0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (86)
  • R500+ (1,945)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Advanced Intelligent Environments (Paperback, Softcover reprint of hardcover 1st ed. 2009): Wolfgang Minker, Michael Weber,... Advanced Intelligent Environments (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Wolfgang Minker, Michael Weber, Hani Hagras, Victor Callagan, Achilles Kameas
R4,353 Discovery Miles 43 530 Ships in 10 - 15 working days

Over the last decade a number of research areas have contributed to the concept of advanced intelligent environments, these include ubiquitous computing, pervasive computing, embedded intelligence, intelligent user interfaces, human factors, intelligent buildings, mobile communications, domestic robots, intelligent sensors, artistic and architectural design and ambient intelligence. Undeniably, multimodal spoken language dialogue interaction is a key factor in ensuring natural interaction and therefore of particular interest for advanced intelligent environments. It will therefore represent one focus of the proposed book. The book will cover all key topics in the field of intelligent environments from a variety of leading researchers. It will bring together several perspectives in research and development in the area.

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems (Paperback, Softcover reprint of hardcover... Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Jerzy Pejas, Andrzej Piegat
R5,611 Discovery Miles 56 110 Ships in 10 - 15 working days

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. "Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms. "Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.

Number Theory in Science and Communication - With Applications in Cryptography, Physics, Digital Information, Computing, and... Number Theory in Science and Communication - With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity (Paperback, Softcover reprint of hardcover 5th ed. 2009)
Manfred Schroeder
R1,712 Discovery Miles 17 120 Ships in 10 - 15 working days

"Number Theory in Science and Communication" is a well-known introduction for non-mathematicians to this fascinating and useful branch of applied mathematics . It stresses intuitive understanding rather than abstract theory and highlights important concepts such as continued fractions, the golden ratio, quadratic residues and Chinese remainders, trapdoor functions, pseudo primes and primitive elements. Their applications to problems in the real world are one of the main themes of the book. This revised fifth edition is augmented by recent advances in coding theory, permutations and derangements and a chapter in quantum cryptography.

From reviews of earlier editions -

"I continue to find Schroeder's] Number Theory a goldmine of valuable information. It is a marvelous book, in touch with the most recent applications of number theory and written with great clarity and humor.' Philip Morrison (Scientific American)

"A light-hearted and readable volume with a wide range of applications to which the author has been a productive contributor - useful mathematics outside the formalities of theorem and proof." Martin Gardner

Information-Spectrum Methods in Information Theory (Paperback, Softcover reprint of the original 1st ed. 2001): H. Koga Information-Spectrum Methods in Information Theory (Paperback, Softcover reprint of the original 1st ed. 2001)
H. Koga; Te Sun Han
R2,951 Discovery Miles 29 510 Ships in 10 - 15 working days

From the reviews: "This book nicely complements the existing literature on information and coding theory by concentrating on arbitrary nonstationary and/or nonergodic sources and channels with arbitrarily large alphabets. Even with such generality the authors have managed to successfully reach a highly unconventional but very fertile exposition rendering new insights into many problems." -- MATHEMATICAL REVIEWS

Algebraic Aspects of the Advanced Encryption Standard (Paperback, Softcover reprint of hardcover 1st ed. 2006): Carlos Cid,... Algebraic Aspects of the Advanced Encryption Standard (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Carlos Cid, Sean Murphy, Matthew Robshaw
R3,095 Discovery Miles 30 950 Ships in 10 - 15 working days

It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic tech- niques. The cipher is a fitting tribute to their distinctive approach to cipher design. Since the publication of the AES, however, the very same algebraic structures have been the subject of increasing cryptanalytic attention and this monograph has been written to summarise current research. We hope that this work will be of interest to both cryptogra- phers and algebraists and will stimulate future research. During the writing of this monograph we have found reasons to thank many people. We are especially grateful to the British Engineering and Physical Sciences Research Council (EPSRC) for their funding of the research project Security Analysis of the Advanced Encryption System (Grant GR/S42637), and to Susan Lagerstrom-Fifc and Sharon Palleschi at Springer. Wo would also hke to thank Glaus Diem, Maura Paterson, and Ludovic Perret for their valuable comments. Finally, the support of our families at home and our colleagues at work has been invaluable and particularly appreciated.

Online Business Security Systems (Paperback, Softcover reprint of hardcover 1st ed. 2007): Godfried B. Williams Online Business Security Systems (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Godfried B. Williams
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).

