0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (78)
  • R250 - R500 (116)
  • R500+ (1,463)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Public Key Infrastructure - First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June... Public Key Infrastructure - First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings (Paperback, 2004 ed.)
Sokratis K. Katsikas, Stefanos Gritzalis
R1,863 R1,731 Discovery Miles 17 310 Save R132 (7%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2004, held on Samos Island, Greece in June 2004.

The 25 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 73 submissions. The papers address all current issues in PKI, ranging from theoretical and foundational topics to applications and regulatory issues in various contexts.

Cybersecurity for Kids Puzzle Book - Fun Learning Cyber Security Basics Through Word Searches, Crosswords, Cryptograms, Logic... Cybersecurity for Kids Puzzle Book - Fun Learning Cyber Security Basics Through Word Searches, Crosswords, Cryptograms, Logic Puzzles, Coloring, and More (Paperback)
Puzzle Punk Books
R192 Discovery Miles 1 920 Ships in 7 - 11 working days
Advances in Cryptology -- CRYPTO 2003 - 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August... Advances in Cryptology -- CRYPTO 2003 - 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings (Paperback, 2003 ed.)
Dan Boneh
R2,736 R2,513 Discovery Miles 25 130 Save R223 (8%) Ships in 10 - 15 working days

Crypto 2003, the 23rd Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The conference received 169 submissions, of which the program committee selected 34 for presentation. These proceedings contain the revised versions of the 34 submissions that were presented at the conference. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. Submissions to the conference represent cutti- edge research in the cryptographic community worldwide and cover all areas of cryptography. Many high-quality works could not be accepted. These works will surely be published elsewhere. The conference program included two invited lectures. Moni Naor spoke on cryptographic assumptions and challenges. Hugo Krawczyk spoke on the 'SI- and-MAc'approachtoauthenticatedDi?e-HellmananditsuseintheIKEpro- cols. The conference program also included the traditional rump session, chaired by Stuart Haber, featuring short, informal talks on late-breaking research news. Assembling the conference program requires the help of many many people. To all those who pitched in, I am forever in your debt. I would like to ?rst thank the many researchers from all over the world who submitted their work to this conference. Without them, Crypto could not exist. I thank Greg Rose, the general chair, for shielding me from innumerable logistical headaches, and showing great generosity in supporting my e?orts.

Security in Pervasive Computing - Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings... Security in Pervasive Computing - Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings (Paperback, 2006 ed.)
John A Clark, Richard F. Paige, Fiona A.C. Polack, Phillip J. Brooke
R1,613 R1,508 Discovery Miles 15 080 Save R105 (7%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Security in Pervasive Computing, SPC 2006, held in York, UK, in April 2006. The 16 revised papers presented together with the extended abstract of 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on protocols, mechanisms, integrity, privacy and security, information flow and access control, and authentication.

Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011,... Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers (Paperback, 2012)
Jan Camenisch, Dogan Kesdogan
R1,751 R1,464 Discovery Miles 14 640 Save R287 (16%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2011, held in Lucerne, Switzerland, in June 2011, co-located and under the auspices of IFIP SEC 2011, the 26th IFIP TC-11 International Information Security Conference. The 12 revised full papers were carefully reviewed and selected from 28 initial submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on assisting users, malware detection, saving energy, policies, and problems in the cloud.

Information Security - 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings... Information Security - 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings (Paperback, 2002 ed.)
Agnes Hui Chan, Virgil Gligor
R2,363 R1,973 Discovery Miles 19 730 Save R390 (17%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Information Security ISC 2002, held in Sao Paulo, Brazil, in September/October 2002.The 38 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on intrusion detection and tamper resistance, cryptographic algorithms and attack implementation, access control and trust management, authentication and privacy, e-commerce protocols, signature schemes, cryptography, key management, and security analysis.

Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised... Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers (Paperback, 2011)
Kyung-Hyune Rhee, DaeHun Nyang
R1,776 R1,497 Discovery Miles 14 970 Save R279 (16%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack.

