0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (86)
  • R500+ (1,282)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Information Systems Security - Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings... Information Systems Security - Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings (Paperback, 2007 ed.)
Patrick McDaniel, Shyam K. Gupta
R1,420 Discovery Miles 14 200 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS 2007, held in Delhi, India, in December 2007.

The 18 revised full papers and 5 short papers presented together with 4 keynote papers were carefully reviewed and selected from 78 submissions. The submitted topics in cryptography, intrusion detection, network security, information flow systems, Web security, and many others offer a detailed view of the state of the art in information security. The papers are organized in topical sections on network security, cryptography, architectures and systems, cryptanalysis, protocols, detection and recognition, as well as short papers.

Progress in Cryptology - INDOCRYPT 2007 - 8th International Conference on Cryptology in India, Chennai, India, December 9-13,... Progress in Cryptology - INDOCRYPT 2007 - 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings (Paperback, 2007 ed.)
K. Srinathan, C. Pandu Rangan, Moti Yung
R1,447 Discovery Miles 14 470 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007.

The 22 revised full papers and 11 revised short papers presented together with 3 invited lectures were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers.

Computer Security - ESORICS 2007 - 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 -... Computer Security - ESORICS 2007 - 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 - 26, 2007, Proceedings (Paperback, 2007 ed.)
Joachim Biskup
R2,747 Discovery Miles 27 470 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th European Symposium on Research in Computer Security, ESORICS 2007, held in Dresden, Germany in September 2007.

The 39 revised full papers presented were carefully reviewed and selected from 164 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.

Cryptographic Hardware and Embedded Systems - CHES 2007 - 9th International Workshop, Vienna, Austria, September 10-13, 2007,... Cryptographic Hardware and Embedded Systems - CHES 2007 - 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings (Paperback, 2007 ed.)
Pascal Paillier, Ingrid Verbauwhede
R1,460 Discovery Miles 14 600 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2007. The 31 revised full papers cover side channels, low resources, hardware attacks and countermeasures, special purpose hardware, efficient algorithms for embedded processors, efficient hardware, trusted computing.

Fast Software Encryption - 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected... Fast Software Encryption - 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers (Paperback, 2007 ed.)
Alex Biryukov
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Fast Software Encryption, FSE 2007, held in Luxembourg, Luxembourg in March 2007.

The 28 revised full papers presented were carefully reviewed and selected from 104 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and they are organized in topical sections on hash function cryptanalysis and design, stream ciphers cryptanalysis, theory, block cipher cryptanalysis, block cipher design, theory of stream ciphers, side channel attacks, as well as macs and small block ciphers.

Recent Advances in Intrusion Detection - 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007,... Recent Advances in Intrusion Detection - 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings (Paperback, 2007 ed.)
Christopher Kruegel, Richard Lippmann, Andrew Clark
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. The 17 full papers were carefully reviewed. Each one represents an important contribution to the study of intrusion detection. Papers cover anomaly detection, attacks, system evaluation and threat assessment, malware collection and analysis, anomaly- and specification-based detection, and network intrusion detection.

Detection of Intrusions and Malware, and Vulnerability Assessment - 4th International Conference, DIMVA 2007 Lucerne,... Detection of Intrusions and Malware, and Vulnerability Assessment - 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings (Paperback, 2007 ed.)
Bernhard Hammerli, Robin Sommer
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

OnbehalfoftheProgramCommittee, itisourpleasuretopresenttoyouthep- ceedings of the 4th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Each year DIMVA brings - gether internationalexperts from academia, industry andgovernmentto present and discuss novel security research. DIMVA is organized by the special interest group Security-Intrusion Detection and Response of the German Informatics Society (GI). The DIMVA 2007 Program Committee received 57 submissions from 20 d- ferentcountries. Allsubmissions werecarefullyreviewedbyProgramCommittee members and external experts according to the criteria of scienti?c novelty, - portance to the ?eld and technical quality. The ?nal selection took place at a Program Committee meeting held on March 31, 2007, at Universit a Campus Bio-Medico di Roma, Italy. Twelve full papers and two extended abstracts were selectedforpresentationatthe conferenceandpublicationin theconferencep- ceedings. The conference took place during July 12-13, 2007, at the University of Applied Sciences and Arts Lucerne (HTA Lucerne) in Switzerland. The p- gram featured both theoretical and practical research results grouped into ?ve sessions. ThekeynotespeechwasgivenbyVern Paxson, InternationalComputer Science Institute and Lawrence Berkeley National Laboratory. Another invited talk was presented by Marcelo Masera, InstitutefortheProtection and Security of the Citizen. Peter Trachsel, Deputy Head of the Federal Strategic Unit for IT in Switzerland, gave a speech during the conference dinner. The conference programfurther included a rump sessionorganizedby Sven Dietrich of Carnegie Mellon University; and it was complemented by the third instance of the Eu- pean capture-the-?ag contest CIPHER, organized by Lexi Pimenidis of RWTH Aache

Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30,... Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings (Paperback, 2007 ed.)
Pierangela Samarati, Josep L. Ferrer
R1,434 Discovery Miles 14 340 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2007, held in Palma de Mallorca, Spain in June 2007.

