0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (78)
  • R250 - R500 (115)
  • R500+ (1,464)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Progress in Cryptology - INDOCRYPT 2007 - 8th International Conference on Cryptology in India, Chennai, India, December 9-13,... Progress in Cryptology - INDOCRYPT 2007 - 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings (Paperback, 2007 ed.)
K. Srinathan, C. Pandu Rangan, Moti Yung
R2,196 R1,833 Discovery Miles 18 330 Save R363 (17%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007.

The 22 revised full papers and 11 revised short papers presented together with 3 invited lectures were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers.

Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings... Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings (Paperback, 2007 ed.)
Willy Susilo, Joseph K. Liu, Yi Mu
R1,486 R1,374 Discovery Miles 13 740 Save R112 (8%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007.

The 10 revised full papers presented together with 7 short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.

Advances in Information Processing and Protection (Hardcover, 2007 ed.): Jerzy Pejas, Khalid Saeed Advances in Information Processing and Protection (Hardcover, 2007 ed.)
Jerzy Pejas, Khalid Saeed
R5,004 R4,090 Discovery Miles 40 900 Save R914 (18%) Ships in 10 - 15 working days

This book contains a selection of the best papers given at an international conference on advanced computer systems. The Advanced Computer Systems Conference was held in October 2006, in Miedzyzdroje, Poland. The book is organized into four topical areas: Artificial Intelligence; Computer Security and Safety; Image Analysis, Graphics and Biometrics; and Computer Simulation and Data Analysis.

Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers... Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers (Paperback, 2007 ed.)
Jan Camenisch, Christian Collberg, Neil F. Johnson, Phil Sallee
R1,894 R1,591 Discovery Miles 15 910 Save R303 (16%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Information Hiding, IH 2006, held in Alexandria, VA, USA in July 2006.

The 25 revised full papers presented were carefully selected from over 70 papers submitted. The papers are organized in topical sections on watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.

Information Security - 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Paperback,... Information Security - 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Paperback, 2007 ed.)
Juan Garay, Arjen K. Lenstra, Masahiro Mambo, Rene Peralta
R2,198 R1,835 Discovery Miles 18 350 Save R363 (17%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007, held in Valparaiso, Chile, October 9-12, 2007.

The 28 revised full papers presented were carefully reviewed and selected from 116 submissions. The topics include Intrusion Detection, Digital Rights Management, Symmetric-Key Cryptography, Cryptographic Protocols and Schemes, Identity-Based Schemes, Cryptanalysis, DoS Protection, Software Obfuscation, Public-Key Cryptosystems, Elliptic Curves and Applications and Security Issues in Databases.

Computer Security - ESORICS 2007 - 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 -... Computer Security - ESORICS 2007 - 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 - 26, 2007, Proceedings (Paperback, 2007 ed.)
Joachim Biskup
R2,661 R2,216 Discovery Miles 22 160 Save R445 (17%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th European Symposium on Research in Computer Security, ESORICS 2007, held in Dresden, Germany in September 2007.

The 39 revised full papers presented were carefully reviewed and selected from 164 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.

Cryptographic Hardware and Embedded Systems - CHES 2007 - 9th International Workshop, Vienna, Austria, September 10-13, 2007,... Cryptographic Hardware and Embedded Systems - CHES 2007 - 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings (Paperback, 2007 ed.)
Pascal Paillier, Ingrid Verbauwhede
R2,053 R1,898 Discovery Miles 18 980 Save R155 (8%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2007. The 31 revised full papers cover side channels, low resources, hardware attacks and countermeasures, special purpose hardware, efficient algorithms for embedded processors, efficient hardware, trusted computing.

Foundations of Security Analysis and Design - FOSAD 2006/2007 Turtorial Lectures (Paperback, 2007 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design - FOSAD 2006/2007 Turtorial Lectures (Paperback, 2007 ed.)
Alessandro Aldini, Roberto Gorrieri
R1,768 R1,485 Discovery Miles 14 850 Save R283 (16%) Ships in 10 - 15 working days

