0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (85)
  • R500+ (1,288)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June... Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings (Paperback, 2008 ed.)
Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, …
R1,476 Discovery Miles 14 760 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008.

The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.

Information Security Applications - 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised... Information Security Applications - 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Paperback, 2007 ed.)
Kim Sehun, Moti Yung, Hyung-Woo Lee
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.

The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on Public Key Crypto Applications, Biometrics/Information Hiding, Secure Hardware, Secure Systems, Wireless and Mobile Security, Application Security/Secure Systems, Access Control/DB Security, Smart Cards/Secure Systems and Anonymity and P2P Security.

Algorithmic Cryptanalysis (Hardcover): Antoine Joux Algorithmic Cryptanalysis (Hardcover)
Antoine Joux
R4,236 Discovery Miles 42 360 Ships in 10 - 15 working days

Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program. Divided into three parts, the book begins with a short introduction to cryptography and a background chapter on elementary number theory and algebra. It then moves on to algorithms, with each chapter in this section dedicated to a single topic and often illustrated with simple cryptographic applications. The final part addresses more sophisticated cryptographic applications, including LFSR-based stream ciphers and index calculus methods. Accounting for the impact of current computer architectures, this book explores the algorithmic and implementation aspects of cryptanalysis methods. It can serve as a handbook of algorithmic methods for cryptographers as well as a textbook for undergraduate and graduate courses on cryptanalysis and cryptography.

Topics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April... Topics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008, Proceedings (Paperback, 2008 ed.)
Tal Malkin
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

The RSA Conference is the largest regularly-staged computer security event, with over 350 vendors and many thousands of attendees. The Cryptographers' Track (CT-RSA) is a research conference within the RSA Conference. CT-RSA began in 2001, and has become one of the major established venues for presenting cryptographic research papers to a wide variety of audiences. CT-RSA 2008 was held in San Francisco, California from April 8 to April 11. The proceedings of CT-RSA 2008 contain 26 papers selected from 95 subm- sions pertaining to all aspects of cryptography. Each submission was reviewed by at least three reviewers, which was made possible by the hard work of 27 P- gram Committee members and many external reviewers listed on the following pages. The papers were selected following a detailed online discussion among the Program Committee members. The program included an invited talk by Sha? Goldwasser. The current proceedings include a short abstract of her talk. I would like to express my deep gratitude to the Program Committee m- bers, who volunteered their expertise and hard work over several months, as well as to the external reviewers. Special thanks to Shai Halevi for providing and maintaining the Web review system used for paper submission, reviewing, and ?nal-version preparation. Finally, I would like to thank Burt Kaliski and Ari Juels of RSA Laboratories, as well as the RSA conference team, especially Bree LaBollita, for their assistance throughout the process.

Topics in Cryptology - CT-RSA 2007 - The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February... Topics in Cryptology - CT-RSA 2007 - The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings (Paperback, 2006 ed.)
Masayuki Abe
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2007, CT-RSA 2007, held in San Francisco, CA, USA in February 2007.

The 25 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections on symmetric-key encryption, signatures and authentication, hash functions, digital signatures, cryptographic protocols, side-channel attacks, and efficient implementation.

Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21,... Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers (Paperback, 2006 ed.)
Levente Buttyan, Virgil Gligor, Dirk Westhoff
R1,447 Discovery Miles 14 470 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2006, held in Hamburg, Germany in September 2006 in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). The papers present original research on all aspects of security and privacy in wireless ad hoc and sensor networks.

Information Systems Security - Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings... Information Systems Security - Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings (Paperback, 2006 ed.)
Aditya Bagchi, Vijayalakshmi Atluri
R1,552 Discovery Miles 15 520 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security.

Cryptology and Network Security - 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings... Cryptology and Network Security - 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings (Paperback)
David Pointcheval, Yi Mu, Kefei Chen
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China in December 2006.

The 26 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on encryption, key exchange, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, as well as disponibility and reliability.

Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers... Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers (Paperback, 2007 ed.)
Jan Camenisch, Christian Collberg, Neil F. Johnson, Phil Sallee
R1,448 Discovery Miles 14 480 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Information Hiding, IH 2006, held in Alexandria, VA, USA in July 2006.

