0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (79)
  • R250 - R500 (115)
  • R500+ (1,466)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy,... Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers (Hardcover, 2012 ed.)
Jan Camenisch, Bruno Crispo, Simone Fischer-Hubner, Ronald Leenes, Giovanni Russello
R2,353 R1,959 Discovery Miles 19 590 Save R394 (17%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, held in Trento, Italy, in September 2011. The 20 revised papers were carefully selected from numerous submissions during two rounds of reviewing. The book also contains two invited talks. The papers are organized in topical sections on privacy metrics and comparison, policies, privacy transparency in the age of cloud computing, privacy for mobile applications, consumer privacy, privacy for online communities, privacy for eHealth and eID applications, privacy attacks and problems, and ethics.

Detection of Intrusions and Malware, and Vulnerability Assessment - Third International Conference, DIMVA 2006, Berlin,... Detection of Intrusions and Malware, and Vulnerability Assessment - Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings (Paperback, 2006 ed.)
Roland Buschkes, Pavel Laskov
R1,504 R1,391 Discovery Miles 13 910 Save R113 (8%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2006, held in Berlin, Germany in July 2006.

The 11 revised full papers presented were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on code analysis, intrusion detection, threat protection and response, malware and forensics, and deployment scenarios.

Advances in Cryptology - EUROCRYPT 2006 - 25th International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2006 - 25th International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings (Paperback, 2006 ed.)
Serge Vaudenay
R2,107 R1,983 Discovery Miles 19 830 Save R124 (6%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2006. 33 revised full papers are presented together with 2 invited talks. The papers are organized in topical sections on cryptanalysis, cryptography meets humans, stream ciphers, hash functions, oblivious transfer, numbers and lattices, foundations, block ciphers, cryptography without random oracles, multiparty computation, and cryptography for groups.

Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, New York,... Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings (Paperback, 2006 ed.)
Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin
R1,768 Discovery Miles 17 680 Ships in 10 - 15 working days

Here are the refereed proceedings of the 9th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2006, held in New York City in April 2006. The 34 revised full papers presented are organized in topical sections on cryptanalysis and protocol weaknesses, distributed crypto-computing, encryption methods, cryptographic hash and applications, number theory algorithms, pairing-based cryptography, cryptosystems design and analysis, signature and identification, authentication and key establishment, multi-party computation, and PKI techniques.

Smart Card Research and Advanced Applications - 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain,... Smart Card Research and Advanced Applications - 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings (Paperback, New edition)
Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling
R1,969 R1,825 Discovery Miles 18 250 Save R144 (7%) Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 7th International Conference on Smart Card Research and Advanced Applications, CARDIS 2006, held in Tarragona, Spain, in April 2006. The 25 revised full papers presented were carefully reviewed and updated for inclusion in this book. The papers are organized in topical sections on smart card applications, side channel attacks, smart card networking, cryptographic protocols, RFID security, and formal methods.

Intelligence and Security Informatics - International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings (Paperback,... Intelligence and Security Informatics - International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings (Paperback, 2006 ed.)
Hsinchun Chen, Fei-Yue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, …
R1,502 R1,388 Discovery Miles 13 880 Save R114 (8%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Workshop on Intelligence and Security Informatics, WISI 2006, held in Singapore in conjunction with the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 32 papers presented together with the abstract of the keynote talk were carefully reviewed. The papers are organized in sections on Web and text mining for terrorism informatics, cybercrime analysis, network security, and crime data mining.

Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised... Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers (Paperback, 2006 ed.)
Bart Preneel, Stafford Tavares
R1,762 R1,630 Discovery Miles 16 300 Save R132 (7%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Selected Areas in Cryptography, SAC 2005, held in Canada in August 2005. The 25 revised full papers presented were carefully reviewed and selected from 96 submissions for inclusion in the book. The papers are organized in topical sections.

Theory of Cryptography - Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings... Theory of Cryptography - Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings (Paperback, 2006 ed.)
Shai Halevi, Tal Rabin
R2,688 R2,480 Discovery Miles 24 800 Save R208 (8%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third Theory of Cryptography Conference, TCC 2006, held in New York, NY, USA in March 2006.

The 31 revised full papers presented were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on zero-knowledge, primitives, assumptions and models, the bounded-retrieval model, privacy, secret sharing and multi-party computation, universally-composible security, one-way functions and friends, and pseudo-random functions and encryption.

