0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (86)
  • R500+ (1,899)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Cryptography and Coding - 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings (Paperback,... Cryptography and Coding - 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings (Paperback, 2007 ed.)
Steven Galbraith
R1,447 Discovery Miles 14 470 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007.

The 22 revised full papers presented together with 2 invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation.

Provable Security - Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings... Provable Security - Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings (Paperback, 2008 ed.)
Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai
R1,430 Discovery Miles 14 300 Ships in 18 - 22 working days

Thesecondinternationalconferenceonprovablesecurity, ProvSec2008, washeld in Shanghai, China, during October 30th - November 1st, 2008. The conference wassponsoredbyShanghaiJiaoTongUniversity(SJTU)incooperationwiththe Chinese Association for Cryptologic Research (CACR) and the Natural Science Foundation of China (NSFC). The aim of ProvSec is to provide a platform for researchers, scholars, and practitionerstoexchangeideasandextendknowledgeonprovablesecurity, which is an important research area in cryptography. The ?rst ProvSec was held in Wollongong, Australia, in 2007. This year, the conference received 79 papers and the program committee selected 25 papers during eight weeks' thorough reviewing process. The authors ofthe selected papersarefrom12 di?erentcountries: Australia, Belgium, China, Estonia, France, Germany, India, Japan, Norway, Singapore, the UK, and the USA. We are grateful to the members of the program committee for their many hours of valuable time and hard work. In addition to the regular conference program, the conference hosted two invited talks: - Kenny Paterson (University of London, Royal Holloway): Non-interactive Key Distribution and Identity-Based Encryption: A Historical Perspective - PhillipRogaway(University ofCalifornia, Davis): BlockcipherModes of- eration: Culture and Counter-Culture in Modern Cryptography. The conference was also one of the special events for the 50th anniversary of the Department of Computer Science at SJTU. We extend our gratitude to all the people involved in organizing ProvSec from the Department of Computer Science and Engineering and the Lab for InformationSecurityofShanghaiJiaoTongUniversity, inparticulartoYuLong, Yanfei Zheng, Meiju Chen, Zhihua Su, and Bo Zhu for their great e?orts in making the conference run smoot

Information Security and Cryptoloy - ICISC 2008 - 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised... Information Security and Cryptoloy - ICISC 2008 - 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers (Paperback, 2009 ed.)
Pil Joong Lee, Jung Hee Cheon
R1,449 Discovery Miles 14 490 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008.

The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.

Topics in Cryptology - CT-RSA 2009 - The Cryptographers' Track at the RSA Conference 2009, San Francisco,CA, USA, April... Topics in Cryptology - CT-RSA 2009 - The Cryptographers' Track at the RSA Conference 2009, San Francisco,CA, USA, April 20-24, 2009, Proceedings (Paperback, 2009 ed.)
Marc Fischlin
R1,461 Discovery Miles 14 610 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009.

The 31 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on identity-based encryption, protocol analysis, two-party protocols, more than signatures, collisions for hash functions, cryptanalysis, alternative encryption, privacy and anonymity, efficiency improvements, multi-party protocols, security of encryption schemes as well as countermeasures and faults.

Coding Theory and Applications - 2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain,... Coding Theory and Applications - 2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008, Proceedings (Paperback, 2008 ed.)
Angela Barbero
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

It is a pleasure to welcome you to the proceedings of the second International Castle Meeting on Coding Theory and its Applications, held at La Mota Castle in Medina del Campo. The event provided a forum for the exchange of results and ideas, which we hope will foster future collaboration. The ?rst meeting was held in 1999, and, encouraged by that experience, we now intend to hold the meeting every three years. Springer kindly accepted to publish the proceedings volume you have in your hands in their LNCS series. The topics were selected to cover some of the areas of research in Coding Theory that are currently receiving the most attention. The program consisted of a mixture of invited and submitted talks, with the focus on quality rather than quantity. A total of 34 papers were submitted to themeeting.Afteracarefulreviewprocessconductedbythescienti?ccommittee aided by external reviewers, we selected 14 of these for inclusion in the current volume, along with 5 invited papers. The program was further augmented by the remaining invited papers in addition to papers on recent results, printed in a separate volume. We would like to thank everyone who made this meeting possible by helping with the practical and scienti?c preparations: the organization committee, the scienti?c committee, the invited speakers, and the many external reviewers who shall remain anonymous. I would especially like to mention the General Advisor ofthe meeting, OyvindYtrehus.Finally Iextend mygratitudeto allthe authors and participants who contributed to this meeting."

