0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (100)
  • R500+ (1,352)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Secure Communicating Systems - Design, Analysis, and Implementation (Hardcover): Michael R. A. Huth Secure Communicating Systems - Design, Analysis, and Implementation (Hardcover)
Michael R. A. Huth
R2,247 R2,017 Discovery Miles 20 170 Save R230 (10%) Ships in 12 - 17 working days

This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical implementation; standard security models for information flow in computer programs or human organizations; and moral, legal, and political issues. Another novel feature is the presentation of a formal model-checking tool for specifying and debugging security protocols. A supporting web site http://www.cis.ksu.edu/~huth/scs contains Java source code for the programs featured plus links to other sites.

Financial Cryptography and Data Security - 24th International Conference, FC 2020 , Kota Kinabalu, Malaysia, February 10-14,... Financial Cryptography and Data Security - 24th International Conference, FC 2020 , Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers (Paperback, 1st ed. 2020)
Joseph Bonneau, Nadia Heninger
R2,907 Discovery Miles 29 070 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Conference on Financial Cryptography and Data Security, FC 2020, held in Kota Kinabalu, Malaysia, in February 2020. The 34 revised full papers and 2 short papers were carefully selected and reviewed from 162 submissions. The papers are grouped in the following topical sections: attacks; consensus; cryptoeconomics; layer 2; secure computation; privacy; crypto foundations; empirical studies; and smart contracts.

Cryptographic Hardware and Embedded Systems -- CHES 2011 - 13th International Workshop, Nara, Japan, September 28 -- October 1,... Cryptographic Hardware and Embedded Systems -- CHES 2011 - 13th International Workshop, Nara, Japan, September 28 -- October 1, 2011, Proceedings (Paperback)
Bart Preneel, Tsuyoshi Takagi
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.

Advances in Cryptology -- CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011,... Advances in Cryptology -- CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011, Proceedings (Paperback)
Phillip Rogaway
R1,617 Discovery Miles 16 170 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical sections on randomness and its use; computer-assisted cryptographic proofs; outsourcing and delegatin computation; symmetric cryptanalysis and constructions; secure computation: leakage and side channels; quantum cryptography; lattices and knapsacks; public-key encryption; symmetric schemes; signatures; obilvious transfer and secret sharing; and multivariate and coding-based schemes.

Data and Applications Security and Privacy XXXIV - 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June... Data and Applications Security and Privacy XXXIV - 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings (Paperback, 1st ed. 2020)
Anoop Singhal, Jaideep Vaidya
R1,504 Discovery Miles 15 040 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.* The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy. *The conference was held virtually due to the COVID-19 pandemic.

Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings... Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings (Paperback, 1st ed. 2020)
Jintai Ding, Jean-Pierre Tillich
R3,111 Discovery Miles 31 110 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography, PQCrypto 2020, held in Paris, France in April 2020. The 29 full papers presented in this volume were carefully reviewed and selected from 86 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.

Digital Forensics and Watermarking - 18th International Workshop, IWDW 2019, Chengdu, China, November 2-4, 2019, Revised... Digital Forensics and Watermarking - 18th International Workshop, IWDW 2019, Chengdu, China, November 2-4, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Hongxia Wang, Xianfeng Zhao, Yun Qing Shi, Hyoung Joong Kim, Alessandro Piva
R2,112 Discovery Miles 21 120 Ships in 10 - 15 working days

The 22 full papers and 12 shorts papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are covering the following topics: deep learning for multimedia security; digital forensics and anti-forensics; digital watermarking; information hiding; steganography and steganalysis; authentication and security.

