0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (87)
  • R500+ (1,270)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings (Paperback, 2007 ed.)
Alfred Menezes
R2,748 Discovery Miles 27 480 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 27th Annual International Cryptology Conference, CRYPTO 2007, held in Santa Barbara, CA, USA in August 2007.

The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 186 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

Progress in Cryptology - INDOCRYPT 2006 - 7th International Conference on Cryptology in India, Kolkata, India, December 11-13,... Progress in Cryptology - INDOCRYPT 2006 - 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings (Paperback, 2006 ed.)
Rana Barua, Tanja Lange
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006.

The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 186 submissions. The papers are organized in topical sections on symmetric cryptography: attacks, hash functions, provable security: key agreement, provable security: public key cryptograpy, symmetric cryptography: design, modes of operation and message authentication codes, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.

Public Key Cryptography - PKC 2008 - 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona,... Public Key Cryptography - PKC 2008 - 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings (Paperback, 2008 ed.)
Ronald Cramer
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Workshop on Practice and Theory in Public-Key Cryptography, PKC 2008, held in Barcelona, Spain, in March 2008.

The 21 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, digital signatures, identification, broadcast and key agreement, implementation of fast arithmetic, and public key encryption.

Communications and Multimedia Security - 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece,... Communications and Multimedia Security - 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings (Paperback, 2006 ed.)
Herbert Leitold, Evangelos Markatos
R1,479 Discovery Miles 14 790 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2006, held in Heraklion, Crete, Greece in October 2006.

The 22 revised full papers presented were carefully reviewed and selected from 76 submissions.

Cryptographic Hardware and Embedded Systems - CHES 2006 - 8th International Workshop, Yokohama, Japan, October 10-13, 2006,... Cryptographic Hardware and Embedded Systems - CHES 2006 - 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings (Paperback, 2006 ed.)
Louis Goubin, Mitsuru Matsui
R1,462 Discovery Miles 14 620 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2006, held in Yokohama, Japan in October 2006.

The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on side channels, low resources, hardware attacks and countermeasures, special purpose hardware, efficient algorithms for embedded processors, side channels, hardware attacks and countermeasures, efficient hardware, trusted computing, side channels, hardware attacks and countermeasures, as well as efficient hardware.

Fault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006,... Fault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings (Paperback, 2006 ed.)
Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert
R1,481 Discovery Miles 14 810 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006, held in Yokohama, Japan in October 2006.

The 12 revised papers of FDTC 2006 are presented together with nine papers from FDTC 2004 and FDTC 2005 that passed a second round of reviewing. They all provide a comprehensive introduction to the issues faced by designers of robust cryptographic devices.

Information and Communications Security - 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007,... Information and Communications Security - 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings (Paperback, 2007 ed.)
Hideki Imai, Guilin Wang
R1,471 Discovery Miles 14 710 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007.

The 38 revised full papers presented were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security.

Transactions on Data Hiding and Multimedia Security I (Paperback, 2006 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security I (Paperback, 2006 ed.)
Yun Q. Shi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field in multimedia security. Two related disciplines, steganalysis and data forensics, are also increasingly attracting researchers and forming another new research field in multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper deals with evaluation criteria for the performance of audio watermarking algorithms. The second provides a survey of problems related to watermark security. The third discusses practical implementations of zero-knowledge watermark detectors and proposes efficient solutions for correlation-based detectors. The fourth introduces the concept of Personal Entertainment Domains (PED) in Digital Rights Management (DRM) schemes. The fifth reports on the use of fusion techniques to improve the detection accuracy of steganalysis.

Information Security and Cryptology - ICISC 2007 - 10th International Conference, Seoul, Korea, November 29-30, 2007,... Information Security and Cryptology - ICISC 2007 - 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings (Paperback)
Kil-Hyun Nam, Gwangsoo Rhee
R1,433 Discovery Miles 14 330 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007.

The 28 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 123 submissions. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization.

Information Hiding - 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers... Information Hiding - 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers (Paperback, 2007 ed.)
Teddy Furon, Francois Cayre, Gwenael DoerrG, Patrick Bas
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH 2007, held in Saint Malo, France, in June 2007.

The 25 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on new steganographic schemes, watermarking schemes, computer security, steganography and code theory, watermarking security, steganalysis, watermarking and re-synchronization, fingerprinting, forensics, and steganalysis.