Information Theoretic Security - Third International Conference, ICITS 2008, Calgary, Canada,  August 10-13, 2008, Proceedings... Information Theoretic Security - Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings (Paperback, 2008 ed.)
Reihaneh Safavi-Naini
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

ICITS 2008, the Third InternationalConference on Information Theoretic Se- rity, was held in Calgary, Alberta, Canada, during August 10-13, 2008, at the Universityof Calgary.This seriesof conferences wasstarted with the 2005IEEE InformationTheoryWorkshoponTheoryandPracticein Information-Theoretic Security (ITW 2005, Japan), held on Awaji Island, Japan, October 16-19,2005. The conference series aims at bringing focus to security research when there is no unproven computational assumption on the adversary. This is the fra- work proposed by Claude Shannon in his seminal paper formalizing modern unclassi?ed research on cryptography. Over the last few decades, Shannon's approach to formalizing security has been used in various other areas including authentication, secure communication, key exchange, multiparty computation and information hiding to name a few. Coding theory has also proven to be a powerful tool in the construction of security systems with information theoretic security. Therewere43submitted papers ofwhich14wereaccepted.Eachcontributed paper was reviewed by three members of the Program Committee. In the case of co-authorship by a Program Committee member the paper was reviewed by ?ve members of the committee (no committee member reviewed their own s- mission). In addition to the accepted papers, the conference also included nine invited speakers, whose contributions were not refereed. These proceedings c- tain the acceptedpapers with anyrevisionsrequiredbythe ProgramCommittee as well as the contributions by invited speakers.

Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks - Second... Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks - Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers (Paperback, 2008 ed.)
Henning Schulzrinne, Radu State, Saverio Niccolini
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

These are the proceedings of IPTComm 2008 - the Second Conference on Pr- ciples, Systems andApplications ofIP Telecommunications-heldinHeidelberg, Germany, July 1-2, 2008. The scope of the conference included recent advances in the domains of convergent networks, VoIP security and multimedia service environments for next generation networks. The conference attracted 56 s- missions, of which the Program Committee selected 16 papers for publication. The review process followed strict standards: each paper received at least three reviews. We would like to thank all Program Committee members and external reviewers for their contribution to the review process. The conference attracted attendees from academia and industry. Its excellence is re?ected in the quality of the contributed papers and invited talks. Additional industry talks and - plied demonstrations assured a synergy between academic and applied research. We would also like to acknowledge and thank our sponsors, many of whom s- portedtheconferencegenerously: NEC, AT&T, Codenomicon, IPTEGO, EADS, Cellcrypt, MuDynamics, SIP Forum and EURESCOM, Finally, we would like to thank all the researchers and authors from all over the world who submitted their work to the IPTComm 2008 conferenc

Research in Cryptology - Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected... Research in Cryptology - Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers (Paperback, 2008 ed.)
Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The Western European Workshop on Research in Cryptology (WEWoRC 2007) was the second of its kind. It was organizedas a joint venture between the Horst G] ortzInstituteforSecurityinInformationSystems(HGI), andtheSpecialInt- est Groupon Cryptology(FG Krypto) of the German Computer Science Society (Gesellschaft fu ]r Informatik e.V.). The aim was to bring together researchers in the?eldofcryptology.TheworkshopfocusedonresearchfromMastersandPhD students, and brought them together with more experienced senior researchers. The ?rst workshop (WEWoRC 2005) was held in Leuven. WEWoRC 2007 was held in the German Ruhr region, more particularly in Bochum, during July 4-6, 2007. Formerly a mining town, Bochum is currently growing into a knowledge-based economy. Aided by the city council, IT se- rity is a special focus for economic development. Hence, it provided the perfect scenery for hosting this event. In total, we had 81 participants from 13 di?- ent countries (Belgium, Finland, France, Germany, Iran, Japan, Luxembourg, Malawi, Slovenia, Taiwan, Tunisia, UK, USA)."

