0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (85)
  • R500+ (1,288)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Information Security and Privacy - Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997... Information Security and Privacy - Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings (Paperback, 1997 ed.)
Vijav Varadharajan, Josef Pieprzyk, Yi Mu
R1,525 Discovery Miles 15 250 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.

Fast Software Encryption - 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998, Proceedings (Paperback,... Fast Software Encryption - 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998, Proceedings (Paperback, 1998 ed.)
Serge Vaudenay
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days

Fast Software Encryption (FSE) is an annual research workshop devoted to the promotion of research on classical encryption algorithms and related cryp- graphic primitives such as hash functions. When public key cryptography started to receive wide attention in the 1980s, the much older and more basic art of secret key cryptography was sidelined at many research conferences. This motivated Ross Anderson to organise the rst FSE in Cambridge, England in December 1993; subsequent workshops followed at Leuven, Belgium (December 1994), Cambridge again (February 1996), and Haifa, Israel (January 1997). These proceedings contain the papers due to be presented at the fth FSE workshop in March 1998 at the Hotel du Louvre in Paris. This event is organized by the Ecole Normale Superieure and the Centre National pour la Recherche S- enti que (CNRS) in cooperation with the International Association for Cryp- logic Research (IACR), and has attracted the kind support of Gemplus and Microsoft, the world leaders in smart cards and software { two domains very closely connected to our research concerns.

Security Protocols - 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings (Paperback, 1998 ed.): Bruce... Security Protocols - 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings (Paperback, 1998 ed.)
Bruce Christianson, Bruno Crispo, Mark Lomas, Michael Roe
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

This book constitutes the strictly refereed post-workshop proceedings of the 5th International Workshop on Security Protocols, held in Paris, France, in April 1997. The 17 revised full papers presented address all current aspects of security protocols. Among the topics covered are secure distribution of knowledge, electronic voting systems, secure Internet transactions, digital signatures, key exchange, cryprographic protocols, authentication, threshold systems, secret sharing, ect.

Advances in Cryptology - EUROCRYPT '97 - International Conference on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '97 - International Conference on the Theory and Application of Cryptographic Techniques Konstanz, Germany, May 11-15, 1997 Proceedings (Paperback, 1997 ed.)
Walter Fumy
R1,469 Discovery Miles 14 690 Ships in 18 - 22 working days

EUROCRYEVr '97, the 15th annual EUROCRYPT conference on the theory and application of cryptographic techniques, was organized and sponsored by the International Association for Cryptologic Research (IACR). The IACR organizes two series of international conferences each year, the EUROCRYPT meeting in Europe and CRWTO in the United States. The history of EUROCRYFT started 15 years ago in Germany with the Burg Feuerstein Workshop (see Springer LNCS 149 for the proceedings). It was due to Thomas Beth's initiative and hard work that the 76 participants from 14 countries gathered in Burg Feuerstein for the first open meeting in Europe devoted to modem cryptography. I am proud to have been one of the participants and still fondly remember my first encounters with some of the celebrities in cryptography. Since those early days the conference has been held in a different location in Europe each year (Udine, Paris, Linz, Linkoping, Amsterdam, Davos, Houthalen, Aarhus, Brighton, Balantonfiired, Lofthus, Perugia, Saint-Malo, Saragossa) and it has enjoyed a steady growth, Since the second conference (Udine, 1983) the IACR has been involved, since the Paris meeting in 1984, the name EUROCRYPT has been used. For its 15th anniversary, EUROCRYPT finally returned to Germany. The scientific program for EUROCRYPT '97 was put together by a 18-member program committee whch considered 104 high-quality submissions. These proceedings contain the revised versions of the 34 papers that were accepted for presentation. In addition, there were two invited talks by Ernst Bovelander and by Gerhard Frey.

Cryptography and Coding - 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings (Paperback, 1997... Cryptography and Coding - 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings (Paperback, 1997 ed.)
Michael Darnell
R1,431 Discovery Miles 14 310 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Cryptography and Coding held at the Institute of Mathematics and its Applications (IMA) in Cirencester, UK, in December 1997. The 35 revised full papers presented emphasize the links and commonality between the underlying mathematical bases and algorithmic foundations of cryptography, error control coding and digital signal processing devices available today. Besides classical crypto topics, other issues concerning information transmission and processing are addressed, such as multiple-access coding, image processing, synchronization and sequence design.

