0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (88)
  • R500+ (1,342)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers... Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers (Paperback, 2007 ed.)
Jan Camenisch, Christian Collberg, Neil F. Johnson, Phil Sallee
R1,565 Discovery Miles 15 650 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Information Hiding, IH 2006, held in Alexandria, VA, USA in July 2006.

The 25 revised full papers presented were carefully selected from over 70 papers submitted. The papers are organized in topical sections on watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.

Critical Information Infrastructures Security - First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 -... Critical Information Infrastructures Security - First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006 (Paperback, 2006 ed.)
Javier Lopez
R1,617 Discovery Miles 16 170 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Critical Information Infrastructures Security, CRITIS 2006, held on Samos Island, Greece in August/September 2006 in conjunction with ISC 2006, the 9th International Information Security Conference. The papers address all security-related heterogeneous aspects of critical information infrastructures.

Information Systems Security - Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings... Information Systems Security - Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings (Paperback, 2006 ed.)
Aditya Bagchi, Vijayalakshmi Atluri
R1,678 Discovery Miles 16 780 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security.

Progress in Cryptology - INDOCRYPT 2006 - 7th International Conference on Cryptology in India, Kolkata, India, December 11-13,... Progress in Cryptology - INDOCRYPT 2006 - 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings (Paperback, 2006 ed.)
Rana Barua, Tanja Lange
R1,572 Discovery Miles 15 720 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006.

The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 186 submissions. The papers are organized in topical sections on symmetric cryptography: attacks, hash functions, provable security: key agreement, provable security: public key cryptograpy, symmetric cryptography: design, modes of operation and message authentication codes, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.

Communications and Multimedia Security - 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece,... Communications and Multimedia Security - 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings (Paperback, 2006 ed.)
Herbert Leitold, Evangelos Markatos
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2006, held in Heraklion, Crete, Greece in October 2006.

The 22 revised full papers presented were carefully reviewed and selected from 76 submissions.

Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October... Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings (Paperback, 2006 ed.)
Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama
R1,568 Discovery Miles 15 680 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Workshop on Security, IWSEC 2006, held in Kyoto, Japan in October 2006. The 30 revised full papers presented were carefully reviewed and selected from 147 submissions.

Information Security and Cryptology - ICISC 2006 - 9th International Conference, Busan, Korea, November 30 - December 1, 2006,... Information Security and Cryptology - ICISC 2006 - 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings (Paperback, 2006 ed.)
Min Surp Rhee, Byoungcheon Lee
R1,545 Discovery Miles 15 450 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ICISC 2006, held in Busan, Korea in November/December 2006.

The 26 revised full papers presented together with two invited talks have gone through two rounds of reviewing and improvement and were selected from 129 submissions. The papers are organized in topical sections on hash functions, block and stream ciphers, efficient implementation and hardware, network security and access control, mobile communications security, forensics, copyright protection, biometrics, public key cryptosystems, and digital signatures.

Fault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006,... Fault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings (Paperback, 2006 ed.)
Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert
R1,601 Discovery Miles 16 010 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006, held in Yokohama, Japan in October 2006.

The 12 revised papers of FDTC 2006 are presented together with nine papers from FDTC 2004 and FDTC 2005 that passed a second round of reviewing. They all provide a comprehensive introduction to the issues faced by designers of robust cryptographic devices.

Il Futuro Dell'information & Communication Technology - Tecnologie, Timori E Scenari Futuri Della Global Network... Il Futuro Dell'information & Communication Technology - Tecnologie, Timori E Scenari Futuri Della Global Network Revolution (Italian, Hardcover, 2009 ed.)
Antonio Teti
R452 Discovery Miles 4 520 Ships in 12 - 19 working days

Negli ultimi decenni il rapido sviluppo delle tecnologie IT ha influito in maniera determinante nella vita dell'uomo, trasformando, spesso inconsapevolmente il suo lavoro, le sue abitudini, il suo modo di interagire con il mondo che lo circonda. Il fenomeno della "globalizzazione" dei mercati e solo una delle trasformazioni che l'intero pianeta sta attraversando. Anche se i vantaggi derivanti dall'utilizzo delle moderne tecnologie di comunicazione ci facilitano nel lavoro e nella attivita ludiche e personali, molte sono le perplessita e i dubbi che attanagliano tutti coloro che le utilizzano. Se l'Information Technology rappresenta il "combustibile" indispensabile per la sopravvivenza delle aziende e delle attivita dell'uomo, nel contempo puo generare problematicita di grande rilievo. Il testo tratta alcune delle problematiche che destano preoccupazioni rilevanti nel mondo intero come il consumo energetico dei sistemi informatici (incontrollabili e inquinanti), il problema della garanzia della privacy e dell'integrita dei dati su Internet, l'utilizzo della rete Internet come strumento di controllo delle masse, la possibile sparizione degli attuali sistemi operativi che potranno essere sostituiti dal sistema operativo Web Operating System."