Mathematical Methods in Computer Science - Essays in Memory of Thomas Beth (Paperback, 2008 ed.): Jacques Calmet, Willi... Mathematical Methods in Computer Science - Essays in Memory of Thomas Beth (Paperback, 2008 ed.)
Jacques Calmet, Willi Geiselmann, Joern Muller-Quade
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The conference Mathematical Methods in Computer Science (MMICS) was held in the memory of Thomas Beth during December 17-19 in Karlsruhe. The c- ference was meant to re?ect the many interests of Thomas Beth. Even though these interests might seem diverse the mathematical methods employed and - pecially algebra as a language were the common denominator of all his scienti?c achievements. The 12 contributed talks reaching from t-designs to integrated circuits were selected from 30 submissions from 14 countries. The contributed talks were complemented by three invited talks. Teo Mora gave a talk on "Decoding Cyclic Codes: The Cooper Philosophy" embracing the areas of coding theory and symbolic computation. These areas were especially appreciated by Thomas Beth, because they combine algebra and algorithmics. Richard Jozsa lectured about "Embedding Classical into Quantum Compu- tion" in the area of quantum information. Quantum information was a focus of research of Tomas Beth since 1993 when he co-organized one of the e- liest workshops on quantum cryptography in Dagstuhl. Quantum information became his passion in 1994 when the connection between the Fourier transf- mation and breaking the RSA crypto system became apparent via Shor's al- rithm, which can factor integers in polynomial time on a quantum computer. The Fourier transform and cryptography were topics that played an important role in Thomas Beth's research and this connection, once again, justi?ed his broad view on computer science.

IP Operations and Management - 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008,... IP Operations and Management - 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008, Proceedings (Paperback, 2008 ed.)
Nail Akar, Michal Pioro, Charalabos Skianis
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

On behalf of the IEEE Communications Society, Technical Committee on N- work Operations and Management (CNOM), Manweek 2008 Organizing C- mittee, and members of the IPOM Technical Program Committee, it is our pleasureto present the proceedings of the 8th IEEE Workshop on IP Operations and Management(IPOM 2008),heldaspartofManweek2008duringSeptember 22-26, 2008, on Samos, Greece. ThecurrentInternetisalarge-scaledistributedsystemwhosesub-components suchasaddressing,protocols,algorithms,services,need to scalein time withthe rapid growth of Internet tra?c volumes. Moreover, there is a high level of int- action between di?erent subcomponents of the Internet sometimes in undesired ways - for example, denial of service attacks can jeopardize the operation of a commercial network. With these challenges in place, operations and mana- ment of IP networks have become increasingly important. This necessitates a good understanding of the emerging technical and scienti?c problems in the current Internet, and lessons from such understanding will be particularly - portant for future Internet design and management. Building on the success of the previous events, we wanted IPOM 2008 to focus on network management challenges for the current Internet as well as on future Internet design.

Pairing-Based Cryptography - Pairing 2007 - First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007,... Pairing-Based Cryptography - Pairing 2007 - First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto
R1,442 Discovery Miles 14 420 Ships in 18 - 22 working days

This book represents the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in July 2007.

The 18 revised full papers presented together with 2 abstracts and 3 full papers of invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topcial sections on applications, certificateless public key encryption, hyperelliptic curves, implementation, cryptographic protocols, cryptanalysis, and cryptographic algorithms.

Smart Card Research and Advanced Applications - 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK,... Smart Card Research and Advanced Applications - 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008, Proceedings (Paperback, 2008 ed.)
Gilles Grimaud, Francois-Xavier Standaert
R1,412 Discovery Miles 14 120 Ships in 18 - 22 working days