Cryptographic Hardware and Embedded Systems -- CHES 2011 - 13th International Workshop, Nara, Japan, September 28 -- October 1,... Cryptographic Hardware and Embedded Systems -- CHES 2011 - 13th International Workshop, Nara, Japan, September 28 -- October 1, 2011, Proceedings (Paperback)
Bart Preneel, Tsuyoshi Takagi
R2,130 R1,785 Discovery Miles 17 850 Save R345 (16%) Ships in 10 - 15 working days

This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.

Advances in Cryptology -- CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011,... Advances in Cryptology -- CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011, Proceedings (Paperback)
Phillip Rogaway
R2,622 R2,193 Discovery Miles 21 930 Save R429 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical sections on randomness and its use; computer-assisted cryptographic proofs; outsourcing and delegatin computation; symmetric cryptanalysis and constructions; secure computation: leakage and side channels; quantum cryptography; lattices and knapsacks; public-key encryption; symmetric schemes; signatures; obilvious transfer and secret sharing; and multivariate and coding-based schemes.

Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9-13, 2001. Proceedings (Paperback, 2001 ed.)
Colin Boyd
R2,144 R1,802 Discovery Miles 18 020 Save R342 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001, held in Gold Coast, Australia in December 2001.The 33 revised full papers presented together with an invited paper were carefully reviewed and selected from 153 submissions. The papers are organized in topical sections on lattice based cryptography, human identification, practical public key cryptography, cryptography based on coding theory, block ciphers, provable security, threshold cryptography, two-party protocols, zero knowledge, cryptographic building blocks, elliptic curve cryptography, and anonymity.

Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which... Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which tools you need to hack + practical exercises (Paperback)
Adam Harris
R370 Discovery Miles 3 700 Ships in 7 - 11 working days
Puzzles on Cypercrime and God's Mathematics (Paperback): John Ting Puzzles on Cypercrime and God's Mathematics (Paperback)
John Ting
R255 Discovery Miles 2 550 Ships in 7 - 11 working days
200 Classic Thanksgiving Hymns Cryptograms - Large Print: Great Fun Gifts For Parents, Grandparents, Friends, Puzzles Lovers... 200 Classic Thanksgiving Hymns Cryptograms - Large Print: Great Fun Gifts For Parents, Grandparents, Friends, Puzzles Lovers (Paperback)
Puzzle Galore
R220 Discovery Miles 2 200 Ships in 7 - 11 working days
Internet Address & Password Logbook - 6" x 9" Password Notebook with Alphabetical (Paperback): Dorothy J Hall Internet Address & Password Logbook - 6" x 9" Password Notebook with Alphabetical (Paperback)
Dorothy J Hall
R143 Discovery Miles 1 430 Ships in 7 - 11 working days
Internet Address & Password Logbook 6"X 9" - Keep your usernames, passwords, social info, web addresses and security questions... Internet Address & Password Logbook 6"X 9" - Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R143 Discovery Miles 1 430 Ships in 7 - 11 working days
Password Logbook - Alphabethic Password Tracker and Organizer (Large print, Paperback, Large type / large print edition):... Password Logbook - Alphabethic Password Tracker and Organizer (Large print, Paperback, Large type / large print edition)
Stansted Press Journals
R142 Discovery Miles 1 420 Ships in 7 - 11 working days
Encryption Makes Me Wannacry Notebook - Funny Computer Security College Ruled Notes (Paperback): Jimmie Meinke Encryption Makes Me Wannacry Notebook - Funny Computer Security College Ruled Notes (Paperback)
Jimmie Meinke
R163 Discovery Miles 1 630 Ships in 7 - 11 working days
Fundamentals of Cryptology - A Professional Reference and Interactive Tutorial (Mixed media product, 2000 ed.): Henk C.A. van... Fundamentals of Cryptology - A Professional Reference and Interactive Tutorial (Mixed media product, 2000 ed.)
Henk C.A. van Tilborg
R1,752 Discovery Miles 17 520 Ships in 10 - 15 working days

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g. adding a signature to an electronic document.Cryptology addresses the above issues - it is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical in nature. Fundamentals of Cryptology serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver must share a secret key. Second, the book presents public key cryptosystems, which make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, such as the factorization of large numbers. The remaining chapters cover a variety of topics, including zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in detail: one presents elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions) and the other introduces finite fields and their algebraic structure.Fundamentals of Cryptology is an updated and improved version of An Introduction to Cryptology, originally published in 1988. Apart from a revision of the existing material, there are many new sections, and two new chapters on elliptic curves and authentication codes, respectively. In addition, the book is accompanied by a full text electronic version on CD-ROM as an interactive Mathematica manuscript.Fundamentals of Cryptology will be of interest to computer scientists, mathematicians, and researchers, students, and practitioners in the area of cryptography.

