

Quantum Communication and Quantum Networking - First International Conference, QuantumComm 2009, Naples, Italy, October 26-30,... Quantum Communication and Quantum Networking - First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009, Revised Selected Papers (Paperback, Edition.)
Alexander Sergienko, Saverio Pascazio, Paolo Villoresi
R1,417 Discovery Miles 14 170 Ships in 18 - 22 working days

QUANTUMCOMM 2009--the International Conference on Quantum Communi- tion and Quantum Networking (from satellite to nanoscale)--took place in Vico Equense near Naples, Italy, during October 26-30, 2009. The conference made a significant step toward stimulating direct dialogue between the communities of quantum physics and quantum information researchers who work with photons, atoms, and electrons in pursuit of the common goal of investigating and utilizing the transfer of physical information between quantum systems. This meeting brought together experts in quantum communication, quantum inf- mation processing, quantum nanoscale physics, quantum photonics, and networking. In the light of traditional approaches to quantum information processing, quantum communication mainly deals with encoding and securely distributing quantum states of light in optical fiber or in free space in order to provide the technical means for quantum cryptography applications. Exciting advances in the area of quantum c- munication over the last decade have made the metropolitan quantum network a re- ity. Several papers presented at this meeting have demonstrated that quantum crypt- raphy is approaching the point of becoming a high-tech application rather than a - search subject. The natural distance limitation of quantum cryptography has been significantly augmented using ideas of global quantum communication with stab- orbit satellites. The results presented at this conference demonstrated that practical secure satellite communication is clearly within reach.

Cryptology and Network Security - 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings... Cryptology and Network Security - 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings (Paperback, 2009 ed.)
Juan A. Garay, Akira Otsuka
R2,723 Discovery Miles 27 230 Ships in 18 - 22 working days

The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan, during December 12-14, 2009. The conference was jointly co-organized by the NationalInstituteofAdvancedIndustrialScienceandTechnology(AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). In ad- tion, the event was supported by the Special Interest Group on Computer Se- rity (CSEC), IPSJ, Japan, the Japan Technical Group on Information Security (ISEC), IEICE, the Japan Technical Committee on Information and Com- nication System Security(ICSS), IEICE, and the Society of Information Theory and its Applications (SITA), Japan, and co-sponsored by the National Ins- tute of Information and Communications Technology, Japan, ComWorth Co., LTD, Japan, Hitachi, Ltd., Hokuriku Telecommunication Network Co., Inc., and Internet Initiative Japan Inc. The conference received 109 submissions from 24 countries, out of which 32 were accepted for publication in these proceedings. At least three Program Committee (PC) members reviewed each submitted paper, while submissions co-authored by a PC member were submitted to the more stringent evaluation of ?ve PC members. In addition to the PC members, many external reviewers joinedthereviewprocessintheirparticularareasofexpertise. Wewerefortunate to have this energetic team of experts, and are deeply grateful to all of them for their hard work, which included a very active discussion phase-almost as long as the initial individual reviewing period. The paper submission, review and discussion processes were e?ectively and e?ciently made possible by the Web-based system iChair.

Information Hiding - 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers... Information Hiding - 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers (Paperback, 2008 ed.)
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow
R1,433 Discovery Miles 14 330 Ships in 18 - 22 working days

th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19-21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applications. We received a total of 64 papers from all over the globe, and would like to take this opportunity to thank all the authors who submitted their paper to IH 2008 and thus contributed to the consolidation of the reputation of the conference. The papers were refereed by at least three revi- ers who provided detailed comments, which was followed by discussion amongst the Program Committee members. Only 25 papers were selected for presentation. This rigorous review process will certainly strengthen Information Hiding's po- tion as the top forum of our community.

Selected Areas in Cryptography - 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised... Selected Areas in Cryptography - 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Michael J. Jacobson, Vincent Rijmen, Rei Safavi-Naini
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary,in Calgary, Alberta, Canada, during August 13-14, 2009. There were 74 participants from 19 countries. Previous workshops in this series were held at Queens University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of - terloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), Concordia University in Montreal (2006), University of Ottawa (2007), and Mount Allison University in Sackville (2008). The themes for SAC 2009 were: 1. Design and analysis of symmetric key primitives and cryptosystems, incl- ing block and stream ciphers, hash functions, and MAC algorithms 2. E?cient implementations of symmetric and public key algorithms 3. Mathematical and algorithmic aspects of applied cryptology 4. Privacy enhancing cryptographic systems This included the traditional themes (the ?rst three) together with a special theme for 2009 workshop (fourth theme).

Forensics in Telecommunications, Information and Multimedia - Second International Conference, e-Forensics 2009, Adelaide,... Forensics in Telecommunications, Information and Multimedia - Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Matthew Sorell
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

The Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics 2009) took place in Adelaide, South Australia during January 19-21, 2009, at the Australian National Wine Centre, University of Adelaide. In addition to the peer-reviewed academic papers presented in this volume, the c- ference featured a significant number of plenary contributions from recognized - tional and international leaders in digital forensic investigation. Keynote speaker Andy Jones, head of security research at British Telecom, outlined the emerging challenges of investigation as new devices enter the market. These - clude the impact of solid-state memory, ultra-portable devices, and distributed storage - also known as cloud computing. The plenary session on Digital Forensics Practice included Troy O'Malley, Que- sland Police Service, who outlined the paperless case file system now in use in Que- sland, noting that efficiency and efficacy gains in using the system have now meant that police can arrive at a suspect's home before the suspect! Joseph Razik, represe- ing Patrick Perrot of the Institut de Recherche Criminelle de la Gendarmerie Nati- ale, France, summarized research activities in speech, image, video and multimedia at the IRCGN. The plenary session on The Interaction Between Technology and Law brought a legal perspective to the technological challenges of digital forensic investigation.

Protecting Persons While Protecting the People - Second Annual Workshop on Information Privacy and National Security, ISIPS... Protecting Persons While Protecting the People - Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers (Paperback, 2009 ed.)
Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of C- munication and Information at Rutgers University, was held on May 12, 2008 at the Hyatt Regency, New Brunswick, New Jersey, USA. A few of the papers in this volume were produced through a multi-step process. First, we recorded the talk given by each author at the workshop in May 2008. Next, we transcribed the recording. The authors then produced a draft of their paper from these transcriptions, refining each draft until the final version. Although the papers are not verbatim transcriptions of the talks given, some do retain the informal and conv- sational quality of the presentations. In one instance we have included some material from the question-and-answer period after the talk, since the material covered proved to be relevant and interesting. The majority of authors, however, preferred to include a more formal paper based on the material presented at the workshop.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cooperative Communications and…
Y -W Peter Hong, Wan-Jen Huang, … Hardcover R4,237 Discovery Miles 42 370
Radical transparency and digital…
Luke Heemsbergen Hardcover R2,676 Discovery Miles 26 760
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820

 

Partners