Since1994, CARDIShasbeentheforemostinternationalconferencededicatedto smart card research and applications. Every two years, the scienti?c community congregates to present new ideas and discuss recent developments with both an academicandindustrialfocus.Followingtheincreasedcapabilitiesofsmartcards anddevices, CARDIS has becomea majoreventfor the discussionofthe various issuesrelatedtotheuseofsmallelectronictokensintheprocessofhuman-machine interactions.Thescopeoftheconferenceincludesnumeroussub?eldssuchasn- working, e?cientimplementations, physicalsecurity, biometrics, andso on. This year's CARDIS was held in London, UK, on September 8-11, 2008. It was organized by the Smart Card Centre, Information Security Group of the Royal Holloway, University of London. Thepresentvolumecontainsthe21papersthatwereselectedfromthe51s- missions to the conference. The 22 members of the program committee worked hard in order to evaluate each submission with at least three reviews and agree on a high quality ?nal program. Additionally, 61 external reviewers helped the committee with their expertise. Two invited talks completed the technical p- gram. The ?rst one, given by Ram Banerjee and Anki Nelaturu, was entitled "Getting Started with Java Card 3.0 Platform." The second one, given by Aline Gouget, was about "Recent Advances in Electronic Cash Design" and was c- pleted by an abstract provided in these proceedings.

Pairing-Based Cryptography - Pairing 2008 - Second International Conference, Egham, UK, September 1-3, 2008, Proceedings... Pairing-Based Cryptography - Pairing 2008 - Second International Conference, Egham, UK, September 1-3, 2008, Proceedings (Paperback, 2008 ed.)
Steven Galbraith, Kenny Paterson
R1,434 Discovery Miles 14 340 Ships in 18 - 22 working days

The Pairing 2008 Conference was held at Royal Holloway, University of London during September 1-3, 2008. This conference followed on from the Pairing in Cryptography workshop (held in Dublin, Ireland on June 12-15, 2005) and the Pairing 2007 conference (held in Tokyo, Japan on July 2-4, 2007, with proce- ings published in Springer's LNCS 4575). The aim of this series of conferences is to bring together leading researchers and practitioners from academia and industry, all concerned with problems related to pairing-based cryptography. The programme consisted of 3 invited talks and 20 contributed papers. The invitedspeakerswereXavierBoyen(VoltageSecurity, USA), FlorianHess(Te- nical University Berlin, Germany) and Nigel Smart (University of Bristol, UK). Special thanks are due to these speakers, all three of whom provided papers which are included in these proceedings. The contributed talks were selected from ?fty submissions. The accepted papers cover a range of topics in mathematics and computer science, including hardwareand softwareimplementation of pairings, cryptographicprotocols, and mathematical aspects and applications of pairings. We would like to thank all the people who helped with the conference p- gramme and organisation. First, we thank the Steering Committee for their guidance and suggestions. We also heartily thank the Programme Committee and the sub-reviewers listed on the following pages for their thoroughness d- ing the review process. Each paper was reviewed by at least three people and there was signi?cant online discussion about a number of papers.

Progress in Cryptology - AFRICACRYPT 2008 - First International Conference on Cryptology in Africa, Casablanca, Morocco, June... Progress in Cryptology - AFRICACRYPT 2008 - First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings (Paperback, 2008 ed.)
Serge Vaudenay
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

The AFRICACRYPT 2008 conference was held during June 11-14, 2008 in Casablanca, Morocco. Upon the initiative of the organizers from the Ecole n- male sup erieure in Casablanca, this event was the ?rst international research conference in Africa dedicated to cryptography. The conference was honored by the presence of the invited speakers Bruce Schneier, Jacques Stern, and Alexander W. Dent who gave talks entitled "The Psychology of Security" "Modern Cryptography: A Historical Perspective" and "ABriefHistoryofProvably-SecurePublic-KeyEncryption,"respectively.These proceedings include papers by Bruce Schneier and by Alexander Dent. The conference received 82 submissions on November 24, 2007. They went through a careful doubly anonymous review process. This was run by the iChair software written by Thomas Baign eres and Matthieu Finiasz. Every paper - ceived at least three review reports. After this period, 25 papers were accepted on February 12, 2008. Authors then had the opportunity to update their papers until March 13, 2008. The present proceedings include all the revised papers. At the end of the review process, the paper entitled "An Authentication Protocol with Encrypted Biometric Data" written by Julien Bringer and Herv e Chabanne was elected to receive the Africacrypt 2008 Best Paper Award. I had the privilege to chair the Program Committee. I would like to thank all committee members for their tough work on the submissions, as well as all externalreviewersfortheirsupport.IalsothankmyassistantThomasBaign eres formaintainingtheserverandhelpingmetorunthesoftware.Ithanktheinvited speakers, the authors of the best paper, the authors of all submissions. They all contributed to the success of the conference."