Biometrics, Computer Security Systems and Artificial Intelligence Applications (Paperback, Softcover reprint of hardcover 1st... Biometrics, Computer Security Systems and Artificial Intelligence Applications (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Khalid Saeed, Jerzy Pejas, Romuald Mosdorf
R5,595 Discovery Miles 55 950 Ships in 10 - 15 working days

This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. The book contains over 30 articles by well-known scientists and engineers. The articles are extended versions of works introduced at the ACS-CISIM 2005 conference.

Securing Biometrics Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008): Charles A. Shoniregun, Stephen... Securing Biometrics Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Charles A. Shoniregun, Stephen Crosier
R3,095 Discovery Miles 30 950 Ships in 10 - 15 working days

Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. Biometric devices are now available to capture biometric measurements such as fingerprints, palm, retinal scans, keystroke, voice recognition and facial scanning. However, the accuracy of these measurements varies, which has a direct relevance on the levels of security they offer. With the need to combat the problems related to identify theft and other security issues, society will have to compromise between security and personal freedoms. Securing Biometrics Applications investigates and identifies key impacts of biometric security applications, while discovering opportunities and challenges presented by the biometric technologies available.

A Classical Introduction to Cryptography Exercise Book (Paperback, Softcover reprint of hardcover 1st ed. 2006): Thomas... A Classical Introduction to Cryptography Exercise Book (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, Serge Vaudenay
R1,391 Discovery Miles 13 910 Ships in 10 - 15 working days

TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK by Thomas Baignkres, Palcal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay ISBN- 10: 0-387-27934-2 e-ISBN-10: 0-387-28835-X ISBN- 13: 978-0-387-27934-3 e-ISBN- 13: 978-0-387-28835-2 Printed on acid-free paper. O 2006 Springer Science+Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed in the United States of America.

Open Source Systems Security Certification (Paperback, Softcover reprint of hardcover 1st ed. 2009): Ernesto Damiani, Claudio... Open Source Systems Security Certification (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Ernesto Damiani, Claudio Agostino Ardagna, Nabil El Ioini
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Open Source Systems Security Certification discusses Security Certification Standards and establishes the need to certify open source tools and applications. This includes the international standard for the certification of IT products (software, firmware and hardware) Common Criteria (ISO/IEC 15408) (CC 2006), a certification officially adopted by the governments of 18 nations.

Without security certification, open source tools and applications are neither secure nor trustworthy. Open Source Systems Security Certification addresses and analyzes the urgency of security certification for security-sensible markets, such as telecommunications, government and the military, through provided case studies.

This volume is designed for professionals and companies trying to implement an Open Source Systems (OSS) aware IT governance strategy, and SMEs looking to attract new markets traditionally held by proprietary products or to reduce costs. This book is also suitable for researchers and advanced-level students.

Knowledge, Complexity and Innovation Systems (Paperback, Softcover reprint of hardcover 1st ed. 2001): Manfred M. Fischer,... Knowledge, Complexity and Innovation Systems (Paperback, Softcover reprint of hardcover 1st ed. 2001)
Manfred M. Fischer, Josef Froehlich
R4,407 Discovery Miles 44 070 Ships in 10 - 15 working days

In recent years there has been growing scientific interest in the triangular relationship between knowledge. complexity and innovation systems. The concept of'innovation systems' carries the idea that innovations do not originate as isolated discrete phenomena, but are generated through the interaction of a number of actors or agents. This set of actors and interactions possess certain specific characteristics that tend to remain over time. Such characteristics are also shared by national, regional, sectoral and technological interaction systems. They can all be represented as sets of institutional] actors and interactions, whose ultimate goal is the production and diffusion of knowledge. The major theoretical and policy problem posed by these systems is that knowledge is generated not only by individuals and organisations, but also by the often complex pattern of interaction between them. To understand how organisations create new products, new production techniques and new organisational forms is important. An even more fundamental need is to understand how organisations create new knowledge if this knowledge creation lies in the mobilisation and conversion of tacit knowledge. Although much has been written about the importance of knowledge in management, little attention has been paid to how knowledge is created and how the knowledge creation process is managed. The third component of the research triangle concerns complexity."

