0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (86)
  • R500+ (1,283)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Information and Communications Security - 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007,... Information and Communications Security - 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings (Paperback, 2007 ed.)
Hideki Imai, Guilin Wang
R1,471 Discovery Miles 14 710 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007.

The 38 revised full papers presented were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security.

Transactions on Data Hiding and Multimedia Security I (Paperback, 2006 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security I (Paperback, 2006 ed.)
Yun Q. Shi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field in multimedia security. Two related disciplines, steganalysis and data forensics, are also increasingly attracting researchers and forming another new research field in multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper deals with evaluation criteria for the performance of audio watermarking algorithms. The second provides a survey of problems related to watermark security. The third discusses practical implementations of zero-knowledge watermark detectors and proposes efficient solutions for correlation-based detectors. The fourth introduces the concept of Personal Entertainment Domains (PED) in Digital Rights Management (DRM) schemes. The fifth reports on the use of fusion techniques to improve the detection accuracy of steganalysis.

Information Security and Cryptology - ICISC 2007 - 10th International Conference, Seoul, Korea, November 29-30, 2007,... Information Security and Cryptology - ICISC 2007 - 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings (Paperback)
Kil-Hyun Nam, Gwangsoo Rhee
R1,433 Discovery Miles 14 330 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007.

The 28 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 123 submissions. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization.

Information Hiding - 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers... Information Hiding - 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers (Paperback, 2007 ed.)
Teddy Furon, Francois Cayre, Gwenael DoerrG, Patrick Bas
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH 2007, held in Saint Malo, France, in June 2007.

The 25 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on new steganographic schemes, watermarking schemes, computer security, steganography and code theory, watermarking security, steganalysis, watermarking and re-synchronization, fingerprinting, forensics, and steganalysis.

Security and Cryptography for Networks - 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006,... Security and Cryptography for Networks - 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings (Paperback, 2006 ed.)
Roberto De Prisco, Moti Yung
R1,541 Discovery Miles 15 410 Ships in 18 - 22 working days

Here are the refereed proceedings of the 5th International Conference on Security and Cryptology for Networks, SCN 2006. The book offers 24 revised full papers presented together with the abstract of an invited talk. The papers are organized in topical sections on distributed systems security, signature schemes variants, block cipher analysis, anonymity and e-commerce, public key encryption and key exchange, secret sharing, symmetric key cryptanalisis and randomness, applied authentication, and more.

Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings... Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings (Paperback, 2007 ed.)
Willy Susilo, Joseph K. Liu, Yi Mu
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007.

The 10 revised full papers presented together with 7 short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.

Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Nara, Japan, October ... Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings (Paperback, 2. Aufl.)
Hiroaki Kikuchi, Kai Rannenberg
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Workshop on Security, IWSEC 2007, held in Nara, Japan, October 29-31, 2007.

The 30 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, E-commerce and Voting, Operating systems, Security and Information management, Anonymity and Privacy and Digital signatures, Hash function and Protocol.

Information Security - 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Paperback,... Information Security - 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Paperback, 2007 ed.)
Juan Garay, Arjen K. Lenstra, Masahiro Mambo, Rene Peralta
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007, held in Valparaiso, Chile, October 9-12, 2007.

The 28 revised full papers presented were carefully reviewed and selected from 116 submissions. The topics include Intrusion Detection, Digital Rights Management, Symmetric-Key Cryptography, Cryptographic Protocols and Schemes, Identity-Based Schemes, Cryptanalysis, DoS Protection, Software Obfuscation, Public-Key Cryptosystems, Elliptic Curves and Applications and Security Issues in Databases.

Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings (Paperback, 2007 ed.)
Kaoru Kurosawa
R2,736 Discovery Miles 27 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December 2007. The papers are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast cryptography, mac and implementation, multiparty computation, block ciphers, foundation, public key encryption, and cryptanalysis.

Detection of Intrusions and Malware, and Vulnerability Assessment - Third International Conference, DIMVA 2006, Berlin,... Detection of Intrusions and Malware, and Vulnerability Assessment - Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings (Paperback, 2006 ed.)
Roland Buschkes, Pavel Laskov
R1,447 Discovery Miles 14 470 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2006, held in Berlin, Germany in July 2006.

The 11 revised full papers presented were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on code analysis, intrusion detection, threat protection and response, malware and forensics, and deployment scenarios.

Secure Mobile Ad-hoc Networks and Sensors - First International Workshop, MADNES 2005, Singapore, September 20-22, 2005,... Secure Mobile Ad-hoc Networks and Sensors - First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers (Paperback, 2006 ed.)
Mike Burmester, Alec Yasinsac
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005, held in Singapore, in September 2005. The book presents 12 revised full papers together with 5 keynote papers and 1 invited paper. These address current topics of all security aspects of constrained network environments with special focus to mobile agents, sensor networks and radio frequency devices.

Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Freiburg, Germany, June 6-9,... Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings (Paperback, 2006 ed.)
Gunter Muller
R1,632 Discovery Miles 16 320 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006. The book presents 36 revised full papers, organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.

Digital Rights Management - Technologies, Issues, Challenges and Systems (Paperback, 2006 ed.): Reihaneh Safavi-Naini, Moti Yung Digital Rights Management - Technologies, Issues, Challenges and Systems (Paperback, 2006 ed.)
Reihaneh Safavi-Naini, Moti Yung
R1,535 Discovery Miles 15 350 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems, DRMTICS 2005, held in Sydney, Australia, in October/November 2005. Presents 26 carefully reviewed full papers organized in topical sections on assurance and authentication issues, legal and related issues, expressing rights and management, watermarking, software issues, fingerprinting and image authentication, supporting cryptographic technology, P2P issues, implementations and architectures.

Selected Areas in Cryptography - 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected... Selected Areas in Cryptography - 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers (Paperback, 2007 ed.)
Eli Biham, Amr M. Youssef
R1,555 Discovery Miles 15 550 Ships in 18 - 22 working days

This volume constitutes the refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography. Twenty-five full papers are presented along with two important invited talks. The papers are organized into topical sections covering block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.

Information Security and Privacy - 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings... Information Security and Privacy - 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (Paperback, 2006 ed.)
Lynn Batten, Reihaneh Safavi-Naini
R1,584 Discovery Miles 15 840 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical sections on stream ciphers, symmetric key ciphers, network security, cryptographic applications, secure implementation, signatures, theory, security applications, provable security, protocols, as well as hashing and message authentication.

Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San... Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. (Paperback, 2006 ed.)
Sharad Mehrotra, Daniel D. Zeng, Hsinchun Chen
R3,011 Discovery Miles 30 110 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006. Gathers 39 revised full papers, 30 revised short papers, and 56 extended poster abstracts, organized in topical sections including intelligence analysis and knowledge discovery; access control, privacy, and cyber trust; surveillance and emergency response; infrastructure protection and cyber security; terrorism informatics and countermeasures; surveillance, bioterrorism, and emergency response.

Foundations of Security Analysis and Design - FOSAD 2006/2007 Turtorial Lectures (Paperback, 2007 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design - FOSAD 2006/2007 Turtorial Lectures (Paperback, 2007 ed.)
Alessandro Aldini, Roberto Gorrieri
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

overviewofthebestindustrialpracticesinITsecurityanalysis.Inparticular, the paperpresentsrecentresearchresultsinthe areaofformalfoundations andpow- erfultoolsforsecurityanalysis.ThecontributionbyUlfarErlingssonoutlinesthe general issues of low-level software security. Concrete details of low-level attacks anddefensesaregiveninthe caseof CandC++softwarecompiledinto machine code. Fabio Martinelli and Paolo Mori describe a solution to improve the Java native security support. Two examples of the application of the proposed so- tion, with history-based monitoring of the application behavior, are given in the case of grid computing and mobile devices. The purpose of the chapter by Javier Lopez, Cristina Alcaraz, and Rodrigo Roman is to review and discuss critical information infrastructures, and show how to protect their functionalities and performance against attacks. As an example, the chapter also discusses the role of wireless sensor networks technology in the protection of these infrastructures. The paper by Liqun Chen is a survey in the area of asymmetric key cryp- graphic methodologies for identity-based cryptography. Audun Josang gives an overviewofthebackground, currentstatus, andfuturetrendoftrustandrepu- tionsystems.Inthefollowingchapter, MarcinCzenko, SandroEtalle, DongyiLi, and William H. Winsborough present the trust management approach to access controlindistributed systems.Inparticular, they focus onthe RT family ofro- based trust management languages. Chris Mitchell and Eimear Gallery report on the trusted computing technology for the next-generation mobile device

Security and Privacy in Ad-hoc and Sensor Networks - 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007,... Security and Privacy in Ad-hoc and Sensor Networks - 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings (Paperback, 2007 ed.)
Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2007, held in Cambridge, UK, in July 2007.

The 17 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers present original research on all aspects of security and privacy in wireless ad hoc and sensor networks and addressing current topics of network security, cryptography, and wireless networking communities. The papers are organized in topical sections on device pairing, key management, location verification and location privacy, secure routing and forwarding, physical security, as well as detection of compromise, and revocation.

Smart Card Research and Advanced Applications - 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain,... Smart Card Research and Advanced Applications - 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings (Paperback, New edition)
Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling
R1,535 Discovery Miles 15 350 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the 7th International Conference on Smart Card Research and Advanced Applications, CARDIS 2006, held in Tarragona, Spain, in April 2006. The 25 revised full papers presented were carefully reviewed and updated for inclusion in this book. The papers are organized in topical sections on smart card applications, side channel attacks, smart card networking, cryptographic protocols, RFID security, and formal methods.

Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings (Paperback, 2007 ed.)
Moni Naor
R1,662 Discovery Miles 16 620 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2007, held in Barcelona, Spain in May 2007.

The 33 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, New York,... Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings (Paperback, 2006 ed.)
Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin
R1,637 Discovery Miles 16 370 Ships in 18 - 22 working days

Here are the refereed proceedings of the 9th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2006, held in New York City in April 2006. The 34 revised full papers presented are organized in topical sections on cryptanalysis and protocol weaknesses, distributed crypto-computing, encryption methods, cryptographic hash and applications, number theory algorithms, pairing-based cryptography, cryptosystems design and analysis, signature and identification, authentication and key establishment, multi-party computation, and PKI techniques.

Security Protocols - 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers (Paperback, 2006... Security Protocols - 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers (Paperback, 2006 ed.)
Bruce Christianson, Bruno Crispo, James A Malcolm, Michael Roe
R1,519 Discovery Miles 15 190 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Security Protocols, April 2004. The book presents 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations. Among the topics addressed are authentication, anonymity, verification of cryptographic protocols, mobile ad-hoc network security, denial of service, SPKI, access control, timing attacks, API security, biometrics for security, and others.

Data and Applications Security XXI - 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo... Data and Applications Security XXI - 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings (Paperback, 2007 ed.)
Steve Barker, Gail-Joon Ahn
R1,410 Discovery Miles 14 100 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 21st Annual Working Conference on Data and Applications Security held in Redondo Beach, CA, USA in July 2007.

The 18 revised full papers and 2 revised short papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based security, temporal access control and usage control, as well as system security issues.

Il Futuro Dell'information & Communication Technology - Tecnologie, Timori E Scenari Futuri Della Global Network... Il Futuro Dell'information & Communication Technology - Tecnologie, Timori E Scenari Futuri Della Global Network Revolution (Italian, Hardcover, 2009 ed.)
Antonio Teti
R425 Discovery Miles 4 250 Ships in 10 - 15 working days

Negli ultimi decenni il rapido sviluppo delle tecnologie IT ha influito in maniera determinante nella vita dell'uomo, trasformando, spesso inconsapevolmente il suo lavoro, le sue abitudini, il suo modo di interagire con il mondo che lo circonda. Il fenomeno della "globalizzazione" dei mercati e solo una delle trasformazioni che l'intero pianeta sta attraversando. Anche se i vantaggi derivanti dall'utilizzo delle moderne tecnologie di comunicazione ci facilitano nel lavoro e nella attivita ludiche e personali, molte sono le perplessita e i dubbi che attanagliano tutti coloro che le utilizzano. Se l'Information Technology rappresenta il "combustibile" indispensabile per la sopravvivenza delle aziende e delle attivita dell'uomo, nel contempo puo generare problematicita di grande rilievo. Il testo tratta alcune delle problematiche che destano preoccupazioni rilevanti nel mondo intero come il consumo energetico dei sistemi informatici (incontrollabili e inquinanti), il problema della garanzia della privacy e dell'integrita dei dati su Internet, l'utilizzo della rete Internet come strumento di controllo delle masse, la possibile sparizione degli attuali sistemi operativi che potranno essere sostituiti dal sistema operativo Web Operating System."

Privacy Enhancing Technologies - 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers... Privacy Enhancing Technologies - 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers (Paperback, 2006 ed.)
George Danezis, Philippe Golle
R1,575 Discovery Miles 15 750 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cambridge, UK, in June 2006 co-located with WEIS 2006, the Workshop on the Economics of Information Security, and WOTE 2006, the IAVoSS Workshop On Trustworthy Elections. The 24 revised full papers present novel research on all theoretical and practical aspects of privacy technologies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Tango With Death - Tolletjie Botha And…
Giancarlo Coccia Paperback R339 Discovery Miles 3 390
Shine A Light - In Conversation With…
Corrine Wilson Paperback R336 Discovery Miles 3 360
Compiler Generators - What They Can Do…
Mads Tofte Hardcover R2,784 Discovery Miles 27 840
The GNU C Library Reference Manual…
Sandra Loosemore, Richard M. Stallman, … Hardcover R1,688 Discovery Miles 16 880
Negation and Control in Prolog
Lee Naish Paperback R1,408 Discovery Miles 14 080
Python Crash Course - The Perfect…
Aiden Phillips Hardcover R1,147 R975 Discovery Miles 9 750
Power In Action - Democracy, Citizenship…
Steven Friedman Paperback R388 Discovery Miles 3 880
SSA-based Compiler Design
Fabrice Rastello, Florent Bouchez Tichadou Hardcover R3,039 Discovery Miles 30 390
Accelerator Programming Using Directives…
Sunita Chandrasekaran, Guido Juckeland Paperback R1,521 Discovery Miles 15 210
Python Programming - The Easiest Python…
Alan Grid Hardcover R707 Discovery Miles 7 070

 

Partners