Fast Software Encryption - 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected... Fast Software Encryption - 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers (Paperback, 2008 ed.)
Kaisa Nyberg
R1,464 Discovery Miles 14 640 Ships in 18 - 22 working days

FastSoftwareEncryption(FSE)isthe15thinaseriesofworkshopsonsymmetric cryptography. It is sponsored by the International Association for Cryptologic Research(IACR), andpreviousFSEworkshopshavebeenheldaroundtheworld: 1993 Cambridge, UK 1994 Leuven, Belgium 1996 Cambridge, UK 1997 Haifa, Israel 1998 Paris, France 1999 Rome, Italy 2000 New York, USA 2001 Yokohama, Japan 2002 Leuven, Belgium 2003 Lund, Sweden 2004 New Delhi, India 2005 Paris, France 2006 Graz, Austria 2007 Luxembourg, Luxembourg The FSE workshop is devoted to the foreground research on fast and secure primitivesforsymmetriccryptography, includingthedesignandanalysisofblock ciphers, stream ciphers, encryption schemes, analysis and evaluation tools, hash functions, and message authentication codes. This year 72 papers were submitted to FSE including a large number of hi- quality and focused submissions, from which 26 papers for regular presentation and 4 papers for short presentation were selected. I wish to thank the authors of all submissions for their scienti?c contribution to the workshop. The workshop also featured an invited talk by Lars R. Knudsen with the title "Hash functions and SHA-3." The traditional rump session with short informal presentations on current topics was organized and chaired by Daniel J. Bernstein. EachsubmissionwasreviewedbyatleastthreeProgramCommitteemembers. Each submission originating from the Program Committee received at least ?ve reviews.The?nalselectionwasmadeafterathoroughdiscussion.Iwishtothank all ProgramCommittee members and referees for their generouswork.I am also gratefulto ThomasBaign eresformaintainingandcustomizingthe iChair review management software, which o?ered an excellent support for the demanding reviewing task. I would also like to thank him for setting up a beautiful and informative website and for compiling the pre-proceedings.

Financial Cryptography and Data Security - 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 -... Financial Cryptography and Data Security - 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers (Paperback, 2006 ed.)
Giovanni Di Crescenzo, Avi Rubin
R1,519 Discovery Miles 15 190 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data Security, FC 2006, held in Anguilla, British West Indies in February/March 2006. The 19 revised full papers and six revised short papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections.

Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings (Paperback, 2007 ed.)
Kaoru Kurosawa
R2,736 Discovery Miles 27 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December 2007. The papers are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast cryptography, mac and implementation, multiparty computation, block ciphers, foundation, public key encryption, and cryptanalysis.

Information Security Practice and Experience - Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007,... Information Security Practice and Experience - Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings (Paperback, 2007 ed.)
Ed Dawson, Duncan S. Wong
R1,431 Discovery Miles 14 310 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Information Security Practice and Experience Conference, ISPEC 2007, held in Hong Kong, China in May 2007.

The 24 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on cryptanalysis, signatures, network security and security management, privacy and applications, cryptographic algorithms and implementations, authentication and key management, as well as cryptosystems.

Formal Aspects in Security and Trust - Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006,... Formal Aspects in Security and Trust - Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006, Revised Selected Papers (Paperback, 2007 ed.)
Theo Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust, FAST 2006, held in Hamilton, Ontario, Canada, August 26-27, 2006.

The 18 revised papers presented were carefully reviewed and selected from 47 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.

Secure Data Management - 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings (Paperback, 2007... Secure Data Management - 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings (Paperback, 2007 ed.)
Willem Jonker, Milan Petkovic
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Fourth VLDB 2007 International Workshop on Secure Data Management, SDM 2007, held in Vienna, Austria, September 23-24, 2007 in conjunction with VLDB 2007.

The 11 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Access Control, Database Security, Privacy Protection and Positon Papers.

Transactions on Data Hiding and Multimedia Security II (Paperback, 2007 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security II (Paperback, 2007 ed.)
Yun Q. Shi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper introduces Fingercasting, which allows joint fingerprinting and decryption of broadcast messages. The second paper presents an estimation attack on content-based video fingerprinting. The third proposes a statistics and spatiality-based feature distance measure for error resilient image authentication. The fourth paper reports on LTSB steganalysis. Finally, the fifth paper surveys various blind and robust watermarking schemes for 3D shapes.