Information Hiding - 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers (Paperback,... Information Hiding - 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers (Paperback, 2005 ed.)
Mauro Barni, Jordi Herrera Joancomarti, Stefan Katzenbeisser, Fernando Perez-Gonzalez
R2,203 R2,035 Discovery Miles 20 350 Save R168 (8%) Ships in 10 - 15 working days

It is our pleasure to present in this volume the proceedings of the 7th Inter- tional Workshopon InformationHiding (IH 2005), held in Barcelona, Catalonia, Spain, during June 6-8, 2005. The workshop was organized by the Department of Computer Science and Multimedia, Universitat Oberta de Catalunya (UOC). Continuing the tradition of previous workshops, we sought a balanced p- gram, containing talks on various aspects of data hiding, anonymous commu- cation, steganalysis, and watermarking.Although the protection of digital int- lectual property has up to now motivated most of our research, there are many other upcoming ?elds of application. We were delighted to see that this year's workshop presented numerous new and unconventional approaches to infor- tion hiding. The selection of the program was a very challenging task. In total, we - ceived 90 submissions from 21 countries. At this point we want to thank all authors who submitted their latest work to IH 2005-and thus assured that the Information Hiding Workshop continues to be the top forum of our community.

Computational Intelligence and Security - International Conference, CIS 2005, Xi'an, China, December 15-19, 2005,... Computational Intelligence and Security - International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I (Paperback, 2005 ed.)
Yue Hao, Jiming Liu, Yuping Wang, Yiuming Cheung, Hujun Yin, …
R3,797 R3,485 Discovery Miles 34 850 Save R312 (8%) Ships in 10 - 15 working days

The International Conference on Computational Intelligence and Security (CIS) is an annualinternationalconference that bringstogether researchers, engineers, developers and practitioners from both academia and industry to share expe- ence and exchange and cross-fertilize ideas on all areas of computational - telligence and information security. The conference serves as a forum for the dissemination of state-of-the-art research and the development, and implem- tationsof systems, technologiesandapplicationsinthese two broad, interrelated ?elds. This year CIS 2005 was co-organized by the IEEE (Hong Kong) Com- tational Intelligence Chapter and Xidian University, and co-sponsored by Hong Kong Baptist University, National Natural Science Foundation of China, Key Laboratory of Computer Networks and Information Security of the Ministry of EducationofChina, andGuangdongUniversityofTechnology. CIS2005received in total 1802 submissions from 41 countries and regions all over the world. All of them were strictly peer reviewed by the Program Committee and experts in the ?eld. Finally, 337 high-quality papers were accepted yielding an acc- tance rate of 18. 7%. Among them, 84 papers are the extended papers and 253 are the regular papers. The conference was greatly enriched by a wide range of topics covering all areas of computational intelligence and information security. Furthermore, tutorials and workshops were held for discussions of the proposed ideas. Such practice is extremely important for the e?ective development of the two ?elds and computer science in general. Wewouldliketothanktheorganizers: theIEEE(HongKong)Computational Intelligence Chapter and Xidian University for their great contributions and - forts in this big e

Managing Information Systems Security and Privacy (Hardcover, 2006 ed.): Denis Trcek Managing Information Systems Security and Privacy (Hardcover, 2006 ed.)
Denis Trcek
R3,293 R2,724 Discovery Miles 27 240 Save R569 (17%) Ships in 10 - 15 working days

The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and legal views. This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security and privacy, while targeting managers and technical profiles. The book addresses principles in the background, regardless of a particular technology or organization. It enables a reader to suit these principles to an organization's needs and to implement them accordingly by using explicit procedures from the book. Additionally, the content is aligned with relevant standards and the latest trends. Scientists from social and technical sciences are supposed to find a framework for further research in this broad area, characterized by a complex interplay between human factors and technical issues.

Progress in Cryptology - INDOCRYPT 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14,... Progress in Cryptology - INDOCRYPT 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings (Paperback, 1st ed. 2016)
Orr Dunkelman, Somitra Kumar Sanadhya
R1,777 R1,498 Discovery Miles 14 980 Save R279 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016. The 23 revised full papers presented in this book were carefully reviewed and selected from 84 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.