The 21 revised full papers and 8 short papers presented were carefully reviewed and selected from 77 submissions. The papers address all current issues in PKI, ranging from theoretical and foundational topics to applications and regulatory issues in various contexts.

Progress in Cryptology - AFRICACRYPT 2008 - First International Conference on Cryptology in Africa, Casablanca, Morocco, June... Progress in Cryptology - AFRICACRYPT 2008 - First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings (Paperback, 2008 ed.)
Serge Vaudenay
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

The AFRICACRYPT 2008 conference was held during June 11-14, 2008 in Casablanca, Morocco. Upon the initiative of the organizers from the Ecole n- male sup erieure in Casablanca, this event was the ?rst international research conference in Africa dedicated to cryptography. The conference was honored by the presence of the invited speakers Bruce Schneier, Jacques Stern, and Alexander W. Dent who gave talks entitled "The Psychology of Security" "Modern Cryptography: A Historical Perspective" and "ABriefHistoryofProvably-SecurePublic-KeyEncryption,"respectively.These proceedings include papers by Bruce Schneier and by Alexander Dent. The conference received 82 submissions on November 24, 2007. They went through a careful doubly anonymous review process. This was run by the iChair software written by Thomas Baign eres and Matthieu Finiasz. Every paper - ceived at least three review reports. After this period, 25 papers were accepted on February 12, 2008. Authors then had the opportunity to update their papers until March 13, 2008. The present proceedings include all the revised papers. At the end of the review process, the paper entitled "An Authentication Protocol with Encrypted Biometric Data" written by Julien Bringer and Herv e Chabanne was elected to receive the Africacrypt 2008 Best Paper Award. I had the privilege to chair the Program Committee. I would like to thank all committee members for their tough work on the submissions, as well as all externalreviewersfortheirsupport.IalsothankmyassistantThomasBaign eres formaintainingtheserverandhelpingmetorunthesoftware.Ithanktheinvited speakers, the authors of the best paper, the authors of all submissions. They all contributed to the success of the conference."

Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June... Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings (Paperback, 2008 ed.)
Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, …
R1,476 Discovery Miles 14 760 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008.

The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.

Information Security Applications - 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised... Information Security Applications - 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Paperback, 2007 ed.)
Kim Sehun, Moti Yung, Hyung-Woo Lee
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.

The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on Public Key Crypto Applications, Biometrics/Information Hiding, Secure Hardware, Secure Systems, Wireless and Mobile Security, Application Security/Secure Systems, Access Control/DB Security, Smart Cards/Secure Systems and Anonymity and P2P Security.

Topics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April... Topics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008, Proceedings (Paperback, 2008 ed.)
Tal Malkin
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

The RSA Conference is the largest regularly-staged computer security event, with over 350 vendors and many thousands of attendees. The Cryptographers' Track (CT-RSA) is a research conference within the RSA Conference. CT-RSA began in 2001, and has become one of the major established venues for presenting cryptographic research papers to a wide variety of audiences. CT-RSA 2008 was held in San Francisco, California from April 8 to April 11. The proceedings of CT-RSA 2008 contain 26 papers selected from 95 subm- sions pertaining to all aspects of cryptography. Each submission was reviewed by at least three reviewers, which was made possible by the hard work of 27 P- gram Committee members and many external reviewers listed on the following pages. The papers were selected following a detailed online discussion among the Program Committee members. The program included an invited talk by Sha? Goldwasser. The current proceedings include a short abstract of her talk. I would like to express my deep gratitude to the Program Committee m- bers, who volunteered their expertise and hard work over several months, as well as to the external reviewers. Special thanks to Shai Halevi for providing and maintaining the Web review system used for paper submission, reviewing, and ?nal-version preparation. Finally, I would like to thank Burt Kaliski and Ari Juels of RSA Laboratories, as well as the RSA conference team, especially Bree LaBollita, for their assistance throughout the process.

Topics in Cryptology - CT-RSA 2007 - The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February... Topics in Cryptology - CT-RSA 2007 - The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings (Paperback, 2006 ed.)
Masayuki Abe
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2007, CT-RSA 2007, held in San Francisco, CA, USA in February 2007.

The 25 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections on symmetric-key encryption, signatures and authentication, hash functions, digital signatures, cryptographic protocols, side-channel attacks, and efficient implementation.

Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21,... Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers (Paperback, 2006 ed.)
Levente Buttyan, Virgil Gligor, Dirk Westhoff
R1,447 Discovery Miles 14 470 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2006, held in Hamburg, Germany in September 2006 in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). The papers present original research on all aspects of security and privacy in wireless ad hoc and sensor networks.