The 25 revised full papers presented were carefully selected from over 70 papers submitted. The papers are organized in topical sections on watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.

Critical Information Infrastructures Security - First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 -... Critical Information Infrastructures Security - First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006 (Paperback, 2006 ed.)
Javier Lopez
R1,496 Discovery Miles 14 960 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Critical Information Infrastructures Security, CRITIS 2006, held on Samos Island, Greece in August/September 2006 in conjunction with ISC 2006, the 9th International Information Security Conference. The papers address all security-related heterogeneous aspects of critical information infrastructures.

Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings (Paperback, 2007 ed.)
Alfred Menezes
R2,748 Discovery Miles 27 480 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 27th Annual International Cryptology Conference, CRYPTO 2007, held in Santa Barbara, CA, USA in August 2007.

The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 186 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

Progress in Cryptology - INDOCRYPT 2006 - 7th International Conference on Cryptology in India, Kolkata, India, December 11-13,... Progress in Cryptology - INDOCRYPT 2006 - 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings (Paperback, 2006 ed.)
Rana Barua, Tanja Lange
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006.

The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 186 submissions. The papers are organized in topical sections on symmetric cryptography: attacks, hash functions, provable security: key agreement, provable security: public key cryptograpy, symmetric cryptography: design, modes of operation and message authentication codes, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.

Public Key Cryptography - PKC 2008 - 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona,... Public Key Cryptography - PKC 2008 - 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings (Paperback, 2008 ed.)
Ronald Cramer
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Workshop on Practice and Theory in Public-Key Cryptography, PKC 2008, held in Barcelona, Spain, in March 2008.

The 21 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, digital signatures, identification, broadcast and key agreement, implementation of fast arithmetic, and public key encryption.

Communications and Multimedia Security - 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece,... Communications and Multimedia Security - 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings (Paperback, 2006 ed.)
Herbert Leitold, Evangelos Markatos
R1,479 Discovery Miles 14 790 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2006, held in Heraklion, Crete, Greece in October 2006.

The 22 revised full papers presented were carefully reviewed and selected from 76 submissions.

Cryptographic Hardware and Embedded Systems - CHES 2006 - 8th International Workshop, Yokohama, Japan, October 10-13, 2006,... Cryptographic Hardware and Embedded Systems - CHES 2006 - 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings (Paperback, 2006 ed.)
Louis Goubin, Mitsuru Matsui
R1,462 Discovery Miles 14 620 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2006, held in Yokohama, Japan in October 2006.

The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on side channels, low resources, hardware attacks and countermeasures, special purpose hardware, efficient algorithms for embedded processors, side channels, hardware attacks and countermeasures, efficient hardware, trusted computing, side channels, hardware attacks and countermeasures, as well as efficient hardware.

Fault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006,... Fault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings (Paperback, 2006 ed.)
Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert
R1,481 Discovery Miles 14 810 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006, held in Yokohama, Japan in October 2006.

The 12 revised papers of FDTC 2006 are presented together with nine papers from FDTC 2004 and FDTC 2005 that passed a second round of reviewing. They all provide a comprehensive introduction to the issues faced by designers of robust cryptographic devices.

Information and Communications Security - 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007,... Information and Communications Security - 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings (Paperback, 2007 ed.)
Hideki Imai, Guilin Wang
R1,471 Discovery Miles 14 710 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007.

The 38 revised full papers presented were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security.

Transactions on Data Hiding and Multimedia Security I (Paperback, 2006 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security I (Paperback, 2006 ed.)
Yun Q. Shi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field in multimedia security. Two related disciplines, steganalysis and data forensics, are also increasingly attracting researchers and forming another new research field in multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper deals with evaluation criteria for the performance of audio watermarking algorithms. The second provides a survey of problems related to watermark security. The third discusses practical implementations of zero-knowledge watermark detectors and proposes efficient solutions for correlation-based detectors. The fourth introduces the concept of Personal Entertainment Domains (PED) in Digital Rights Management (DRM) schemes. The fifth reports on the use of fusion techniques to improve the detection accuracy of steganalysis.