Safer Systems - Proceedings of the Fifth Safety-critical Systems Symposium, Brighton 1997 (Paperback, Softcover reprint of the... Safer Systems - Proceedings of the Fifth Safety-critical Systems Symposium, Brighton 1997 (Paperback, Softcover reprint of the original 1st ed. 1997)
Felix Redmill, Tom Anderson
R2,652 Discovery Miles 26 520 Ships in 18 - 22 working days

The contributions to this book are the invited papers presented at the fifth annual Safety-critical Systems Symposium. They cover a broad spectrum of issues affecting safety, from a philosophical appraisal to technology transfer, from requirements analysis to assessment, from formal methods to artificial intelligence and psychological aspects. They touch on a number of industry sectors, but are restricted to none, for the essence of the event is the transfer of lessons and technologies between sectors. All address practical issues and of fer useful information and advice. Contributions from industrial authors provide evidence of both safety con sciousness and safety professionalism in industry. Smith's on safety analysis in air traffic control and Rivett's on assessment in the automotive industry are informative on current practice; Frith's thoughtful paper on artificial intelli gence in safety-critical systems reflects an understanding of questions which need to be resolved; Tomlinson's, Alvery's and Canning's papers report on collaborative projects, the first on results which emphasise the importance of human factors in system development, the second on the development and trial of a comprehensive tool set, and the third on experience in achieving tech nology transfer - something which is crucial to increasing safety."

Information and Communications Security - First International Conference, ICIS'97, Beijing, China, November 11-14, 1997,... Information and Communications Security - First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, Proceedings (Paperback, 1997 ed.)
Yongfei Han, Tatsuaki Okamoto, Sihan Quing
R1,602 Discovery Miles 16 020 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997.
The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.

Information Hiding - First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings (Paperback, 1996 ed.):... Information Hiding - First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings (Paperback, 1996 ed.)
Ross Anderson
R1,534 Discovery Miles 15 340 Ships in 18 - 22 working days

This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge.
Work on information hiding has been carried out over the last few years within different research communities, mostly unaware of each other's existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.

Information Security and Privacy - First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26,... Information Security and Privacy - First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings (Paperback, 1996 ed.)
Josef Pieprzyk, Jennifer Seberry
R1,523 Discovery Miles 15 230 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996.
The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.

Safe Comp 97 - The 16th International Conference on Computer Safety, Reliability and Security (Paperback, Softcover reprint of... Safe Comp 97 - The 16th International Conference on Computer Safety, Reliability and Security (Paperback, Softcover reprint of the original 1st ed. 1997)
Peter Daniel
R2,680 Discovery Miles 26 800 Ships in 18 - 22 working days

The safe and secure operation ofcomputer systems continues to be the major issue in many applications where there is a threat to people, the environment, investment or goodwill. Such applications include medical devices, railway signalling, energy distribution, vehicle control and monitoring, air traffic control, industrial process control, telecommunications systemsand manyothers. This book represents the proceedings of the 16th International Conference on Computer Safety, Reliability and Security, held in York, UK, 7-10 September 1997. The conference reviews the state ofthe art, experience and new trends in the areas of computer safety, reliability and security. It forms a platform for technology transfer between academia, industry and research institutions. In an expanding world-wide market for safe, secure and reliable computer systems SAFECOMP 97 provides an opportunity for technical developers, users and legislators to exchange and review the experience, to consider the best technologies now available and to identify the skills and technologies required for the future. The papers were carefully selected by the Conference International Programme Committee. The authors of the papers come from twelve different countries. The subjects covered include safe software, safety cases, management & development, security, human factors, guidelines standards & certification, applications & industrial experience, formal methods & models andvalidation, verification and testing. SAFECOMP '97 continues the successful series of SAFECOMP conferences first held in 1979 in Stuttgart. SAFECOMP is organised by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Security and Reliability (EWICS TC7).

Advances in Cryptology - ASIACRYPT '96 - International Conference on the Theory and Applications of Crypotology and... Advances in Cryptology - ASIACRYPT '96 - International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Korea, November 3 - 7, 1996, Proceedings (Paperback, 1996 ed.)
Kwangjo Kim, Tsutomu Matsumoto
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996.
The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean functions, electronic cash, special signatures, stream ciphers, and hard problems.