overviewofthebestindustrialpracticesinITsecurityanalysis.Inparticular, the paperpresentsrecentresearchresultsinthe areaofformalfoundations andpow- erfultoolsforsecurityanalysis.ThecontributionbyUlfarErlingssonoutlinesthe general issues of low-level software security. Concrete details of low-level attacks anddefensesaregiveninthe caseof CandC++softwarecompiledinto machine code. Fabio Martinelli and Paolo Mori describe a solution to improve the Java native security support. Two examples of the application of the proposed so- tion, with history-based monitoring of the application behavior, are given in the case of grid computing and mobile devices. The purpose of the chapter by Javier Lopez, Cristina Alcaraz, and Rodrigo Roman is to review and discuss critical information infrastructures, and show how to protect their functionalities and performance against attacks. As an example, the chapter also discusses the role of wireless sensor networks technology in the protection of these infrastructures. The paper by Liqun Chen is a survey in the area of asymmetric key cryp- graphic methodologies for identity-based cryptography. Audun Josang gives an overviewofthebackground, currentstatus, andfuturetrendoftrustandrepu- tionsystems.Inthefollowingchapter, MarcinCzenko, SandroEtalle, DongyiLi, and William H. Winsborough present the trust management approach to access controlindistributed systems.Inparticular, they focus onthe RT family ofro- based trust management languages. Chris Mitchell and Eimear Gallery report on the trusted computing technology for the next-generation mobile device

Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings (Paperback, 2007 ed.)
Alfred Menezes
R2,402 R1,987 Discovery Miles 19 870 Save R415 (17%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 27th Annual International Cryptology Conference, CRYPTO 2007, held in Santa Barbara, CA, USA in August 2007.

The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 186 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Jean-Sebastien Coron, Jesper Buus Nielsen
R2,885 R2,667 Discovery Miles 26 670 Save R218 (8%) Ships in 10 - 15 working days

The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.

Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings (Paperback, 2007 ed.)
Moni Naor
R2,102 R1,781 Discovery Miles 17 810 Save R321 (15%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2007, held in Barcelona, Spain in May 2007.

The 33 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG... Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 (Paperback, 2007 ed.)
Damien Sauveron, Konstantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater
R1,615 R1,509 Discovery Miles 15 090 Save R106 (7%) Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems, WISTP 2007, held in Heraklion, Crete, Greece in May 2007.

The 20 revised full papers are organized in topical sections on mobility, hardware and cryptography, privacy, cryptography schemes, smart cards, and small devices.

Information Security Applications - 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised... Information Security Applications - 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers (Paperback, 2007 ed.)
Jae-Kwang Lee, Okyeon Yi, Moti Yung
R1,985 R1,831 Discovery Miles 18 310 Save R154 (8%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical sections on public key crypto applications and virus protection, cyber indication and intrusion detection, biometrics and security trust management, secure software and systems, smart cards and secure hardware, mobile security, DRM, information hiding, ubiquitous computing security, P2P security, pre-authentication for fast handoff in wireless mesh networks including mobile APs.

Progress in Cryptology - VIETCRYPT 2006 - First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September... Progress in Cryptology - VIETCRYPT 2006 - First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers (Paperback, 2006 ed.)
Phong Q. Nguyen
R1,895 R1,591 Discovery Miles 15 910 Save R304 (16%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held in Hanoi, Vietnam, in September 2006.

The 24 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections on signatures and lightweight cryptography, pairing-based cryptography, algorithmic number theory, ring signatures and group signatures, hash functions, cryptanalysis, key agreement and threshold cryptography, as well as public-key encryption.

Privacy Enhancing Technologies - 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers... Privacy Enhancing Technologies - 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers (Paperback, 2006 ed.)
George Danezis, Philippe Golle
R2,243 R1,881 Discovery Miles 18 810 Save R362 (16%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cambridge, UK, in June 2006 co-located with WEIS 2006, the Workshop on the Economics of Information Security, and WOTE 2006, the IAVoSS Workshop On Trustworthy Elections. The 24 revised full papers present novel research on all theoretical and practical aspects of privacy technologies.

Critical Information Infrastructures Security - First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 -... Critical Information Infrastructures Security - First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006 (Paperback, 2006 ed.)
Javier Lopez
R1,512 Discovery Miles 15 120 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Critical Information Infrastructures Security, CRITIS 2006, held on Samos Island, Greece in August/September 2006 in conjunction with ISC 2006, the 9th International Information Security Conference. The papers address all security-related heterogeneous aspects of critical information infrastructures.

Cryptology and Network Security - 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings... Cryptology and Network Security - 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings (Paperback)
David Pointcheval, Yi Mu, Kefei Chen
R1,895 R1,591 Discovery Miles 15 910 Save R304 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China in December 2006.

The 26 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on encryption, key exchange, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, as well as disponibility and reliability.

Progress in Cryptology - INDOCRYPT 2006 - 7th International Conference on Cryptology in India, Kolkata, India, December 11-13,... Progress in Cryptology - INDOCRYPT 2006 - 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings (Paperback, 2006 ed.)
Rana Barua, Tanja Lange
R2,051 R1,896 Discovery Miles 18 960 Save R155 (8%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006.