Information Security and Cryptology - ICISC 2007 - 10th International Conference, Seoul, Korea, November 29-30, 2007,... Information Security and Cryptology - ICISC 2007 - 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings (Paperback)
Kil-Hyun Nam, Gwangsoo Rhee
R1,433 Discovery Miles 14 330 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007.

The 28 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 123 submissions. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization.

Information Hiding - 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers... Information Hiding - 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers (Paperback, 2007 ed.)
Teddy Furon, Francois Cayre, Gwenael DoerrG, Patrick Bas
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH 2007, held in Saint Malo, France, in June 2007.

The 25 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on new steganographic schemes, watermarking schemes, computer security, steganography and code theory, watermarking security, steganalysis, watermarking and re-synchronization, fingerprinting, forensics, and steganalysis.

Security and Cryptography for Networks - 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006,... Security and Cryptography for Networks - 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings (Paperback, 2006 ed.)
Roberto De Prisco, Moti Yung
R1,541 Discovery Miles 15 410 Ships in 18 - 22 working days

Here are the refereed proceedings of the 5th International Conference on Security and Cryptology for Networks, SCN 2006. The book offers 24 revised full papers presented together with the abstract of an invited talk. The papers are organized in topical sections on distributed systems security, signature schemes variants, block cipher analysis, anonymity and e-commerce, public key encryption and key exchange, secret sharing, symmetric key cryptanalisis and randomness, applied authentication, and more.

Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings... Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings (Paperback, 2007 ed.)
Willy Susilo, Joseph K. Liu, Yi Mu
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007.

The 10 revised full papers presented together with 7 short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.

Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Nara, Japan, October ... Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings (Paperback, 2. Aufl.)
Hiroaki Kikuchi, Kai Rannenberg
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Workshop on Security, IWSEC 2007, held in Nara, Japan, October 29-31, 2007.

The 30 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, E-commerce and Voting, Operating systems, Security and Information management, Anonymity and Privacy and Digital signatures, Hash function and Protocol.

Information Security - 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Paperback,... Information Security - 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Paperback, 2007 ed.)
Juan Garay, Arjen K. Lenstra, Masahiro Mambo, Rene Peralta
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007, held in Valparaiso, Chile, October 9-12, 2007.

The 28 revised full papers presented were carefully reviewed and selected from 116 submissions. The topics include Intrusion Detection, Digital Rights Management, Symmetric-Key Cryptography, Cryptographic Protocols and Schemes, Identity-Based Schemes, Cryptanalysis, DoS Protection, Software Obfuscation, Public-Key Cryptosystems, Elliptic Curves and Applications and Security Issues in Databases.

Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings (Paperback, 2007 ed.)
Kaoru Kurosawa
R2,736 Discovery Miles 27 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December 2007. The papers are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast cryptography, mac and implementation, multiparty computation, block ciphers, foundation, public key encryption, and cryptanalysis.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Windows 10 in easy steps
Nick Vandome Paperback R329 Discovery Miles 3 290
Heun's Differential Equations
A. Ronveaux Hardcover R4,395 Discovery Miles 43 950
Non-Conventional Energy in North America…
Jorge Morales Pedraza Paperback R2,806 Discovery Miles 28 060
Theories of Generalised Functions…
R.F. Hoskins, J S Pinto Paperback R1,809 Discovery Miles 18 090
Power-to-Gas: Bridging the Electricity…
Mohammad Amin Mirzaei, Mahdi Habibi, … Paperback R3,213 Discovery Miles 32 130
Improving Student Information Search - A…
Barbara Blummer, Jeffrey M. Kenton Paperback R1,463 Discovery Miles 14 630
Kanban - How to Visualize Work and…
Greg Caldwell Hardcover R607 R546 Discovery Miles 5 460
Electricity Decentralization in the…
Rafael Leal-Arcas Paperback R4,294 Discovery Miles 42 940
Windows 8
David Pogue Paperback R1,087 R966 Discovery Miles 9 660
Agile Project Management - The Complete…
Greg Caldwell Hardcover R737 R651 Discovery Miles 6 510

 

Partners