Information Security - 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings (Paperback, 2005... Information Security - 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings (Paperback, 2005 ed.)
Jianying Zhou, Robert H. Deng, Feng Bao
R2,335 R2,157 Discovery Miles 21 570 Save R178 (8%) Ships in 10 - 15 working days

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought together individuals from academia and - dustry involvedin manyresearchdisciplines of information security to foster the exchange of ideas. During recent years this conference has tried to place special emphasis on the practical aspects of information security, and since it passed from being an international workshop to being an international conference in 2001, it has become one of the most relevant forums at which researchers meet and discuss emerging security challenges and solutions. Advised by the ISC Steering Committee, and in order to provide students with more opportunities for publication, ISC 2005 accepted extra student papers - sides the regular papers. The initiative was very well accepted by the young sector of the scienti?c community, and we hope that the success of this idea will remainfornextISCevents. AnotherimportantfactorforthesuccessofISC2005 was that selected papers in the proceedings will be invited for submission to a special issue of the InternationalJournalof InformationSecurity. The result was an incredible response to the call for papers; we received 271 submissions, the highest since ISC events started. It goes without saying that the paper selection process was more competitive and di?cult than ever before - only 33 regular papers were accepted, plus 5 student papers for a special student session.

Computer Security - ESORICS 2005 - 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14,... Computer Security - ESORICS 2005 - 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings (Paperback, 2005 ed.)
Sabrina de Capitani di Vimercati, Paul Syverson, Dieter Gollmann
R2,333 R2,156 Discovery Miles 21 560 Save R177 (8%) Ships in 10 - 15 working days

Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12 14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty, and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm- ted, 27 were selected for presentation at the conference, giving an acceptance rate of about 16%. The conference program also includes an invited talk by Barbara Simons. There is a long list of people who volunteered their time and energy to put together the symposiom and who deserve acknowledgment. Thanks to all the members of the program committee, and the external reviewers, for all their hard work in evaluating and discussing papers. We are also very grateful to all those people whose work ensured a smooth organizational process: Pierangela Samarati, who served as General Chair, Claudio Ardagna, who served as P- licity Chair, Dieter Gollmann who served as Publication Chair and collated this volume, and Emilia Rosti and Olga Scotti for helping with local arrangements. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the program stimulating."

Cryptographic Hardware and Embedded Systems - CHES 2005 - 7th International Workshop, Edinburgh, UK, August 29 - September 1,... Cryptographic Hardware and Embedded Systems - CHES 2005 - 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings (Paperback, 2005 ed.)
Josyula R. Rao, Berk Sunar
R2,212 R2,046 Discovery Miles 20 460 Save R166 (8%) Ships in 10 - 15 working days

Thesearetheproceedingsofthe7thWorkshoponCryptographic Hardwareand EmbeddedSystems(CHES2005)heldinEdinburgh, ScotlandfromAugust29to September1,2005.TheCHESworkshophasbeensponsoredbytheInternational Association for Cryptologic Research (IACR) for the last two years. We received a total of 108 paper submissions for CHES 2005. The doub- blindreviewprocessinvolveda27-memberprogramcommittee anda largen- ber of external sub-referees. The review process concluded with a two week d- cussion process which resulted in 32 papers being selected for presentation. We are grateful to the program committee members and the external sub-referees for carrying out such an enormous task. Unfortunately, there were many strong papers that could not be included in the program due to a lack of space. We would like to thank all our colleagues who submitted papers to CHES 2005. In addition to regular presentations, there were three excellent invited talks given by Ross Anderson (University of Cambridge) on "What Identity Systems Can and Cannot Do," by Thomas Wille (Philips Semiconductors Inc) on "- curity of Identi?cation Products: How to Manage," and by Jim Ward (Trusted Computing Groupand IBM)on"TrustedComputing inEmbedded Systems."It also included a rump session, chaired by Christof Paar, featuring informal talks on recent results.

Cybersecurity and Decision Makers - Data Security and Digital Trust (Hardcover): Marie De Freminville Cybersecurity and Decision Makers - Data Security and Digital Trust (Hardcover)
Marie De Freminville
R3,305 Discovery Miles 33 050 Ships in 7 - 11 working days

Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.

