0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (100)
  • R500+ (1,350)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Fault Analysis in Cryptography (Paperback, 2012 ed.): Marc Joye, Michael Tunstall Fault Analysis in Cryptography (Paperback, 2012 ed.)
Marc Joye, Michael Tunstall
R2,811 Discovery Miles 28 110 Ships in 10 - 15 working days

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks. Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board. This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.

Tribe of Hackers Red Team - Tribal Knowledge from The best in Offensive Cybersecurity (Paperback): M. J. Carey Tribe of Hackers Red Team - Tribal Knowledge from The best in Offensive Cybersecurity (Paperback)
M. J. Carey
R565 R426 Discovery Miles 4 260 Save R139 (25%) Ships in 12 - 17 working days

Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security Whether you're new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.

Cryptography and Security Systems - Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014.... Cryptography and Security Systems - Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings (Paperback, 2014 ed.)
Zbigniew Kotulski, Bogdan Ksiezopolski, Katarzyna Mazur
R1,448 Discovery Miles 14 480 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Cryptography and Security Systems, CSS 2014, held in Lublin, Poland, in September 2014. The 17 revised full papers presented were carefully reviewed and selected from 43 submissions. 7 of those papers concern different areas of cryptography, while the remaining 10 deal with recent problems of cryptographic protocols.

Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings (Paperback, 2014 ed.):... Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings (Paperback, 2014 ed.)
Willem Jonker, Milan Petkovic
R1,853 Discovery Miles 18 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions.

Querying over Encrypted Data in Smart Grids (Paperback, 2014): Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin... Querying over Encrypted Data in Smart Grids (Paperback, 2014)
Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen
R1,670 Discovery Miles 16 700 Ships in 10 - 15 working days

This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies.

Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1 (Paperback): RA... Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1 (Paperback)
RA Grimes
R599 Discovery Miles 5 990 Ships in 12 - 17 working days

Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized 'crackers' to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today's computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day--HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication--will be virtually useless. . . unless you prepare. Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book: Gives a simple quantum mechanics primer Explains how quantum computing will break current cryptography Offers practical advice for preparing for a post-quantum world Presents the latest information on new cryptographic methods Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.

Radio Frequency Identification: Security and Privacy Issues - Security and Privacy Issues  9th International Workshop, RFIDsec... Radio Frequency Identification: Security and Privacy Issues - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Michael Hutter, Joern-Marc Schmidt
R1,848 Discovery Miles 18 480 Ships in 10 - 15 working days

This book constitutes the proceedings of the 9th Workshop on RFID Security and Privacy, RFIDsec 2013, held in Graz, Austria, in July 2013. The 11 papers presented in this volume were carefully reviewed and selected from 23 submissions. RFIDsec deals with topics of importance to improving the security and privacy of RFID, NFC, contactless technologies, and the Internet of Things. RFIDsec bridges the gap between cryptographic researchers and RFID developers.

Security and its Challenges in the 21st Century (Hardcover): C Guerrier Security and its Challenges in the 21st Century (Hardcover)
C Guerrier
R3,691 Discovery Miles 36 910 Ships in 12 - 17 working days

By the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society. This shift is due to advances in innovative technologies and the investments made by commercial companies to drive constant technological progress. Despite the implementation of the General Data Protection Regulation (GDPR) within the EU in 2018 or 2020's California Consumer Privacy Act (CCPA), regulatory bodies do not have the ability to fully manage the consequences presented by emerging technologies. Security and Its Challenges in the 21st Century provides students and researchers with an international legal and geopolitical analysis; it is also intended for those interested in societal development, artificial intelligence, smart cities and quantum cryptology.

Information Hiding in Communication Networks - Fundamentals, Mechanisms, Applications, and Countermeasures (Hardcover): W... Information Hiding in Communication Networks - Fundamentals, Mechanisms, Applications, and Countermeasures (Hardcover)
W Mazurczyk
R2,367 Discovery Miles 23 670 Ships in 12 - 17 working days

Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. * Highlights development trends and potential future directions of Information Hiding * Introduces a new classification and taxonomy for modern data hiding techniques * Presents different types of network steganography mechanisms * Introduces several example applications of information hiding in communication networks including some recent covert communication techniques in popular Internet services

Advances in Cryptology -- ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (Paperback, 2013 ed.)
Kazue Sako, Palash Sarkar
R1,549 Discovery Miles 15 490 Ships in 10 - 15 working days

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.): Sushil Jajodia, Anup K. Ghosh,... Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.)
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X.Sean Wang
R2,549 Discovery Miles 25 490 Ships in 10 - 15 working days

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.): Amit Vasudevan, Jonathan M. McCune, James Newsome Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.)
Amit Vasudevan, Jonathan M. McCune, James Newsome
R1,413 Discovery Miles 14 130 Ships in 10 - 15 working days

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

Quality, Reliability, Security and Robustness in Heterogeneous Networks - 9th International Confernce, QShine 2013, Greader... Quality, Reliability, Security and Robustness in Heterogeneous Networks - 9th International Confernce, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Karan Singh, Amit K. Awasthi
R3,004 Discovery Miles 30 040 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2013, which was held in National Capital Region (NCR) of India during January 2013. The 87 revised full papers were carefully selected from 169 submissions and present the recent technological developments in broadband high-speed networks, peer-to-peer networks, and wireless and mobile networks.