Security and Cryptography for Networks - 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006,... Security and Cryptography for Networks - 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings (Paperback, 2006 ed.)
Roberto De Prisco, Moti Yung
R1,541 Discovery Miles 15 410 Ships in 18 - 22 working days

Here are the refereed proceedings of the 5th International Conference on Security and Cryptology for Networks, SCN 2006. The book offers 24 revised full papers presented together with the abstract of an invited talk. The papers are organized in topical sections on distributed systems security, signature schemes variants, block cipher analysis, anonymity and e-commerce, public key encryption and key exchange, secret sharing, symmetric key cryptanalisis and randomness, applied authentication, and more.

Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings... Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings (Paperback, 2007 ed.)
Willy Susilo, Joseph K. Liu, Yi Mu
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007.

The 10 revised full papers presented together with 7 short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.

Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Nara, Japan, October ... Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings (Paperback, 2. Aufl.)
Hiroaki Kikuchi, Kai Rannenberg
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Workshop on Security, IWSEC 2007, held in Nara, Japan, October 29-31, 2007.

The 30 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, E-commerce and Voting, Operating systems, Security and Information management, Anonymity and Privacy and Digital signatures, Hash function and Protocol.

Information Security - 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Paperback,... Information Security - 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Paperback, 2007 ed.)
Juan Garay, Arjen K. Lenstra, Masahiro Mambo, Rene Peralta
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007, held in Valparaiso, Chile, October 9-12, 2007.

The 28 revised full papers presented were carefully reviewed and selected from 116 submissions. The topics include Intrusion Detection, Digital Rights Management, Symmetric-Key Cryptography, Cryptographic Protocols and Schemes, Identity-Based Schemes, Cryptanalysis, DoS Protection, Software Obfuscation, Public-Key Cryptosystems, Elliptic Curves and Applications and Security Issues in Databases.

Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings (Paperback, 2007 ed.)
Kaoru Kurosawa
R2,736 Discovery Miles 27 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December 2007. The papers are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast cryptography, mac and implementation, multiparty computation, block ciphers, foundation, public key encryption, and cryptanalysis.

Detection of Intrusions and Malware, and Vulnerability Assessment - Third International Conference, DIMVA 2006, Berlin,... Detection of Intrusions and Malware, and Vulnerability Assessment - Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings (Paperback, 2006 ed.)
Roland Buschkes, Pavel Laskov
R1,447 Discovery Miles 14 470 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2006, held in Berlin, Germany in July 2006.

The 11 revised full papers presented were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on code analysis, intrusion detection, threat protection and response, malware and forensics, and deployment scenarios.

Secure Mobile Ad-hoc Networks and Sensors - First International Workshop, MADNES 2005, Singapore, September 20-22, 2005,... Secure Mobile Ad-hoc Networks and Sensors - First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers (Paperback, 2006 ed.)
Mike Burmester, Alec Yasinsac
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005, held in Singapore, in September 2005. The book presents 12 revised full papers together with 5 keynote papers and 1 invited paper. These address current topics of all security aspects of constrained network environments with special focus to mobile agents, sensor networks and radio frequency devices.

Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Freiburg, Germany, June 6-9,... Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings (Paperback, 2006 ed.)
Gunter Muller
R1,632 Discovery Miles 16 320 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006. The book presents 36 revised full papers, organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.

Digital Rights Management - Technologies, Issues, Challenges and Systems (Paperback, 2006 ed.): Reihaneh Safavi-Naini, Moti Yung Digital Rights Management - Technologies, Issues, Challenges and Systems (Paperback, 2006 ed.)
Reihaneh Safavi-Naini, Moti Yung
R1,535 Discovery Miles 15 350 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems, DRMTICS 2005, held in Sydney, Australia, in October/November 2005. Presents 26 carefully reviewed full papers organized in topical sections on assurance and authentication issues, legal and related issues, expressing rights and management, watermarking, software issues, fingerprinting and image authentication, supporting cryptographic technology, P2P issues, implementations and architectures.

Selected Areas in Cryptography - 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected... Selected Areas in Cryptography - 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers (Paperback, 2007 ed.)
Eli Biham, Amr M. Youssef
R1,555 Discovery Miles 15 550 Ships in 18 - 22 working days

This volume constitutes the refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography. Twenty-five full papers are presented along with two important invited talks. The papers are organized into topical sections covering block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.

Information Security and Privacy - 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings... Information Security and Privacy - 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (Paperback, 2006 ed.)
Lynn Batten, Reihaneh Safavi-Naini
R1,584 Discovery Miles 15 840 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical sections on stream ciphers, symmetric key ciphers, network security, cryptographic applications, secure implementation, signatures, theory, security applications, provable security, protocols, as well as hashing and message authentication.

Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San... Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. (Paperback, 2006 ed.)
Sharad Mehrotra, Daniel D. Zeng, Hsinchun Chen
R3,011 Discovery Miles 30 110 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006. Gathers 39 revised full papers, 30 revised short papers, and 56 extended poster abstracts, organized in topical sections including intelligence analysis and knowledge discovery; access control, privacy, and cyber trust; surveillance and emergency response; infrastructure protection and cyber security; terrorism informatics and countermeasures; surveillance, bioterrorism, and emergency response.

Foundations of Security Analysis and Design - FOSAD 2006/2007 Turtorial Lectures (Paperback, 2007 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design - FOSAD 2006/2007 Turtorial Lectures (Paperback, 2007 ed.)
Alessandro Aldini, Roberto Gorrieri
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

overviewofthebestindustrialpracticesinITsecurityanalysis.Inparticular, the paperpresentsrecentresearchresultsinthe areaofformalfoundations andpow- erfultoolsforsecurityanalysis.ThecontributionbyUlfarErlingssonoutlinesthe general issues of low-level software security. Concrete details of low-level attacks anddefensesaregiveninthe caseof CandC++softwarecompiledinto machine code. Fabio Martinelli and Paolo Mori describe a solution to improve the Java native security support. Two examples of the application of the proposed so- tion, with history-based monitoring of the application behavior, are given in the case of grid computing and mobile devices. The purpose of the chapter by Javier Lopez, Cristina Alcaraz, and Rodrigo Roman is to review and discuss critical information infrastructures, and show how to protect their functionalities and performance against attacks. As an example, the chapter also discusses the role of wireless sensor networks technology in the protection of these infrastructures. The paper by Liqun Chen is a survey in the area of asymmetric key cryp- graphic methodologies for identity-based cryptography. Audun Josang gives an overviewofthebackground, currentstatus, andfuturetrendoftrustandrepu- tionsystems.Inthefollowingchapter, MarcinCzenko, SandroEtalle, DongyiLi, and William H. Winsborough present the trust management approach to access controlindistributed systems.Inparticular, they focus onthe RT family ofro- based trust management languages. Chris Mitchell and Eimear Gallery report on the trusted computing technology for the next-generation mobile device

Security and Privacy in Ad-hoc and Sensor Networks - 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007,... Security and Privacy in Ad-hoc and Sensor Networks - 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings (Paperback, 2007 ed.)
Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2007, held in Cambridge, UK, in July 2007.

The 17 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers present original research on all aspects of security and privacy in wireless ad hoc and sensor networks and addressing current topics of network security, cryptography, and wireless networking communities. The papers are organized in topical sections on device pairing, key management, location verification and location privacy, secure routing and forwarding, physical security, as well as detection of compromise, and revocation.

Smart Card Research and Advanced Applications - 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain,... Smart Card Research and Advanced Applications - 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings (Paperback, New edition)
Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling
R1,535 Discovery Miles 15 350 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the 7th International Conference on Smart Card Research and Advanced Applications, CARDIS 2006, held in Tarragona, Spain, in April 2006. The 25 revised full papers presented were carefully reviewed and updated for inclusion in this book. The papers are organized in topical sections on smart card applications, side channel attacks, smart card networking, cryptographic protocols, RFID security, and formal methods.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Darning - Repair Make Mend
Hikaru Noguchi Paperback R569 R516 Discovery Miles 5 160
Nonlinear PDEs - Mathematical Models in…
Marius Ghergu, Vicentiu Radulescu Hardcover R2,712 Discovery Miles 27 120
Wavelet Methods for Elliptic Partial…
Karsten Urban Hardcover R4,448 Discovery Miles 44 480
Differential Equations with…
Warren Wright, Dennis Zill Paperback  (1)
R1,393 R1,292 Discovery Miles 12 920
Evolution Equations of Hyperbolic and…
Michael Ruzhansky, Mitsuru Sugimoto, … Hardcover R1,447 Discovery Miles 14 470
Maclean of Duart: - Large Waverley…
Ron Grosset Hardcover R437 Discovery Miles 4 370
An Invitation to Applied Mathematics…
Carmen Chicone Hardcover R2,527 Discovery Miles 25 270
Matrix-Based Multigrid - Theory and…
Yair Shapira Hardcover R1,588 Discovery Miles 15 880
African Textiles - Colour and Creativity…
John Gillow Paperback R858 R646 Discovery Miles 6 460
Method of Difference Potentials and Its…
N.K. Kulman Hardcover R2,956 Discovery Miles 29 560

 

Partners