Computer Security in the 21st Century (Hardcover, 2005): D. T. Lee, S. P Shieh, J. Doug Tygar Computer Security in the 21st Century (Hardcover, 2005)
D. T. Lee, S. P Shieh, J. Doug Tygar
R3,501 R2,874 Discovery Miles 28 740 Save R627 (18%) Ships in 10 - 15 working days

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of:

- Fundamental new security

- Cryptographic protocols and design,

- A new way of measuring network vulnerability: attack surfaces,

- Network vulnerability and building impenetrable systems,

- Multimedia content protection including a new standard for photographic images, JPEG2000.

Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18,... Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom (Hardcover, 2005 ed.)
David Chadwick, Bart Preneel
R2,862 R2,375 Discovery Miles 23 750 Save R487 (17%) Ships in 10 - 15 working days

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Multimedia Security.

This state-of-the-art volume presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2004, in Windermere, UK. The papers presented here represent the very latest developments in security research from leading people in the field. The papers explore a wide variety of subjects including privacy protection and trust negotiation, mobile security, applied cryptography, and security of communication protocols. Of special interest are several papers which addressed security in the Microsoft .Net architecture, and the threats that builders of web service applications need to be aware of. The papers were a result of research sponsored by Microsoft at five European University research centers.

This collection will be important not only for multimedia security experts and researchers, but also for all teachers and administrators interested in communications security.

Encyclopedia of Cryptography and Security (Hardcover, 2nd ed. 2011): Henk C.A. van Tilborg, Sushil Jajodia Encyclopedia of Cryptography and Security (Hardcover, 2nd ed. 2011)
Henk C.A. van Tilborg, Sushil Jajodia
R17,542 R14,832 Discovery Miles 148 320 Save R2,710 (15%) Ships in 10 - 15 working days

Expanded into two volumes, the Second Edition of Springer s "Encyclopedia of Cryptography and Security "brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition 5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the "Encyclopedia of Cryptography and Security "provides easy, intuitive access to information on all aspects of cryptography and security. As a critical enhancement to the First Edition s base of 464 entries, the information in the "Encyclopedia" is relevant for researchers and professionals alike. Topics for this comprehensive reference were elected, written, and peer-reviewed by a pool of distinguished researchers in the field. The Second Edition s editorial board now includes 34 scholars, which was expanded from 18 members in the First Edition. Representing the work of researchers from over 30 countries, the "Encyclopedia "is broad in scope, covering everything from authentication and identification to quantum cryptography and web security. The text s practical style is instructional, yet fosters investigation. Each area presents concepts, designs, and specific implementations. The highly-structured essays in this work include synonyms, a definition and discussion of the topic, bibliographies, and links to related literature. Extensive cross-references to other entries within the "Encyclopedia "support efficient, user-friendly searches for immediate access to relevant information. Key concepts presented in the "Encyclopedia of Cryptography and Security "include: Authentication and identification; Block ciphers and stream ciphers; Computational issues; Copy protection; Cryptanalysis and security; Cryptographic protocols; Electronic payment and digital certificates; Elliptic curve cryptography; Factorization algorithms and primality tests; Hash functions and MACs; Historical systems; Identity-based cryptography; Implementation aspects for smart cards and standards; Key management; Multiparty computations like voting schemes; Public key cryptography; Quantum cryptography; Secret sharing schemes; Sequences; Web Security. Topics covered: Data Structures, Cryptography and Information Theory; Data Encryption; Coding and Information Theory; Appl.Mathematics/Computational Methods of Engineering; Applications of Mathematics; Complexity. This authoritative reference will be published in two formats: print and online. The online edition features hyperlinks to cross-references, in addition to significant research."

Public Key Infrastructure - First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June... Public Key Infrastructure - First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings (Paperback, 2004 ed.)
Sokratis K. Katsikas, Stefanos Gritzalis
R1,863 R1,731 Discovery Miles 17 310 Save R132 (7%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2004, held on Samos Island, Greece in June 2004.

The 25 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 73 submissions. The papers address all current issues in PKI, ranging from theoretical and foundational topics to applications and regulatory issues in various contexts.