Safety and Reliability of Software Based Systems - Twelfth Annual CSR Workshop (Bruges, 12-15 September 1995) (Paperback,... Safety and Reliability of Software Based Systems - Twelfth Annual CSR Workshop (Bruges, 12-15 September 1995) (Paperback, Softcover reprint of the original 1st ed. 1997)
Roger Shaw
R2,706 Discovery Miles 27 060 Ships in 18 - 22 working days

Safety and Reliability of Software Based Systems contains papers, presented at the twelfth annual workshop organised by the Centre for Software Reliability. Contributions come from different industries in many countries, and provide discussion and cross-fertilisation of ideas relevant to systems whose safety and/or reliability are of paramount concern.
This book discusses safety cases and their varying roles in different industries; using measurement to improve reliability and safety of software-based systems; latest developments in managing, developing and assessing software intensive systems where reliability and/or safety are important considerations; and practical experiences of others in industry.

Computer Security - ESORICS 96 - 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996,... Computer Security - ESORICS 96 - 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings (Paperback, 1996 ed.)
Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo
R1,543 Discovery Miles 15 430 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.

Advances in Cryptology - CRYPTO '96 - 16th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '96 - 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings (Paperback, 1996 ed.)
Neal Koblitz
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

Crypto '96, the Sixteenth Annual Crypto Conference, is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and P- vacy and the Computer Science Department of the University of California at Santa Barbara (UCSB). It takes place at UCSB from August 18 to 22, 1996. The General Chair, Richard Graveman, is responsible for local organization and registration. The scientific program was organized by the 16-member Program C- mittee. We considered 115 papers. (An additional 15 submissions had to be summarily rejected because of lateness or major noncompliance with the c- ditions in the Call for Papers.) Of these, 30 were accepted for presentation. In addition, there will be five invited talks by Ernest Brickell. Andrew Clark, Whitfield Diffie, Ronald Rivest, and Cliff Stoll. A Rump Session will be chaired by Stuart Haber. These proceedings contain the revised versions of the 30 contributed talks. least three com- The submitted version of each paper was examined by at mittee members and/or outside experts, and their comments were taken into account in the revisions. However, the authors (and not the committee) bear full responsibility for the content of their papers.

Human Machine Symbiosis - The Foundations of Human-centred Systems Design (Paperback, Softcover reprint of the original 1st ed.... Human Machine Symbiosis - The Foundations of Human-centred Systems Design (Paperback, Softcover reprint of the original 1st ed. 1996)
Karamjit S. Gill
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

There is now a serious discussion taking place about the moment at which human beings will be surpassed and replaced by the machine. On the one hand we are designing machines which embed more and more human intelligence, but at the same time we are in danger of becoming more and more like machines. In these circumstances, we all need to consider: * What can we do? * What should we do? * What are the alternatives of doing it? This book is about the human-centred alternative of designing systems and technologies. This alternative is rooted in the European tradition of human-centredness which emphasises the symbiosis of human capabilities and machine capacity. The human-centred tra dition celebrates the diversity of human skill and ingenuity and provides an alternative to the 'mechanistic' paradigm of 'one best way', the 'sameness of science' and the 'dream of the exact language'. This alternative vision has its origin in the founding European human-centred movements of the 1970s. These include the British movement of Socially Useful Technology, the Scandinavian move ment of Democratic Participation, and the German movement of Humanisation of Work and Technology. The present volume brings together various strands of human-centred systems philosophy which span the conceptual richness and cultural diversity of the human-centred movements. The core ideas of human-centredness include human-machine symbiosis, the tacit dimension of knowl edge, the system as a tool rather than a machine, dialogue, partici pation, social shaping and usability.

Human Comfort and Security of Information Systems - Advanced Interfaces for the Information Society (Paperback, Softcover... Human Comfort and Security of Information Systems - Advanced Interfaces for the Information Society (Paperback, Softcover reprint of the original 1st ed. 1997)
Kadamula Varghese, Silvia Pfleger
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

The Commission of the European Union, through its Fourth Framework R&D programme is committed to the development of the Information Society. There is no doubt that there will be many radical changes in all aspects of society caused by the far-reaching impact of continuing advances in information and communi cation technologies. Many of these changes cannot be predicted, but that uncer tainty must not stop us from moving forward. The challenge is to ensure that these technologies are put to use in the most beneficial manner, taking fully into account the rich cultural and linguistic backgrounds within the peoples of Europe. We have a duty to ensure that the ultimate end-users of the technology are involved in the development and application of that technology to help shape its use. Without this active involvement, designers will not understand the individual and organisational requirements of the users, and the users will not understand the impact and applicability of the new technology. Failure on either account will lead to a sense of resentment on the part of the users and a lost opportunity to improve the quality of human life. The work, sponsored by the Human Comfort & Security sub-domain of the ESPRIT programme, has a central part to play in the creation of the Information Society, lying as it does at the interface between the technology and the user."