Algorithmic Cryptanalysis (Hardcover): Antoine Joux Algorithmic Cryptanalysis (Hardcover)
Antoine Joux
R4,236 Discovery Miles 42 360 Ships in 10 - 15 working days

Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program. Divided into three parts, the book begins with a short introduction to cryptography and a background chapter on elementary number theory and algebra. It then moves on to algorithms, with each chapter in this section dedicated to a single topic and often illustrated with simple cryptographic applications. The final part addresses more sophisticated cryptographic applications, including LFSR-based stream ciphers and index calculus methods. Accounting for the impact of current computer architectures, this book explores the algorithmic and implementation aspects of cryptanalysis methods. It can serve as a handbook of algorithmic methods for cryptographers as well as a textbook for undergraduate and graduate courses on cryptanalysis and cryptography.

Information Systems Security - Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings... Information Systems Security - Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings (Paperback, 2006 ed.)
Aditya Bagchi, Vijayalakshmi Atluri
R1,552 Discovery Miles 15 520 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security.

Cryptology and Network Security - 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings... Cryptology and Network Security - 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings (Paperback)
David Pointcheval, Yi Mu, Kefei Chen
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China in December 2006.

The 26 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on encryption, key exchange, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, as well as disponibility and reliability.

Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers... Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers (Paperback, 2007 ed.)
Jan Camenisch, Christian Collberg, Neil F. Johnson, Phil Sallee
R1,448 Discovery Miles 14 480 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Information Hiding, IH 2006, held in Alexandria, VA, USA in July 2006.

The 25 revised full papers presented were carefully selected from over 70 papers submitted. The papers are organized in topical sections on watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.

Critical Information Infrastructures Security - First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 -... Critical Information Infrastructures Security - First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006 (Paperback, 2006 ed.)
Javier Lopez
R1,496 Discovery Miles 14 960 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Critical Information Infrastructures Security, CRITIS 2006, held on Samos Island, Greece in August/September 2006 in conjunction with ISC 2006, the 9th International Information Security Conference. The papers address all security-related heterogeneous aspects of critical information infrastructures.

Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings (Paperback, 2007 ed.)
Alfred Menezes
R2,748 Discovery Miles 27 480 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 27th Annual International Cryptology Conference, CRYPTO 2007, held in Santa Barbara, CA, USA in August 2007.

The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 186 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

Progress in Cryptology - INDOCRYPT 2006 - 7th International Conference on Cryptology in India, Kolkata, India, December 11-13,... Progress in Cryptology - INDOCRYPT 2006 - 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings (Paperback, 2006 ed.)
Rana Barua, Tanja Lange
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006.

The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 186 submissions. The papers are organized in topical sections on symmetric cryptography: attacks, hash functions, provable security: key agreement, provable security: public key cryptograpy, symmetric cryptography: design, modes of operation and message authentication codes, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.

Public Key Cryptography - PKC 2008 - 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona,... Public Key Cryptography - PKC 2008 - 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings (Paperback, 2008 ed.)
Ronald Cramer
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Workshop on Practice and Theory in Public-Key Cryptography, PKC 2008, held in Barcelona, Spain, in March 2008.

The 21 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, digital signatures, identification, broadcast and key agreement, implementation of fast arithmetic, and public key encryption.

Communications and Multimedia Security - 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece,... Communications and Multimedia Security - 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings (Paperback, 2006 ed.)
Herbert Leitold, Evangelos Markatos
R1,479 Discovery Miles 14 790 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2006, held in Heraklion, Crete, Greece in October 2006.

The 22 revised full papers presented were carefully reviewed and selected from 76 submissions.

Cryptographic Hardware and Embedded Systems - CHES 2006 - 8th International Workshop, Yokohama, Japan, October 10-13, 2006,... Cryptographic Hardware and Embedded Systems - CHES 2006 - 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings (Paperback, 2006 ed.)
Louis Goubin, Mitsuru Matsui
R1,462 Discovery Miles 14 620 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2006, held in Yokohama, Japan in October 2006.

The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on side channels, low resources, hardware attacks and countermeasures, special purpose hardware, efficient algorithms for embedded processors, side channels, hardware attacks and countermeasures, efficient hardware, trusted computing, side channels, hardware attacks and countermeasures, as well as efficient hardware.

Fault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006,... Fault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings (Paperback, 2006 ed.)
Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert
R1,481 Discovery Miles 14 810 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006, held in Yokohama, Japan in October 2006.

The 12 revised papers of FDTC 2006 are presented together with nine papers from FDTC 2004 and FDTC 2005 that passed a second round of reviewing. They all provide a comprehensive introduction to the issues faced by designers of robust cryptographic devices.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,483 Discovery Miles 34 830
Corporate Cybersecurity - Identifying…
J. Jackson Hardcover R2,573 Discovery Miles 25 730
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,170 Discovery Miles 61 700
InfoSecurity 2008 Threat Analysis
Craig Schiller, Seth Fogie, … Paperback R1,146 Discovery Miles 11 460
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,170 Discovery Miles 61 700
Current Issues and Trends in…
Hardcover R2,494 Discovery Miles 24 940

 

Partners