Il Futuro Dell'information & Communication Technology - Tecnologie, Timori E Scenari Futuri Della Global Network... Il Futuro Dell'information & Communication Technology - Tecnologie, Timori E Scenari Futuri Della Global Network Revolution (Italian, Hardcover, 2009 ed.)
Antonio Teti
R425 Discovery Miles 4 250 Ships in 10 - 15 working days

Negli ultimi decenni il rapido sviluppo delle tecnologie IT ha influito in maniera determinante nella vita dell'uomo, trasformando, spesso inconsapevolmente il suo lavoro, le sue abitudini, il suo modo di interagire con il mondo che lo circonda. Il fenomeno della "globalizzazione" dei mercati e solo una delle trasformazioni che l'intero pianeta sta attraversando. Anche se i vantaggi derivanti dall'utilizzo delle moderne tecnologie di comunicazione ci facilitano nel lavoro e nella attivita ludiche e personali, molte sono le perplessita e i dubbi che attanagliano tutti coloro che le utilizzano. Se l'Information Technology rappresenta il "combustibile" indispensabile per la sopravvivenza delle aziende e delle attivita dell'uomo, nel contempo puo generare problematicita di grande rilievo. Il testo tratta alcune delle problematiche che destano preoccupazioni rilevanti nel mondo intero come il consumo energetico dei sistemi informatici (incontrollabili e inquinanti), il problema della garanzia della privacy e dell'integrita dei dati su Internet, l'utilizzo della rete Internet come strumento di controllo delle masse, la possibile sparizione degli attuali sistemi operativi che potranno essere sostituiti dal sistema operativo Web Operating System."

Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised... Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers (Paperback, 2006 ed.)
Alfonso Valdes, Diego Zamboni
R1,532 Discovery Miles 15 320 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection held in September 2005. The 15 revised full papers and two practical experience reports were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on worm detection and containment, anomaly detection, intrusion prevention and response, intrusion detection based on system calls and network-based, as well as intrusion detection in mobile and wireless networks.

Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing,... Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings (Paperback, 2007 ed.)
Tatsuaki Okamoto, Xiaoyun Wang
R1,610 Discovery Miles 16 100 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, held in Beijing, China in April 2007.

The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure.

Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings (Paperback, 2005 ed.)
Bimal Kumar Roy
R1,522 Discovery Miles 15 220 Ships in 18 - 22 working days

Asiacrypt, the annual conference of cryptology sponsored by IACR is now 11 years old. Asiacrypt 2005 was held during December 4-8, 2005, at Hotel Taj Coromandel, Chennai, India.This conferencewasorganizedby theInternational Association for Cryptologic Research (IACR) in cooperation with the Indian Institute of Technology (IIT), Chennai. Thisyearatotalof237papersweresubmittedtoAsiacrypt2005.Thesubm- sionscoveredallareasofcryptographicresearchrepresentingthecurrentstateof work in the crypto community worldwide. Each paper was blind reviewed by at least three members of the Program Committee and papers co-authored by the PC members were reviewed by at least six members. This ?rst phase of review by the PC members was followed by a detailed discussion on the papers. At the end of the reviewing process 37 papers were accepted and were presented at the conference. The proceedings contain the revised versionsof the accepted papers. In addition we were fortunate to have Prof. Andrew Yao and Prof. Bart Preneel as invited speakers. Based on a discussion and subsequent voting among the PC members, the Best Paper Award for this year's Asiacrypt was conferred to Pascal Paillier and Damien Vergnaud for the paper entitled "Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log." I would like to thank the following people. First, the General Chair, Prof.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Blockchain - An Essential Beginner's…
Herbert Jones Hardcover R656 R585 Discovery Miles 5 850
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Quantum Computing for High School…
Yuly Billig Hardcover R781 R680 Discovery Miles 6 800
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Python Programming For Beginners In 2020…
James Tudor Hardcover R701 Discovery Miles 7 010
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,356 Discovery Miles 23 560
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260

 

Partners