Security and Cryptography for Networks - 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006,... Security and Cryptography for Networks - 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings (Paperback, 2006 ed.)
Roberto De Prisco, Moti Yung
R1,666 Discovery Miles 16 660 Ships in 10 - 15 working days

Here are the refereed proceedings of the 5th International Conference on Security and Cryptology for Networks, SCN 2006. The book offers 24 revised full papers presented together with the abstract of an invited talk. The papers are organized in topical sections on distributed systems security, signature schemes variants, block cipher analysis, anonymity and e-commerce, public key encryption and key exchange, secret sharing, symmetric key cryptanalisis and randomness, applied authentication, and more.

Cryptographic Hardware and Embedded Systems - CHES 2006 - 8th International Workshop, Yokohama, Japan, October 10-13, 2006,... Cryptographic Hardware and Embedded Systems - CHES 2006 - 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings (Paperback, 2006 ed.)
Louis Goubin, Mitsuru Matsui
R1,580 Discovery Miles 15 800 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2006, held in Yokohama, Japan in October 2006.

The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on side channels, low resources, hardware attacks and countermeasures, special purpose hardware, efficient algorithms for embedded processors, side channels, hardware attacks and countermeasures, efficient hardware, trusted computing, side channels, hardware attacks and countermeasures, as well as efficient hardware.

Information Security - 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings... Information Security - 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings (Paperback, 2006 ed.)
Sokratis K. Katsikas, Michael Backes, Stefanos Gritzalis, Bart Preneel
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006.

The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on software security, privacy and anonymity, block ciphers and hash functions, digital signatures, stream ciphers, encryption, pervasive computing, network security, watermarking and digital rights management, intrusion detection and worms, key exchange, security protocols and formal methods, and information systems security.

Security and Privacy in Ad-hoc and Sensor Networks - 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007,... Security and Privacy in Ad-hoc and Sensor Networks - 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings (Paperback, 2007 ed.)
Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2007, held in Cambridge, UK, in July 2007.

The 17 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers present original research on all aspects of security and privacy in wireless ad hoc and sensor networks and addressing current topics of network security, cryptography, and wireless networking communities. The papers are organized in topical sections on device pairing, key management, location verification and location privacy, secure routing and forwarding, physical security, as well as detection of compromise, and revocation.

The Mathematics of Secrets - Cryptography from Caesar Ciphers to Digital Encryption (Paperback): Joshua Holden The Mathematics of Secrets - Cryptography from Caesar Ciphers to Digital Encryption (Paperback)
Joshua Holden
R540 R486 Discovery Miles 4 860 Save R54 (10%) Ships in 12 - 19 working days

Explaining the mathematics of cryptography The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages. A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html.

Secure Mobile Ad-hoc Networks and Sensors - First International Workshop, MADNES 2005, Singapore, September 20-22, 2005,... Secure Mobile Ad-hoc Networks and Sensors - First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers (Paperback, 2006 ed.)
Mike Burmester, Alec Yasinsac
R1,562 Discovery Miles 15 620 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005, held in Singapore, in September 2005. The book presents 12 revised full papers together with 5 keynote papers and 1 invited paper. These address current topics of all security aspects of constrained network environments with special focus to mobile agents, sensor networks and radio frequency devices.

Digital Rights Management - Technologies, Issues, Challenges and Systems (Paperback, 2006 ed.): Reihaneh Safavi-Naini, Moti Yung Digital Rights Management - Technologies, Issues, Challenges and Systems (Paperback, 2006 ed.)
Reihaneh Safavi-Naini, Moti Yung
R1,660 Discovery Miles 16 600 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems, DRMTICS 2005, held in Sydney, Australia, in October/November 2005. Presents 26 carefully reviewed full papers organized in topical sections on assurance and authentication issues, legal and related issues, expressing rights and management, watermarking, software issues, fingerprinting and image authentication, supporting cryptographic technology, P2P issues, implementations and architectures.

Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Freiburg, Germany, June 6-9,... Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings (Paperback, 2006 ed.)
Gunter Muller
R1,764 Discovery Miles 17 640 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006. The book presents 36 revised full papers, organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.

Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San... Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. (Paperback, 2006 ed.)
Sharad Mehrotra, Daniel D. Zeng, Hsinchun Chen
R3,262 Discovery Miles 32 620 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006. Gathers 39 revised full papers, 30 revised short papers, and 56 extended poster abstracts, organized in topical sections including intelligence analysis and knowledge discovery; access control, privacy, and cyber trust; surveillance and emergency response; infrastructure protection and cyber security; terrorism informatics and countermeasures; surveillance, bioterrorism, and emergency response.