Android Malware (Paperback, 2013 ed.): Xuxian Jiang, Yajin Zhou Android Malware (Paperback, 2013 ed.)
Xuxian Jiang, Yajin Zhou
R1,578 Discovery Miles 15 780 Ships in 10 - 15 working days

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns. Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform. Covering key topics like the Android malware history, malware behavior and classification, as well as, possible defense techniques.

Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings... Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings (Paperback, 2013 ed.)
Michael Huth, N. Asokan, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp
R1,349 Discovery Miles 13 490 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.

Security for Cloud Storage Systems (Paperback, 2014 ed.): Kan Yang, Xiaohua Jia Security for Cloud Storage Systems (Paperback, 2014 ed.)
Kan Yang, Xiaohua Jia
R1,333 Discovery Miles 13 330 Ships in 10 - 15 working days

Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the servers for access control. To protect the data integrity in the cloud, an efficient and secure dynamic auditing protocol is introduced, which can support dynamic auditing and batch auditing. To ensure the data security in the cloud, two efficient and secure data access control schemes are introduced in this brief: ABAC for Single-authority Systems and DAC-MACS for Multi-authority Systems. While Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data, the existing schemes cannot be directly applied to data access control for cloud storage systems because of the attribute revocation problem. To solve the attribute revocation problem, new Revocable CP-ABE methods are proposed in both ABAC and DAC-MACS.

Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013, Proceedings (Paperback,... Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013, Proceedings (Paperback, 2013 ed.)
Philippe Gaborit
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations.

Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013, Proceedings (Paperback, 2013 ed.)
Thomas Johansson, Phong Q. Nguyen
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.

Progress in Cryptology -- AFRICACRYPT 2013 - 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24,... Progress in Cryptology -- AFRICACRYPT 2013 - 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013, Proceedings (Paperback, 2013 ed.)
Amr Youssef, Abderrahmane Nitaj, Aboul Ella Hassanien
R1,520 Discovery Miles 15 200 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in Cairo, Egypt, in June 2013. The 26 papers presented were carefully reviewed and selected from 77 submissions. They cover the following topics: secret-key and public-key cryptography and cryptanalysis, efficient implementation, cryptographic protocols, design of cryptographic schemes, security proofs, foundations and complexity theory, information theory, multi-party computation, elliptic curves, and lattices.

Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013.... Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings (Paperback, 2013 ed.)
Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini
R1,555 Discovery Miles 15 550 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.

Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012,... Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Miroslaw Kutylowski, Moti Yung
R1,502 Discovery Miles 15 020 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st... Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st ed. 2004)
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
R1,430 Discovery Miles 14 300 Ships in 10 - 15 working days

Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Research Directions in Data and Applications Security - IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications... Research Directions in Data and Applications Security - IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK (Paperback, Softcover reprint of the original 1st ed. 2003)
Ehud Gudes, Sujeet Shenoi
R2,810 Discovery Miles 28 100 Ships in 10 - 15 working days

Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: -Role-Based Access Control; -Database Security; -XML Security; -Data Mining and Inference; -Multimedia System Security; -Network Security; -Public Key Infrastructure; -Formal Methods and Protocols; -Security and Privacy.

Smart Card Research and Advanced Applications - 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30,... Smart Card Research and Advanced Applications - 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Stefan Mangard
R1,474 Discovery Miles 14 740 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Smart Card Research and Advanced Applications, CARDIS 2012, held in Graz, Austria, in November 2012. The 18 revised full papers presented together with an invited talk were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on Java card security, protocols, side-channel attacks, implementations, and implementations for resource-constrained devices.

Steganography in Digital Media - Principles, Algorithms, and Applications (Hardcover): Jessica Fridrich Steganography in Digital Media - Principles, Algorithms, and Applications (Hardcover)
Jessica Fridrich
R2,797 Discovery Miles 27 970 Ships in 12 - 17 working days

Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of steganography. Assuming only a basic knowledge in calculus and statistics, the book blends the various strands of steganography, including information theory, coding, signal estimation and detection, and statistical signal processing. Experiments on real media files demonstrate the performance of the techniques in real life, and most techniques are supplied with pseudo-code, making it easy to implement the algorithms. The book is ideal for students taking courses on steganography and information hiding, and is also a useful reference for engineers and practitioners working in media security and information assurance.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
LAMY Safari Ballpoint Pen (Green…
R349 Discovery Miles 3 490
Parker IM Mono Fountain Pen (Blue…
R1,370 Discovery Miles 13 700
Parker IM Professional Ballpoint Pen…
R838 Discovery Miles 8 380
Parker Jotter Ballpoint Pen - Bond…
R411 Discovery Miles 4 110
Parker Jotter Original Fountain Pen…
R280 R243 Discovery Miles 2 430
Parker IM Premium Ballpoint Pen - Blue…
R1,259 Discovery Miles 12 590
Parker IM Professional Rollerball Pen…
R1,036 Discovery Miles 10 360
Parker Jotter Global Icons Ballpoint Pen…
R799 Discovery Miles 7 990
Pentel Calme Retractable Ballpoint Pen…
R271 Discovery Miles 2 710
Parker Jotter Original Fountain Pen…
R280 R243 Discovery Miles 2 430

 

Partners