0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (86)
  • R500+ (1,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Smart Card Research and Advanced Applications - 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6,... Smart Card Research and Advanced Applications - 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers (Paperback, 1st ed. 2016)
Naofumi Homma, Marcel Medwed
R2,331 Discovery Miles 23 310 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Smart Card Research and Advanced Applications, CARDIS 2015, held in Bochum, Germany, in November 2015. The 17 revised full papers presented in this book were carefully reviewed and selected from 40 submissions. The focus of the conference was on all aspects of the design, development, deployment, validation, and application of smart cards and secure elements in secure platforms or systems.

Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey,... Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers (Paperback, 1st ed. 2015)
Berna Ors, Bart Preneel
R2,227 Discovery Miles 22 270 Ships in 10 - 15 working days

This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic protocols and public key cryptography. The book also contains one invited talk in full paper length.

Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14,... Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers (Paperback, 1st ed. 2015)
Stefan Mangard, Axel Y. Poschmann
R2,285 Discovery Miles 22 850 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop, COSADE 2015, held in Berlin, Germany, in April 2015. The 17 revised full papers presented were carefully selected from 48 submissions. the focus of this workshop was on following topics: side-channel attacks, FPGA countermeasures, timing attacks and countermeasures, fault attacks, countermeasures, and Hands-on Side-channel analysis.

Coding Theory and Cryptography - The Essentials (Hardcover, 2nd edition): C.A. Rodger, J.R. Wall, D.C. Hankerson, Gary Hoffman,... Coding Theory and Cryptography - The Essentials (Hardcover, 2nd edition)
C.A. Rodger, J.R. Wall, D.C. Hankerson, Gary Hoffman, D.A. Leonard, …
R3,431 Discovery Miles 34 310 Ships in 12 - 19 working days

Containing data on number theory, encryption schemes, and cyclic codes, this highly successful textbook, proven by the authors in a popular two-quarter course, presents coding theory, construction, encoding, and decoding of specific code families in an "easy-to-use" manner appropriate for students with only a basic background in mathematics offering revised and updated material on the Berlekamp-Massey decoding algorithm and convolutional codes. Introducing the mathematics as it is needed and providing exercises with solutions, this edition includes an extensive section on cryptography, designed for an introductory course on the subject.

Advances in Audio Watermarking Based on Singular Value Decomposition (Paperback, 2015 ed.): Pranab Kumar Dhar, Tetsuya Shimamura Advances in Audio Watermarking Based on Singular Value Decomposition (Paperback, 2015 ed.)
Pranab Kumar Dhar, Tetsuya Shimamura
R1,715 Discovery Miles 17 150 Ships in 10 - 15 working days

This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains using singular value decomposition (SVD) and quantization is introduced. This method is robust against various attacks and provides good imperceptible watermarked sounds. Then, an audio watermarking method in fast Fourier transform (FFT) domain using SVD and Cartesian-polar transformation (CPT) is presented. This method has high imperceptibility and high data payload and it provides good robustness against various attacks. These techniques allow media owners to protect copyright and to show authenticity and ownership of their material in a variety of applications. * Features new methods of audio watermarking for copyright protection and ownership protection * Outlines techniques that provide superior performance in terms of imperceptibility, robustness, and data payload * Includes applications such as data authentication, data indexing, broadcast monitoring, fingerprinting, etc.

Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings... Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (Paperback, 2015 ed.)
Anja Lehmann, Stefan Wolf
R2,365 Discovery Miles 23 650 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held in Lugano, Switzerland, in May 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers cover a variety of topics at the intersection of cryptography, information theory, and quantum physics.

Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015,... Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
R1,645 Discovery Miles 16 450 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

Cryptocurrency in a Nutshell - The Basics of Blockchain and Cryptocurrency Part 1 (Paperback): Greg Somlok Cryptocurrency in a Nutshell - The Basics of Blockchain and Cryptocurrency Part 1 (Paperback)
Greg Somlok
R215 Discovery Miles 2 150 Ships in 10 - 15 working days
Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December... Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers (Paperback, 1st ed. 2015)
Stig F. Mjolsnes
R1,706 Discovery Miles 17 060 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8 revised full papers presented together with 2 revised short papers were carefully reviewed and selected from 30 initial submissions. The papers are organized in topical sections on hash functions, usability, analyses and new techniques.

Forensic Computing (Hardcover, 2nd ed. 2007): Anthony Sammes, Brian Jenkinson Forensic Computing (Hardcover, 2nd ed. 2007)
Anthony Sammes, Brian Jenkinson
R2,532 Discovery Miles 25 320 Ships in 9 - 17 working days

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers.

Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised... Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Kyung-Hyune Rhee, Jeong Hyun Yi
R2,675 Discovery Miles 26 750 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy.

Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised... Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Frederic Cuppens, Joaquin Garcia-Alfaro, Nur Zincir Heywood, Philip W. L. Fong
R2,595 Discovery Miles 25 950 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on privacy; software security and malware analysis; network security and protocols; access control models and policy analysis; protocol verification; and cryptographic technologies.

Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th... Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Joaquin Garcia-Alfaro, Jordi Herrera Joancomarti, Emil Lupu, Joachim Posegga, Alessandro Aldini, …
R2,514 Discovery Miles 25 140 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 3rd International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Computer Security (ESORICS 2014). The volume contains 7 full and 4 short papers plus 1 keynote talk from the DPM workshop; 2 full papers and 1 keynote talk from the SETOP workshop; and 7 full papers and 1 keynote talk from the QASA workshop - selected out of 52 submissions. The papers are organized in topical sections on data privacy management; autonomous and spontaneous security; and quantitative aspects in security assurance.