Kryptografie fur Dummies (German, Paperback): HW Lang Kryptografie fur Dummies (German, Paperback)
HW Lang
R699 R649 Discovery Miles 6 490 Save R50 (7%) Out of stock

Die Kommunikation uber das Internet ist quasi oeffentlich: Dritte koennen Nachrichten mitlesen, abfangen oder falschen. Genauso kann ein Sender einer Nachricht behaupten, diese nie gesendet zu haben, und ein Empfanger kann behaupten, eine Nachricht nie erhalten zu haben. Abhilfe schafft die Kryptografie. Sie ermoeglicht nicht nur die Verschlusselung von Nachrichten, sondern auch digitale Unterschriften, die Authentifizierung und die Anonymisierung von Kommunikationspartnern. Das hier vorliegende Buch ist eine Einfuhrung in die Kryptografie fur Studierende - von der symmetrischen uber die asymmetrische Verschlusselung bis hin zu Hash-Funktionen. Umfassend, keinesfalls oberflachlich, aber ohne Vorwissen verstandlich.

Topics in Cryptology - CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, CA, USA,... Topics in Cryptology - CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings (Paperback, 1st ed. 2020)
Stanislaw Jarecki
R1,590 Discovery Miles 15 900 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2020, CT-RSA 2020, held in San Francisco, CA, USA, in February 2020. The 28 papers presented in this volume were carefully reviewed and selected from 95 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto-graphic protocols to primitives and their implementation security.

Decentralized Applications (Paperback): Siraj Raval Decentralized Applications (Paperback)
Siraj Raval
R1,017 R633 Discovery Miles 6 330 Save R384 (38%) Ships in 12 - 17 working days

Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. In this practical guide, author Siraj Raval explains why dapps will become more widely used-and profitable-than today's most popular web apps. You'll learn how the blockchain's cryptographically stored ledger, scarce-asset model, and peer-to-peer (P2P) technology provide a more flexible, better-incentivized structure than current software models. Once you understand the theory behind dapps and what a thriving dapp ecosystem looks like, Raval shows you how to use existing tools to create a working dapp. You'll then take a deep dive into the OpenBazaar decentralized market, and examine two case studies of successful dapps currently in use. Learn advances in distributed-system technology that make distributed data, wealth, identity, computing, and bandwidth possible Build a Twitter clone with the Go language, distributed architecture, decentralized messaging app, and peer-to-peer data store Learn about OpenBazaar's decentralized market and its structure for supporting transactions Explore Lighthouse, a decentralized crowdfunding project that rivals sites such as Kickstarter and IndieGogo Take an in-depth look at La'Zooz, a P2P ridesharing app that transmits data directly between riders and drivers

Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II (Paperback, 1st ed. 2019)
Dongdai Lin, Kazue Sako
R2,667 Discovery Miles 26 670 Ships in 10 - 15 working days

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.

Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March... Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings (Paperback, 1st ed. 2019)
Mitsuru Matsui
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2019, CT-RSA 2019, held in San Francisco, CA, USA, in March 2019. The 28 papers presented in this volume were carefully reviewed and selected from 75 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto- graphic protocols to primitives and their implementation security.

Security and Usability (Paperback): Lorrie Cranor Security and Usability (Paperback)
Lorrie Cranor; Contributions by Simson Garfinkel
R1,438 Discovery Miles 14 380 Ships in 10 - 15 working days

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users.

Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless.

There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. "Security & Usability" is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer

interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research.

"Security & Usability" groups 34 essays into six parts:

Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic.

Authentication Mechanisms-- techniques for identifying and authenticating computer users.

Secure Systems--how system software can deliver or destroy a secure user experience.

Privacy and Anonymity Systems--methods for allowing people to control the release of personal information.

Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,

IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability.

The Classics--groundbreaking papers that sparked the field of security and usability.

This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018,... Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings (Paperback, 1st ed. 2018)
Junfeng Fan, Benedikt Gierlichs
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, held in Singapore, in April 2018.The 14 papers presented in this volume were carefully reviewed and selected from 31 submissions. They were organized in topical sections named: countermeasures against side-channel attacks; tools for side-channel analysis; fault attacks and hardware trojans; and side-channel analysis attacks.

Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised... Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Carlisle Adams, Jan Camenisch
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book contains revised selected papers from the 24th International Conference on Selected Areas in Cryptography, SAC 2017, held in Ottawa, ON, Canada in August 2017. The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. The focus of the conference was on specific themes in the area of cryptographic system design and analysis such as: Design and analysis of symmetric key cryptosystems Primitives for symmetric key cryptography, including block and stream ciphers, hash functions, and MAC algorithms Efficient implementations of symmetric and public key algorithms

Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta,... Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, …
R3,312 Discovery Miles 33 120 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017.The 39 full papers presented were carefully reviewed and selected from 96 submissions. They feature the outcome of the 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, the 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, the Second Workshop on Secure Voting Systems, VOTING 2017, the First Workshop on Trusted Smart Contracts, WTSC 2017, and the First Workshop on Targeted Attacks, TA 2017.The papers are grouped in topical sections named: encrypted computing and applied homomorphic cryptography; bitcoin and blockchain research; advances in secure electronic voting schemes; trusted smart contracts; targeted attacks.

Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016,... Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Roberto Avanzi, Howard Heys
R3,128 Discovery Miles 31 280 Ships in 10 - 15 working days

This book contains revised selected papers from the 23rd International Conference on Selected Areas in Cryptography, SAC 2016, held in St. John's, NL, Canada in August 2016. The 28 full papers and 2 invited papers presented in this volume were carefully reviewed and selected from 100 submissions. They are organized in the following topical sections: side channels and fault attacks; design and implementation of symmetric cryptography; efficient symmetric primitives; cryptanalysis of symmetric primitives; MACs and PRNGs; lattice-based cryptography; and cryptanalysis of asymmetric primitives.

Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings... Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings (Paperback, 1st ed. 2017)
Tatsuaki Okamoto, Yong Yu, Man-Ho Au, Yannan Li
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols.

Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and... Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Tsuyoshi Takagi, Thomas Peyrin
R2,829 Discovery Miles 28 290 Ships in 10 - 15 working days

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part... Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Yael Kalai, Leonid Reyzin
R1,615 Discovery Miles 16 150 Ships in 10 - 15 working days

The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Service-Oriented and Cloud Computing - 6th IFIP WG 2.14 European Conference, ESOCC 2017, Oslo, Norway, September 27-29, 2017,... Service-Oriented and Cloud Computing - 6th IFIP WG 2.14 European Conference, ESOCC 2017, Oslo, Norway, September 27-29, 2017, Proceedings (Paperback, 1st ed. 2017)
Flavio De Paoli, Stefan Schulte, Einar Broch Johnsen
R2,141 Discovery Miles 21 410 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th IFIP WG 2.14 European Conference on Service-Oriented and Cloud Computing, ESOCC 2017, held in Oslo, Norway, in September 2017. The 6 short and 10 full papers presented in this volume were carefully reviewed and selected from 37 submissions. The volume also contains one invited talk in full paper length. The contributions were organized in topical sections named: microservices and containers; security; cloud resources; services; internet of things and data streams; and industrial applications of service and cloud computing.

Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017,... Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings (Paperback, 1st ed. 2017)
Wieland Fischer, Naofumi Homma
R2,920 Discovery Miles 29 200 Ships in 10 - 15 working days

This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The 33 full papers presented in this volume were carefully reviewed and selected from 130 submissions. The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations. The workshop builds a valuable bridge between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations.

The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R434 Discovery Miles 4 340 Ships in 10 - 15 working days
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24,... Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
R2,922 Discovery Miles 29 220 Ships in 10 - 15 working days

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24,... Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
R2,916 Discovery Miles 29 160 Ships in 10 - 15 working days

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptographic Solutions for Secure…
Kannan Balasubramanian, K. Mala, … Hardcover R5,274 Discovery Miles 52 740
Information Security and Ethics - Social…
Marian Quigley Hardcover R2,171 Discovery Miles 21 710
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,512 Discovery Miles 65 120
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,154 Discovery Miles 31 540
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R798 Discovery Miles 7 980
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,512 Discovery Miles 65 120
Applied Cryptography for Cyber Security…
Hamid R. Nemati, Yang Li Hardcover R4,764 Discovery Miles 47 640

 

Partners