The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 186 submissions. The papers are organized in topical sections on symmetric cryptography: attacks, hash functions, provable security: key agreement, provable security: public key cryptograpy, symmetric cryptography: design, modes of operation and message authentication codes, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.

Advances in Cryptology -- ASIACRYPT 2006 - 12th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2006 - 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings (Paperback, 2006 ed.)
Xuejia Lai, Kefei Chen
R2,215 R2,049 Discovery Miles 20 490 Save R166 (7%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The 30 revised full papers cover attacks on hash functions, stream ciphers, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures.

Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006,... Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings (Paperback, 2006 ed.)
Helger Lipmaa, Moti Yung, Donghai Lin
R1,625 R1,517 Discovery Miles 15 170 Save R108 (7%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006, held in Beijing, China in November/December 2006. The 23 revised full papers cover digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.

Cryptographic Hardware and Embedded Systems - CHES 2006 - 8th International Workshop, Yokohama, Japan, October 10-13, 2006,... Cryptographic Hardware and Embedded Systems - CHES 2006 - 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings (Paperback, 2006 ed.)
Louis Goubin, Mitsuru Matsui
R2,165 R1,998 Discovery Miles 19 980 Save R167 (8%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2006, held in Yokohama, Japan in October 2006.

The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on side channels, low resources, hardware attacks and countermeasures, special purpose hardware, efficient algorithms for embedded processors, side channels, hardware attacks and countermeasures, efficient hardware, trusted computing, side channels, hardware attacks and countermeasures, as well as efficient hardware.

Blockchain Applications (Hardcover): Arshdeep Bagha Blockchain Applications (Hardcover)
Arshdeep Bagha
R1,763 R1,346 Discovery Miles 13 460 Save R417 (24%) Ships in 7 - 11 working days
Information Security - 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings... Information Security - 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings (Paperback, 2006 ed.)
Sokratis K. Katsikas, Michael Backes, Stefanos Gritzalis, Bart Preneel
R2,282 R2,163 Discovery Miles 21 630 Save R119 (5%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006.

The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on software security, privacy and anonymity, block ciphers and hash functions, digital signatures, stream ciphers, encryption, pervasive computing, network security, watermarking and digital rights management, intrusion detection and worms, key exchange, security protocols and formal methods, and information systems security.

Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy,... Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers (Hardcover, 2012 ed.)
Jan Camenisch, Bruno Crispo, Simone Fischer-Hubner, Ronald Leenes, Giovanni Russello
R2,353 R1,959 Discovery Miles 19 590 Save R394 (17%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, held in Trento, Italy, in September 2011. The 20 revised papers were carefully selected from numerous submissions during two rounds of reviewing. The book also contains two invited talks. The papers are organized in topical sections on privacy metrics and comparison, policies, privacy transparency in the age of cloud computing, privacy for mobile applications, consumer privacy, privacy for online communities, privacy for eHealth and eID applications, privacy attacks and problems, and ethics.

Detection of Intrusions and Malware, and Vulnerability Assessment - Third International Conference, DIMVA 2006, Berlin,... Detection of Intrusions and Malware, and Vulnerability Assessment - Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings (Paperback, 2006 ed.)
Roland Buschkes, Pavel Laskov
R1,504 R1,391 Discovery Miles 13 910 Save R113 (8%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2006, held in Berlin, Germany in July 2006.

The 11 revised full papers presented were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on code analysis, intrusion detection, threat protection and response, malware and forensics, and deployment scenarios.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Security Awareness - Applying Practical…
Mark Ciampa Paperback R746 R641 Discovery Miles 6 410
The Mathematics of Secrets…
Joshua Holden Paperback R464 R379 Discovery Miles 3 790
Tribe of Hackers Red Team - Tribal…
Marcus J. Carey, Jennifer Jin Paperback R496 R371 Discovery Miles 3 710
The Shellcoder's Handbook - Discovering…
Chris Anley, John Heasman, … Paperback R964 R627 Discovery Miles 6 270
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,206 R1,019 Discovery Miles 10 190
CompTIA CySA+ Practice Tests - Exam…
Mike Chapple, David Seidl Paperback R910 R733 Discovery Miles 7 330
Coding with XML for Efficiencies in…
Timothy W. Cole, Myung-Ja (MJ) K Han, … Paperback R1,424 Discovery Miles 14 240
Mastering Corda - Blockchain for Java…
Jamiel Sheikh Paperback R1,438 R1,116 Discovery Miles 11 160
2019 Standard Catalog of…
Mateo Marin Hardcover R903 R638 Discovery Miles 6 380
The Truth Machine - The Blockchain and…
Michael J. Casey, Paul Vigna Paperback  (1)
R399 R304 Discovery Miles 3 040

 

Partners