?como Se Hace Un Bebe? (Paperback): Cory Silverberg ?como Se Hace Un Bebe? (Paperback)
Cory Silverberg
R251 R236 Discovery Miles 2 360 Save R15 (6%) Ships in 7 - 11 working days
Financial Cryptography - Third International Conference, FC'99 Anguilla, British West Indies, February 22-25, 1999... Financial Cryptography - Third International Conference, FC'99 Anguilla, British West Indies, February 22-25, 1999 Proceedings (Paperback, 1999 ed.)
Matthew Franklin
R2,007 R1,673 Discovery Miles 16 730 Save R334 (17%) Ships in 10 - 15 working days

The third Financial Cryptography conference was held in February 1999, once again at Anguilla in the British West Indies. The number of attendees continues to increase from year to year, as do the number and quality of the technical submissions. The Program Committee did a great job selecting the technical program. I thank them for all of their eo rt's. We were helped by a number of outside reviewers, including Mart n Abadi, Gerrit Bleumer, Drew Dean, Anand Desai, Mariusz Jakubowski, Andrew Odlyzko, David Pointcheval, Guillaume Poupard, Zul kar Ramzan, Aleta Ricciardi, Dan Simon, Jessica Staddon, Venkie Venka- san, Avishai Wool, and Francis Zane. I apologize for any omissions. Adi Shamir gave an excellent invited talk that forecast the future of crypt- raphy and electronic commerce. On-line certic ate revocation was the subject of a panel led by Michael Myers, following up on the success of his panel on the same topic at last year's conference. Joan Feigenbaum moderated a lively panel on fair use, intellectual property, and the information economy, and I thank her for pulling together from that discussion a paper for these proceedings. A s- cessful Rump Session allowed participants to present new results in an informal setting, superbly chaired by Avi Rubin.

Lectures on Data Security - Modern Cryptology in Theory and Practice (Paperback, 1999 ed.): Ivan Damgard Lectures on Data Security - Modern Cryptology in Theory and Practice (Paperback, 1999 ed.)
Ivan Damgard
R1,184 Discovery Miles 11 840 Ships in 10 - 15 working days

In July 1998, a summer school in cryptology and data security was organized atthecomputersciencedepartmentofAarhusUniversity, Denmark.Thistook place as a part of a series of summer schools organized by the European Edu- tional Forum, an organizationconsisting of the researchcenters TUCS (Finland), IPA(Holland)andBRICS(Denmark, Aarhus).Thelocalorganizingcommittee consisted of Jan Camenisch, Janne Christensen, Ivan Damga? ard (chair), Karen Moller, andLouisSalvail.ThesummerschoolwassupportedbytheEuropean Union. Modern cryptology is an extremely fast growing ?eld and is of fundamental importance in very diverse areas, from theoretical complexity theory to practical electroniccommerceontheInternet.Wethereforesetouttoorganizeaschool that would enable young researchers and students to obtain an overview of some mainareas, coveringboththeoreticalandpracticaltopics.Itisfairtosaythat the school was a success, both in terms of attendance (136 participants from over20countries)andintermsofcontents.Itisapleasuretothankallofthe speakers for their cooperation and the high quality of their presentations. A total of 13 speakers gave talks: Mihir Bellare, University of California, San Diego; Gilles Brassard, University of Montreal; David Chaum, DigiCash; Ronald Cramer, ETH Zur ] ich; Ivan Damg? ard, BRICS; Burt Kaliski, RSA Inc.; Lars Knudsen, Bergen University; Peter Landrock, Cryptomathic; Kevin Mc- Curley, IBM Research, Almaden; Torben Pedersen, Cryptomathic; Bart Preneel, Leuven University; Louis Salvail, BRICS; Stefan Wolf, ETH Zur ] ich.