Security in Pervasive Computing - Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings... Security in Pervasive Computing - Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings (Paperback, 2006 ed.)
John A Clark, Richard F. Paige, Fiona A.C. Polack, Phillip J. Brooke
R1,593 Discovery Miles 15 930 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Security in Pervasive Computing, SPC 2006, held in York, UK, in April 2006. The 16 revised papers presented together with the extended abstract of 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on protocols, mechanisms, integrity, privacy and security, information flow and access control, and authentication.

Foundations of Security - What Every Programmer Needs to Know (Paperback, 1st ed.): Christoph Kern, Anita Kesavan, Neil Daswani Foundations of Security - What Every Programmer Needs to Know (Paperback, 1st ed.)
Christoph Kern, Anita Kesavan, Neil Daswani
R1,872 R1,515 Discovery Miles 15 150 Save R357 (19%) Ships in 10 - 15 working days

Software developers need to worry about security as never before. They need clear guidance on safe coding practices, and that's exactly what this book delivers. The book does not delve deep into theory, or rant about the politics of security. Instead, it clearly and simply lays out the most common threats that programmers need to defend against. It then shows programmers how to make their defense. The book takes a broad focus, ranging over SQL injection, worms and buffer overflows, password security, and more. It sets programmers on the path towards successfully defending against the entire gamut of security threats that they might face.

Transactions on Data Hiding and Multimedia Security I (Paperback, 2006 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security I (Paperback, 2006 ed.)
Yun Q. Shi
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field in multimedia security. Two related disciplines, steganalysis and data forensics, are also increasingly attracting researchers and forming another new research field in multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper deals with evaluation criteria for the performance of audio watermarking algorithms. The second provides a survey of problems related to watermark security. The third discusses practical implementations of zero-knowledge watermark detectors and proposes efficient solutions for correlation-based detectors. The fourth introduces the concept of Personal Entertainment Domains (PED) in Digital Rights Management (DRM) schemes. The fifth reports on the use of fusion techniques to improve the detection accuracy of steganalysis.

Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised... Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers (Paperback, 2006 ed.)
Bart Preneel, Stafford Tavares
R1,668 Discovery Miles 16 680 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Selected Areas in Cryptography, SAC 2005, held in Canada in August 2005. The 25 revised full papers presented were carefully reviewed and selected from 96 submissions for inclusion in the book. The papers are organized in topical sections.

Theory of Cryptography - Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings... Theory of Cryptography - Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings (Paperback, 2006 ed.)
Shai Halevi, Tal Rabin
R3,164 Discovery Miles 31 640 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third Theory of Cryptography Conference, TCC 2006, held in New York, NY, USA in March 2006.

The 31 revised full papers presented were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on zero-knowledge, primitives, assumptions and models, the bounded-retrieval model, privacy, secret sharing and multi-party computation, universally-composible security, one-way functions and friends, and pseudo-random functions and encryption.

Smart Card Research and Advanced Applications - 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain,... Smart Card Research and Advanced Applications - 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings (Paperback, New edition)
Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling
R1,660 Discovery Miles 16 600 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 7th International Conference on Smart Card Research and Advanced Applications, CARDIS 2006, held in Tarragona, Spain, in April 2006. The 25 revised full papers presented were carefully reviewed and updated for inclusion in this book. The papers are organized in topical sections on smart card applications, side channel attacks, smart card networking, cryptographic protocols, RFID security, and formal methods.

Privacy Enhancing Technologies - 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers... Privacy Enhancing Technologies - 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers (Paperback, 2006 ed.)
George Danezis, Philippe Golle
R1,703 Discovery Miles 17 030 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cambridge, UK, in June 2006 co-located with WEIS 2006, the Workshop on the Economics of Information Security, and WOTE 2006, the IAVoSS Workshop On Trustworthy Elections. The 24 revised full papers present novel research on all theoretical and practical aspects of privacy technologies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
TLS Mastery
Michael W Lucas Hardcover R970 R875 Discovery Miles 8 750
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,692 Discovery Miles 66 920
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730
Quantum Computing for High School…
Yuly Billig Hardcover R848 R732 Discovery Miles 7 320
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R844 R733 Discovery Miles 7 330
Architectures and Frameworks for…
Nansi Shi Hardcover R6,609 Discovery Miles 66 090
New Research on the Voynich Manuscript…
National Security Agency Hardcover R568 Discovery Miles 5 680
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,406 R1,302 Discovery Miles 13 020

 

Partners