Intelligence and Security Informatics - Techniques and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008):... Intelligence and Security Informatics - Techniques and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Hsinchun Chen, Christopher C. Yang
R4,401 Discovery Miles 44 010 Ships in 10 - 15 working days

The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response

RFID Security and Privacy - Concepts, Protocols, and Architectures (Paperback, Softcover reprint of hardcover 1st ed. 2008):... RFID Security and Privacy - Concepts, Protocols, and Architectures (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Dirk Henrici
R4,345 Discovery Miles 43 450 Ships in 10 - 15 working days

In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: "There must exist better solutions. " I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller ], whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me to do it. The paper became a success, and many other papers about new concepts and solutions followed. Now the answer is obvious: There exist better solutions. I have dealt with the topic over the past years. Now I want to share the basics as well as current research results with the reader. This book is surely not a bedside reading. But with all the presented concepts, it can broaden the mind of the reader concerning security, privacy, and RFIDsystems. Iwishthe reader many new insights. There are many people I would like to thank. First of all, my thanks go to my ] supervisor, Prof. Dr. Paul Muller. He gave me room for creativity and plenty of rope to work on my own."

Maximum Entropy, Information Without Probability and Complex Fractals - Classical and Quantum Approach (Paperback, Softcover... Maximum Entropy, Information Without Probability and Complex Fractals - Classical and Quantum Approach (Paperback, Softcover reprint of the original 1st ed. 2000)
Guy Jumarie
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Every thought is a throw of dice. Stephane Mallarme This book is the last one of a trilogy which reports a part of our research work over nearly thirty years (we discard our non-conventional results in automatic control theory and applications on the one hand, and fuzzy sets on the other), and its main key words are Information Theory, Entropy, Maximum Entropy Principle, Linguistics, Thermodynamics, Quantum Mechanics, Fractals, Fractional Brownian Motion, Stochastic Differential Equations of Order n, Stochastic Optimal Control, Computer Vision. Our obsession has been always the same: Shannon's information theory should play a basic role in the foundations of sciences, but subject to the condition that it be suitably generalized to allow us to deal with problems which are not necessarily related to communication engineering. With this objective in mind, two questions are of utmost importance: (i) How can we introduce meaning or significance of information in Shannon's information theory? (ii) How can we define and/or measure the amount of information involved in a form or a pattern without using a probabilistic scheme? It is obligatory to find suitable answers to these problems if we want to apply Shannon's theory to science with some chance of success. For instance, its use in biology has been very disappointing, for the very reason that the meaning of information is there of basic importance, and is not involved in this approach.

Data Mining for Design and Manufacturing - Methods and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2002):... Data Mining for Design and Manufacturing - Methods and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2002)
D. Braha
R4,585 Discovery Miles 45 850 Ships in 10 - 15 working days

Data Mining for Design and Manufacturing: Methods and Applications is the first book that brings together research and applications for data mining within design and manufacturing. The aim of the book is 1) to clarify the integration of data mining in engineering design and manufacturing, 2) to present a wide range of domains to which data mining can be applied, 3) to demonstrate the essential need for symbiotic collaboration of expertise in design and manufacturing, data mining, and information technology, and 4) to illustrate how to overcome central problems in design and manufacturing environments. The book also presents formal tools required to extract valuable information from design and manufacturing data, and facilitates interdisciplinary problem solving for enhanced decision making. Audience: The book is aimed at both academic and practising audiences. It can serve as a reference or textbook for senior or graduate level students in Engineering, Computer, and Management Sciences who are interested in data mining technologies. The book will be useful for practitioners interested in utilizing data mining techniques in design and manufacturing as well as for computer software developers engaged in developing data mining tools.

Coding for Wireless Channels (Paperback, Softcover reprint of hardcover 1st ed. 2005): Ezio Biglieri Coding for Wireless Channels (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Ezio Biglieri
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

Accessible introduction to the theoretical foundations of modern coding theory

Including numerous applications to wireless transmission systems

The author is famous in the field of coding and wireless communications for his work in the area of faded channels & communcations.