Number Theoretic Methods in Cryptography - Complexity lower bounds (Hardcover, 1999 ed.): Igor Shparlinski Number Theoretic Methods in Cryptography - Complexity lower bounds (Hardcover, 1999 ed.)
Igor Shparlinski
R2,045 R1,712 Discovery Miles 17 120 Save R333 (16%) Ships in 10 - 15 working days

The book introduces new techniques which imply rigorous lower bounds on the complexity of some number theoretic and cryptographic problems. These methods and techniques are based on bounds of character sums and numbers of solutions of some polynomial equations over finite fields and residue rings. It also contains a number of open problems and proposals for further research. We obtain several lower bounds, exponential in terms of logp, on the de grees and orders of * polynomials; * algebraic functions; * Boolean functions; * linear recurring sequences; coinciding with values of the discrete logarithm modulo a prime p at suf ficiently many points (the number of points can be as small as pI/He). These functions are considered over the residue ring modulo p and over the residue ring modulo an arbitrary divisor d of p - 1. The case of d = 2 is of special interest since it corresponds to the representation of the right most bit of the discrete logarithm and defines whether the argument is a quadratic residue. We also obtain non-trivial upper bounds on the de gree, sensitivity and Fourier coefficients of Boolean functions on bits of x deciding whether x is a quadratic residue. These results are used to obtain lower bounds on the parallel arithmetic and Boolean complexity of computing the discrete logarithm. For example, we prove that any unbounded fan-in Boolean circuit. of sublogarithmic depth computing the discrete logarithm modulo p must be of superpolynomial size.

Security of Block Ciphers - From Algorithm Design to Hardware Implementation (Hardcover): Kazuo Sakiyama, Yu Sasaki, Yang Li Security of Block Ciphers - From Algorithm Design to Hardware Implementation (Hardcover)
Kazuo Sakiyama, Yu Sasaki, Yang Li
R2,038 Discovery Miles 20 380 Ships in 10 - 15 working days

A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis * Written by authors known within the academic cryptography community, this book presents the latest developments in current research * Unique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach - algorithm to implementation covers security from start to completion * Deals with AES (Advanced Encryption standard), one of the most used symmetric-key ciphers, which helps the reader to learn the fundamental theory of cryptanalysis and practical applications of side-channel analysis

Cryptograms - 200 LARGE PRINT Motivational, Inspirational and Funny Cryptogram Puzzles from the early 20th century (Large... Cryptograms - 200 LARGE PRINT Motivational, Inspirational and Funny Cryptogram Puzzles from the early 20th century (Large print, Paperback, Large type / large print edition)
Grant Puzzle Books
R269 Discovery Miles 2 690 Ships in 7 - 11 working days
Password Logbook - A Logbook to Keep track of usernames, passwords, web addresses, password hint in one easy & organized... Password Logbook - A Logbook to Keep track of usernames, passwords, web addresses, password hint in one easy & organized location (Paperback)
Idream Design Co
R142 Discovery Miles 1 420 Ships in 7 - 11 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Official (ISC)2 Guide to the CCSP…
Adam Gordon Hardcover R1,608 Discovery Miles 16 080
Security Awareness - Applying Practical…
Mark Ciampa Paperback R746 R641 Discovery Miles 6 410
You CAN Stop Stupid - Stopping Losses…
Ira Winkler, Dr. Tracy Celaya Brown Paperback R778 R627 Discovery Miles 6 270
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,422 Discovery Miles 14 220
IT Security Governance Guidebook with…
Fred Cohen Hardcover R3,051 Discovery Miles 30 510
Password Organizer and Hide This Book…
Ellie And Scott Paperback R148 Discovery Miles 1 480
The Truth Machine - The Blockchain and…
Michael J. Casey, Paul Vigna Paperback  (1)
R399 R304 Discovery Miles 3 040
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,206 R1,019 Discovery Miles 10 190
2019 Standard Catalog of…
Mateo Marin Hardcover R903 R638 Discovery Miles 6 380
Designing Security Architecture…
Jay Ramachandran Paperback R1,666 R1,136 Discovery Miles 11 360

 

Partners