Digital Signature Schemes - General Framework and Fail-Stop Signatures (Paperback, 1996 ed.): Birgit Pfitzmann Digital Signature Schemes - General Framework and Fail-Stop Signatures (Paperback, 1996 ed.)
Birgit Pfitzmann
R1,559 Discovery Miles 15 590 Ships in 18 - 22 working days

This book, based on the author's Ph.D. thesis, was selected during the 1995 GI Doctoral Dissertation Competition as the winning thesis in the foundations-of-informatics track.
Securing integrity for digital communications in the age of global electronic information exchange and electronic commerce is vital to democratic societies and a central technical challenge for cryptologists. As core contribution to advancing the state of the art, the author develops the new class of digital fail-stop signatures. This monograph is self-contained regarding the historical background and cryptographic primitives used. For the first time, a general and sophisticated framework is introduced in which innovative fail-stop signatures are systematically presented and evaluated, from theoretical foundations to engineering aspects.

Cryptography and Coding - Fifth IMA Conference; Cirencester, UK, December 1995. Proceedings (Paperback, 1995 ed.): Colin Boyd Cryptography and Coding - Fifth IMA Conference; Cirencester, UK, December 1995. Proceedings (Paperback, 1995 ed.)
Colin Boyd
R1,499 Discovery Miles 14 990 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th IMA Conference on Cryptography and Coding, held in Cirencester, UK in December 1995.
The volume presents 22 full revised papers selected from 48 submissions together with five invited full papers and three abstracts on the mathematical theory and practice of cryptography and coding; continuing advances in these strongly related areas are crucial for the security and reliability of data communication, processing, and storage. Among the topics addressed are linear codes, error-correcting codes, decoding, key distribution, authentication, hash functions, block ciphers, cryptanalysis, and electronic cash.

Executive Guide to Preventing Information Technology Disasters (Paperback, Edition. ed.): Richard Ennals Executive Guide to Preventing Information Technology Disasters (Paperback, Edition. ed.)
Richard Ennals
R1,383 Discovery Miles 13 830 Ships in 18 - 22 working days

Recent and well-publicised disasters have highlighted the fact that organisations of all kinds - from healthcare to aerospace - are critically dependent on Information Technology systems. The prevention of catastrophic I.T. failure is now an essential part of management.
In this thought-provoking guide for executives and managers Richard Ennals argues that the critical factor is not technology, but people and communication.

Security Protocols - International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings (Paperback, 1997 ed.): Mark... Security Protocols - International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings (Paperback, 1997 ed.)
Mark Lomas
R1,452 Discovery Miles 14 520 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Workshop on Security Protocols held in Cambridge, UK, in April 1996, in the context of the special program on computer security, cryptology, and coding theory at the Isaac Newton Institute.
The 17 revised full papers and one abstract included in the book were carefully selected. Among the topics addressed are several types of public key cryptosystems, digital cash, electronic commerce, digital signatures, and visual cryptography. Besides original theoretical results, the collection of papers show a strong applications-oriented component.

Advances in Cryptology - EUROCRYPT '94 - Workshop on the Theory and Application of Cryptographic Techniques, Perugia,... Advances in Cryptology - EUROCRYPT '94 - Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9 - 12, 1994. Proceedings (Paperback, 1995 ed.)
Alfredo De Santis
R1,604 Discovery Miles 16 040 Ships in 18 - 22 working days

This book constitutes the proceedings of the 1994 Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT '94, held in Perugia, Italy in May 1994.
The 36 revised full papers presented in the book are selected from 137 submissions and address all current research and advanced applicational aspects of cryptography; in addition, there are 11 short papers originating from the best special presentations accepted for the traditional rump session. The papers are organized in sections on secret sharing, hash functions, signatures, cryptosystems, pseudorandom generators, authentication codes, key agreement and key distribution, protocols, cryptanalysis and block ciphers, and number theory and algorithms.