Knowledge Discovery and Data Mining - The Info-Fuzzy Network (IFN) Methodology (Paperback, Softcover reprint of hardcover 1st... Knowledge Discovery and Data Mining - The Info-Fuzzy Network (IFN) Methodology (Paperback, Softcover reprint of hardcover 1st ed. 2001)
O. Maimon, M. Last
R2,842 Discovery Miles 28 420 Ships in 10 - 15 working days

This book presents a specific and unified approach to Knowledge Discovery and Data Mining, termed IFN for Information Fuzzy Network methodology. Data Mining (DM) is the science of modelling and generalizing common patterns from large sets of multi-type data. DM is a part of KDD, which is the overall process for Knowledge Discovery in Databases. The accessibility and abundance of information today makes this a topic of particular importance and need. The book has three main parts complemented by appendices as well as software and project data that are accessible from the book's web site (http: //www.eng.tau.ac.iV-maimonlifn-kdg ). Part I (Chapters 1-4) starts with the topic of KDD and DM in general and makes reference to other works in the field, especially those related to the information theoretic approach. The remainder of the book presents our work, starting with the IFN theory and algorithms. Part II (Chapters 5-6) discusses the methodology of application and includes case studies. Then in Part III (Chapters 7-9) a comparative study is presented, concluding with some advanced methods and open problems. The IFN, being a generic methodology, applies to a variety of fields, such as manufacturing, finance, health care, medicine, insurance, and human resources. The appendices expand on the relevant theoretical background and present descriptions of sample projects (including detailed results)."

Dynamics and Randomness II (Paperback, Softcover reprint of hardcover 1st ed. 2004): Alejandro Maass, Servet Martinez, Jaime... Dynamics and Randomness II (Paperback, Softcover reprint of hardcover 1st ed. 2004)
Alejandro Maass, Servet Martinez, Jaime San Martin
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

This book contains the lectures given at the II Canference an Dynamics and Randamness held at the Centro de Modelamiento Matematico of the Universidad de Chile, from December 9th to 13th, 2002. This meeting brought together mathematicians, theoretical physicists, theoretical computer scientists, and graduate students interested in fields related to probability theory, ergodic theory, symbolic and topological dynamics. We would like to express our gratitude to an the participants of the conference and to the people who contributed to its orga- nization. In particular, to Pierre Collet, BerIiard Rost and Karl Petersen for their scientific advise. We want to thank warmly the authors of each chapter for their stimulating lectures and for their manuscripts devoted to a various of appealing subjects in probability and dynamics: to Jean Bertoin for his course on Some aspects of random fragmentation in con- tinuous time; to Anton Bovier for his course on Metastability and ageing in stochastic dynamics; to Steve Lalley for his course on AI- gebraic systems of generat ing functions and return probabilities for random walks; to Elon Lindenstrauss for his course on Recurrent measures and measure rigidity; to Sylvie Meleard for her course on Stochastic particle approximations for two-dimensional N avier- Stokes equations; and to Anatoly Vershik for his course on Random and universal metric spaces.

Groebner Bases, Coding, and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2009): Massimiliano Sala, Teo Mora,... Groebner Bases, Coding, and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Massimiliano Sala, Teo Mora, Ludovic Perret, Shojiro Sakata, Carlo Traverso
R2,918 Discovery Miles 29 180 Ships in 10 - 15 working days

Coding theory and cryptography allow secure and reliable data transmission, which is at the heart of modern communication. Nowadays, it is hard to find an electronic device without some code inside. Grobner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in theoretical contexts and in practical situations.

This book is the first book ever giving a comprehensive overview on the application of commutative algebra to coding theory and cryptography. For example, all important properties of algebraic/geometric coding systems (including encoding, construction, decoding, list decoding) are individually analysed, reporting all significant approaches appeared in the literature. Also, stream ciphers, PK cryptography, symmetric cryptography and Polly Cracker systems deserve each a separate chapter, where all the relevant literature is reported and compared. While many short notes hint at new exciting directions, the reader will find that all chapters fit nicely within a unified notation."

Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008): Keith Mayes,... Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Keith Mayes, Konstantinos Markantonakis
R3,627 Discovery Miles 36 270 Ships in 10 - 15 working days

Providing a broad overview of the many card systems and solutions in practical use today, this state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book cannot be found to match both the breadth and depth of content. The book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study. A step-by-step approach educates the reader and by the end of the book the reader should be able to play an educated role in a smart card related project.

Topics in Geometry, Coding Theory and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2007): Arnaldo Garcia,... Topics in Geometry, Coding Theory and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Arnaldo Garcia, Henning Stichtenoth
R1,500 Discovery Miles 15 000 Ships in 10 - 15 working days

The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppas discovery of algebraic geometry codes around 1980, many applications of function fields were found in different areas of mathematics and information theory. This book presents survey articles on some of these new developments. The topics focus on material which has not yet been presented in other books or survey articles.