Lightweight Cryptography for Security and Privacy - Third International Workshop, LightSec 2014, Istanbul, Turkey, September... Lightweight Cryptography for Security and Privacy - Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Thomas Eisenbarth, Erdinc OEzturk
R1,752 Discovery Miles 17 520 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2014, held in Istanbul, Turkey, in September 2014. The 10 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: efficient implementations and designs; attacks; and protocols.

Topics in Cryptology -- CT-RSA 2015 - The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April... Topics in Cryptology -- CT-RSA 2015 - The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (Paperback, 2015 ed.)
Kaisa Nyberg
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based encryption, membership, secure and efficient implementation of AES based Cryptosystems, chosen ciphertext attacks in theory and practice, algorithms for solving hard problems, constructions of hash functions and message authentication codes, secure multiparty computation, authenticated encryption, detecting and tracing malicious activities, implentation attacks on exponentiation algorithms and homomorphic encryption and its applications.

Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014.... Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Marc Joye, Amir Moradi
R2,250 Discovery Miles 22 500 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures; side-channel analysis; embedded implementations; public-key cryptography and leakage and fault attacks.

Arithmetic of Finite Fields - 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected... Arithmetic of Finite Fields - 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Cetin Kaya Koc, Sihem Mesnager, Erkay Savas
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Workshop on the Arithmetic of Finite Field, WAIFI 2014, held in Gebze, Turkey, in September 2014. The 9 revised full papers and 43 invited talks presented were carefully reviewed and selected from 27 submissions. This workshop is a forum of mathematicians, computer scientists, engineers and physicists performing research on finite field arithmetic, interested in communicating the advances in the theory, applications, and implementations of finite fields. The workshop will help to bridge the gap between the mathematical theory of finite fields and their hardware/software implementations and technical applications.

Advances in Information Retrieval - 37th European Conference on IR Research, ECIR 2015, Vienna, Austria, March 29 - April 2,... Advances in Information Retrieval - 37th European Conference on IR Research, ECIR 2015, Vienna, Austria, March 29 - April 2, 2015. Proceedings (Paperback, 2015 ed.)
Allan Hanbury, Gabriella Kazai, Andreas Rauber, Norbert Fuhr
R3,040 Discovery Miles 30 400 Ships in 10 - 15 working days

This book constitutes the proceedings of the 37th European Conference on IR Research, ECIR 2015, held in Vienna, Austria, in March/April 2015. The 44 full papers, 41 poster papers and 7 demonstrations presented together with 3 keynotes in this volume were carefully reviewed and selected from 305 submissions. The focus of the papers were on following topics: aggregated search and diversity, classification, cross-lingual and discourse, efficiency, evaluation, event mining and summarisation, information extraction, recommender systems, semantic and graph-based models, sentiment and opinion, social media, specific search tasks, temporal models and features, topic and document models, user behavior and reproducible IR.

Public-Key Cryptography -- PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography,... Public-Key Cryptography -- PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (Paperback, 2015 ed.)
Jonathan Katz
R1,681 Discovery Miles 16 810 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.

Blockchain fur Dummies 2e (German, Paperback, 2. Auflage): T Laurence Blockchain fur Dummies 2e (German, Paperback, 2. Auflage)
T Laurence
R661 Discovery Miles 6 610 Ships in 12 - 19 working days

Die Blockchain-Technologie verspricht, den Finanzmarkt, die Versicherungsbranche, das Supply-Chain-Management und andere Branchen zu revolutionieren. Aber Sie mA1/4ssen kein Tech-Nerd sein, um die Blockchain zu verstehen. Dieses Buch erklArt die Grundlagen und wichtige Anwendungen wie KryptowAhrungen und Smart Contracts. Reale Beispiele machen deutlich, wie Blockchains funktionieren und wo ihr Mehrwert liegt. Erstellen Sie eine eigene Blockchain, schauen Sie sich die wichtigsten Blockchain-Anbieter an, erkennen Sie das Disruptionspotenzial fA1/4r eingesessene Industrien und vieles mehr.

Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings (Paperback,... Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings (Paperback, 2014 ed.)
Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
R3,158 Discovery Miles 31 580 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.

Information Security and Cryptology -- ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised... Information Security and Cryptology -- ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Hyang-Sook Lee, Dong-Guk Han
R3,054 Discovery Miles 30 540 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography.

Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback):... Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback)
Codaspy'19
R2,820 Discovery Miles 28 200 Ships in 10 - 15 working days
Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014,... Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Nicolas Christin, Reihaneh Safavi-Naini
R2,962 Discovery Miles 29 620 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile system security, incentives, game theory and risk, and bitcoin anonymity.

Authentication in Insecure Environments - Using Visual Cryptography and Non-Transferable Credentials in Practise (Paperback,... Authentication in Insecure Environments - Using Visual Cryptography and Non-Transferable Credentials in Practise (Paperback, 2014 ed.)
Sebastian Pape
R2,395 Discovery Miles 23 950 Ships in 10 - 15 working days

Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R844 R733 Discovery Miles 7 330
Quantum Computing for High School…
Yuly Billig Hardcover R848 R732 Discovery Miles 7 320
Alice and Bob Learn Application Security
T Janca Paperback R1,084 R924 Discovery Miles 9 240
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,406 R1,302 Discovery Miles 13 020
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,692 Discovery Miles 66 920
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,573 Discovery Miles 35 730
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730
TLS Mastery
Michael W Lucas Hardcover R970 R875 Discovery Miles 8 750

 

Partners