Advances in Cryptology -- CRYPTO 2003 - 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August... Advances in Cryptology -- CRYPTO 2003 - 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings (Paperback, 2003 ed.)
Dan Boneh
R2,736 R2,513 Discovery Miles 25 130 Save R223 (8%) Ships in 10 - 15 working days

Crypto 2003, the 23rd Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The conference received 169 submissions, of which the program committee selected 34 for presentation. These proceedings contain the revised versions of the 34 submissions that were presented at the conference. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. Submissions to the conference represent cutti- edge research in the cryptographic community worldwide and cover all areas of cryptography. Many high-quality works could not be accepted. These works will surely be published elsewhere. The conference program included two invited lectures. Moni Naor spoke on cryptographic assumptions and challenges. Hugo Krawczyk spoke on the 'SI- and-MAc'approachtoauthenticatedDi?e-HellmananditsuseintheIKEpro- cols. The conference program also included the traditional rump session, chaired by Stuart Haber, featuring short, informal talks on late-breaking research news. Assembling the conference program requires the help of many many people. To all those who pitched in, I am forever in your debt. I would like to ?rst thank the many researchers from all over the world who submitted their work to this conference. Without them, Crypto could not exist. I thank Greg Rose, the general chair, for shielding me from innumerable logistical headaches, and showing great generosity in supporting my e?orts.

Security in Pervasive Computing - Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings... Security in Pervasive Computing - Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings (Paperback, 2006 ed.)
John A Clark, Richard F. Paige, Fiona A.C. Polack, Phillip J. Brooke
R1,613 R1,508 Discovery Miles 15 080 Save R105 (7%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Security in Pervasive Computing, SPC 2006, held in York, UK, in April 2006. The 16 revised papers presented together with the extended abstract of 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on protocols, mechanisms, integrity, privacy and security, information flow and access control, and authentication.

Information Security - 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings... Information Security - 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings (Paperback, 2002 ed.)
Agnes Hui Chan, Virgil Gligor
R2,363 R1,973 Discovery Miles 19 730 Save R390 (17%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Information Security ISC 2002, held in Sao Paulo, Brazil, in September/October 2002.The 38 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on intrusion detection and tamper resistance, cryptographic algorithms and attack implementation, access control and trust management, authentication and privacy, e-commerce protocols, signature schemes, cryptography, key management, and security analysis.

Cryptocurrency in a Nutshell - The Basics of Blockchain and Cryptocurrency Part 1 (Paperback): Greg Somlok Cryptocurrency in a Nutshell - The Basics of Blockchain and Cryptocurrency Part 1 (Paperback)
Greg Somlok
R165 Discovery Miles 1 650 Ships in 7 - 11 working days
Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9-13, 2001. Proceedings (Paperback, 2001 ed.)
Colin Boyd
R2,144 R1,802 Discovery Miles 18 020 Save R342 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001, held in Gold Coast, Australia in December 2001.The 33 revised full papers presented together with an invited paper were carefully reviewed and selected from 153 submissions. The papers are organized in topical sections on lattice based cryptography, human identification, practical public key cryptography, cryptography based on coding theory, block ciphers, provable security, threshold cryptography, two-party protocols, zero knowledge, cryptographic building blocks, elliptic curve cryptography, and anonymity.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,206 R1,019 Discovery Miles 10 190
The Shellcoder's Handbook - Discovering…
Chris Anley, John Heasman, … Paperback R964 R627 Discovery Miles 6 270
Mastering Blockchain - Unlocking the…
Lorne Lantz, Daniel Cawrey Paperback R1,422 R1,085 Discovery Miles 10 850
Management of Information Security
Michael Whitman, Herbert Mattord Paperback R937 R803 Discovery Miles 8 030
Tribe of Hackers Blue Team - Tribal…
Marcus J. Carey, Jennifer Jin Paperback R565 R467 Discovery Miles 4 670
Investigating Cryptocurrencies…
Nick Furneaux Paperback R1,205 R829 Discovery Miles 8 290
Security Awareness - Applying Practical…
Mark Ciampa Paperback R746 R641 Discovery Miles 6 410
The Mathematics of Secrets…
Joshua Holden Paperback R464 R379 Discovery Miles 3 790
You CAN Stop Stupid - Stopping Losses…
Ira Winkler, Dr. Tracy Celaya Brown Paperback R778 R627 Discovery Miles 6 270
IT Security Governance Guidebook with…
Fred Cohen Hardcover R3,051 Discovery Miles 30 510

 

Partners