Concurrency and Parallelism, Programming, Networking, and Security - Second Asian Computing Science Conference, ASIAN '96,... Concurrency and Parallelism, Programming, Networking, and Security - Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2 - 5, 1996, Proceedings (Paperback, 1996 ed.)
Joxan Jaffar, Roland H.C. Yap
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second Asian Conference on Computing Science, ASIAN'96, held in Singapore in December 1996.
The volume presents 31 revised full papers selected from a total of 169 submissions; also included are three invited papers and 14 posters. The papers are organized in topical sections on algorithms, constraints and logic programming, distributed systems, formal systems, networking and security, programming and systems, and specification and verification.

Guide to Computer Viruses - How to avoid them, how to get rid of them, and how to get help (Mixed media product, 2nd ed. 1996):... Guide to Computer Viruses - How to avoid them, how to get rid of them, and how to get help (Mixed media product, 2nd ed. 1996)
Robert Slade
R2,460 Discovery Miles 24 600 Ships in 18 - 22 working days

This book gives a thorough explanation of what computer viruses are, how they work, and how much computer users should worry about them. It is written to apply to all systems: micro, network, and mainframe and for both professional managers of computing systems and users of personal computers of all types, PCs, Macintoshes, and others. Robert Slade presents details of many of the most virulent of the known viruses and of the damage that they have done, as well as providing quidelines and recommendations to protect systems from infection. In addition, the book provides the widest possible range of reviews of the major anti-virus software packages available as well as many of the books on viruses. Contact addresses, telephone numbers, and electronic mail addresses are also given. In the event of a suspected virus infection, this book is the one that users will reach for! Included with the book is a diskette containing both four antiviral pieces of software for the PC and Macintosh and the complete virus catalog as produced by the Virus Test Centre at the University of Hamburg.

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes - 11th International Symposium, AAECC-11, Paris, France, July... Applied Algebra, Algebraic Algorithms and Error-Correcting Codes - 11th International Symposium, AAECC-11, Paris, France, July 17-22, 1995. Proceedings (Paperback, 1995 ed.)
Gerard Cohen, Marc Giusti, Teo Mora
R1,608 Discovery Miles 16 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the 11th International Conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-11, held in Paris, France in July 1995.
The volume presents five invited papers and 32 full revised research papers selected from a total of 68 submissions; it is focussed on research directed to the exploitation of algebraic techniques and methodologies for the application in coding and computer algebra. Among the topics covered are coding, cryptoloy, communication, factorization of polynomials, Gr bner bases, computer algebra, algebraic algorithms, symbolic computation, algebraic manipulation.

Advances in Cryptology - CRYPTO '95 - 15th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '95 - 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995. Proceedings (Paperback, 1995 ed.)
Don Coppersmith
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

The Crypto '95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciety Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. It took place at the University of California, Santa Barbara, from August 27-31, 1995. This was the fifteenth annual Crypto conference; all have been held at UCSB. For the second time, proceedings were available at the conference. The General Chair, Stafford Tavares, was responsible for local organization and registration. The Program Committee considered 151 papers and selected 36 for pres- tation. There were also two invited talks. Robert Morris, Sr. gave a talk on "Ways of Losing Information," which included some non-cryptographic means of leaking secrets that are often overlooked by cryptographers. The second talk, "Cryptography - Myths and Realities," was given by Adi Shamir, this year's IACR Distinguished Lecturer. Shamir is the second person to receive this honor, the first having been Gus Simmons at Crypto '94. These proceedings contain revised versions of the 36 contributed talks. Each paper was sent to at least three members of the program committee for c- ments. Revisions were not checked on their scientific aspects. Some authors will write final versions of their papers for publication in refereed journals. Of course, the authors bear full responsibility for the contents of their papers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Data Hiding Fundamentals and…
Husrev T. Sencar, Mahalingam Ramkumar, … Hardcover R1,644 Discovery Miles 16 440
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Corporate Cybersecurity - Identifying…
J. Jackson Hardcover R2,573 Discovery Miles 25 730
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,170 Discovery Miles 61 700
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,170 Discovery Miles 61 700
Blockchain - An Essential Beginner's…
Herbert Jones Hardcover R656 R585 Discovery Miles 5 850
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,228 Discovery Miles 12 280
Cryptographic Solutions for Secure…
Kannan Balasubramanian, K. Mala, … Hardcover R5,077 Discovery Miles 50 770
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030

 

Partners