Guide to Elliptic Curve Cryptography (Paperback, Softcover reprint of the original 1st ed. 2004): Darrel Hankerson, Alfred J.... Guide to Elliptic Curve Cryptography (Paperback, Softcover reprint of the original 1st ed. 2004)
Darrel Hankerson, Alfred J. Menezes, Scott Vanstone
R3,647 Discovery Miles 36 470 Ships in 10 - 15 working days

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.

Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application.
Features & Benefits:

* Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems

* Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology

* Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic
* Distills complex mathematics and algorithms for easy understanding
* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software tools
This comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.

Global Initiatives to Secure Cyberspace - An Emerging Landscape (Paperback, Softcover reprint of hardcover 1st ed. 2009):... Global Initiatives to Secure Cyberspace - An Emerging Landscape (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Michael Portnoy, Seymour Goodman
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations promoting global initiatives to secure cyberspace. The authors provide a breakdown and analysis of organizations by type, - cluding international, regional, private-public, and non-governmental organi- tions. Concluding with a discussion of the progress made in recent years, the study explores current trends regarding the effectiveness and scope of coverage provided by these organizations and addresses several questions concerning the overall state of international cyber security. The authors would like to thank Mr. Anthony Rutkowski for generously p- viding his time, guidance, and support. The authors would also like to thank the International Telecommunication Union (ITU) Telecommunication Development Sector (ITU-D) and the United States National Science Foundation (NSF Grant R3772) for partially supporting the research conducted in this study. In addition, the authors would like to thank the Georgia Institute of Technology's Center for International Strategy, Technology, and Policy (CISTP) for assistance in hosting the Cyber Security Organization Catalog, and the Georgia Tech Information Se- rity Center (GTISC) for cooperation and promotion of this study. Table of Contents 1 The International Landscape of Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 A Brief History of Global Responses to Cyber Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Information, Coding and Mathematics - Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday (Paperback,... Information, Coding and Mathematics - Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday (Paperback, Softcover reprint of hardcover 1st ed. 2002)
Mario Blaum, Patrick G. Farrell, Henk C.A. van Tilborg
R4,377 Discovery Miles 43 770 Ships in 10 - 15 working days

Information, Coding and Mathematics is a classic reference for both professional and academic researchers working in error-correction coding and decoding, Shannon theory, cryptography, digital communications, information security, and electronic engineering. The work represents a collection of contributions from leading experts in turbo coding, cryptography and sequences, Shannon theory and coding bounds, and decoding theory and applications. All of the contributors have individually and collectively dedicated their work as a tribute to the outstanding work of Robert J. McEliece. Information, Coding and Mathematics covers the latest advances in the widely used and rapidly developing field of information and communication technology.

Multiple Access Communications - 4th International Workshop, MACOM 2011, Trento, Italy, September 12-13, 2011. Proceedings... Multiple Access Communications - 4th International Workshop, MACOM 2011, Trento, Italy, September 12-13, 2011. Proceedings (Paperback, 2011)
Claudio Sacchi, Boris Bellalta, Alexey Vinel, Fabrizio Granelli, Yan Zhang, …
R1,884 Discovery Miles 18 840 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Workshop on Multiple Access Communications, MACOM 2011, held in Trento, Italy, in September 2011. The 21 full papers presented were carefully reviewed and selected from more than 40 submissions. They are divided in topical sections on cognitive radio; MAC protocols; communications theory; special session on MAC protocols for WSNs; system analysis and scheduling; and queuing systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
New Research on the Voynich Manuscript…
National Security Agency Hardcover R568 Discovery Miles 5 680
Protecting Privacy through Homomorphic…
Kristin Lauter, Wei Dai, … Hardcover R3,121 Discovery Miles 31 210
Technical Articles about the Voynich…
National Security Agency Hardcover R630 Discovery Miles 6 300
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
The Economics of Blockchain and…
James L. Caton Hardcover R3,044 Discovery Miles 30 440
Introduction to Bitcoin
David Ricardo Hardcover R799 Discovery Miles 7 990
Fundamentals and Applications of…
Joceli Mayer, Paulo V.K. Borges, … Hardcover R2,140 R1,895 Discovery Miles 18 950
Blockchain - Novice to Expert - 2…
Keizer Soeze Hardcover R1,081 R913 Discovery Miles 9 130
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730
Advances in Production Management…
Bojan Lalic, Vidosav Majstorovic, … Hardcover R3,052 Discovery Miles 30 520

 

Partners