0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (83)
  • R500+ (1,298)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Information Hiding - First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings (Paperback, 1996 ed.):... Information Hiding - First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings (Paperback, 1996 ed.)
Ross Anderson
R1,534 Discovery Miles 15 340 Ships in 18 - 22 working days

This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge.
Work on information hiding has been carried out over the last few years within different research communities, mostly unaware of each other's existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.

Information Security and Privacy - First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26,... Information Security and Privacy - First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings (Paperback, 1996 ed.)
Josef Pieprzyk, Jennifer Seberry
R1,523 Discovery Miles 15 230 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996.
The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.

Safe Comp 97 - The 16th International Conference on Computer Safety, Reliability and Security (Paperback, Softcover reprint of... Safe Comp 97 - The 16th International Conference on Computer Safety, Reliability and Security (Paperback, Softcover reprint of the original 1st ed. 1997)
Peter Daniel
R2,680 Discovery Miles 26 800 Ships in 18 - 22 working days

The safe and secure operation ofcomputer systems continues to be the major issue in many applications where there is a threat to people, the environment, investment or goodwill. Such applications include medical devices, railway signalling, energy distribution, vehicle control and monitoring, air traffic control, industrial process control, telecommunications systemsand manyothers. This book represents the proceedings of the 16th International Conference on Computer Safety, Reliability and Security, held in York, UK, 7-10 September 1997. The conference reviews the state ofthe art, experience and new trends in the areas of computer safety, reliability and security. It forms a platform for technology transfer between academia, industry and research institutions. In an expanding world-wide market for safe, secure and reliable computer systems SAFECOMP 97 provides an opportunity for technical developers, users and legislators to exchange and review the experience, to consider the best technologies now available and to identify the skills and technologies required for the future. The papers were carefully selected by the Conference International Programme Committee. The authors of the papers come from twelve different countries. The subjects covered include safe software, safety cases, management & development, security, human factors, guidelines standards & certification, applications & industrial experience, formal methods & models andvalidation, verification and testing. SAFECOMP '97 continues the successful series of SAFECOMP conferences first held in 1979 in Stuttgart. SAFECOMP is organised by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Security and Reliability (EWICS TC7).

Advances in Cryptology - ASIACRYPT '96 - International Conference on the Theory and Applications of Crypotology and... Advances in Cryptology - ASIACRYPT '96 - International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Korea, November 3 - 7, 1996, Proceedings (Paperback, 1996 ed.)
Kwangjo Kim, Tsutomu Matsumoto
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996.
The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean functions, electronic cash, special signatures, stream ciphers, and hard problems.

Safety and Reliability of Software Based Systems - Twelfth Annual CSR Workshop (Bruges, 12-15 September 1995) (Paperback,... Safety and Reliability of Software Based Systems - Twelfth Annual CSR Workshop (Bruges, 12-15 September 1995) (Paperback, Softcover reprint of the original 1st ed. 1997)
Roger Shaw
R2,706 Discovery Miles 27 060 Ships in 18 - 22 working days

Safety and Reliability of Software Based Systems contains papers, presented at the twelfth annual workshop organised by the Centre for Software Reliability. Contributions come from different industries in many countries, and provide discussion and cross-fertilisation of ideas relevant to systems whose safety and/or reliability are of paramount concern.
This book discusses safety cases and their varying roles in different industries; using measurement to improve reliability and safety of software-based systems; latest developments in managing, developing and assessing software intensive systems where reliability and/or safety are important considerations; and practical experiences of others in industry.

Computer Security - ESORICS 96 - 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996,... Computer Security - ESORICS 96 - 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings (Paperback, 1996 ed.)
Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo
R1,543 Discovery Miles 15 430 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.

Advances in Cryptology - CRYPTO '96 - 16th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '96 - 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings (Paperback, 1996 ed.)
Neal Koblitz
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

Crypto '96, the Sixteenth Annual Crypto Conference, is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and P- vacy and the Computer Science Department of the University of California at Santa Barbara (UCSB). It takes place at UCSB from August 18 to 22, 1996. The General Chair, Richard Graveman, is responsible for local organization and registration. The scientific program was organized by the 16-member Program C- mittee. We considered 115 papers. (An additional 15 submissions had to be summarily rejected because of lateness or major noncompliance with the c- ditions in the Call for Papers.) Of these, 30 were accepted for presentation. In addition, there will be five invited talks by Ernest Brickell. Andrew Clark, Whitfield Diffie, Ronald Rivest, and Cliff Stoll. A Rump Session will be chaired by Stuart Haber. These proceedings contain the revised versions of the 30 contributed talks. least three com- The submitted version of each paper was examined by at mittee members and/or outside experts, and their comments were taken into account in the revisions. However, the authors (and not the committee) bear full responsibility for the content of their papers.

Human Machine Symbiosis - The Foundations of Human-centred Systems Design (Paperback, Softcover reprint of the original 1st ed.... Human Machine Symbiosis - The Foundations of Human-centred Systems Design (Paperback, Softcover reprint of the original 1st ed. 1996)
Karamjit S. Gill
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

There is now a serious discussion taking place about the moment at which human beings will be surpassed and replaced by the machine. On the one hand we are designing machines which embed more and more human intelligence, but at the same time we are in danger of becoming more and more like machines. In these circumstances, we all need to consider: * What can we do? * What should we do? * What are the alternatives of doing it? This book is about the human-centred alternative of designing systems and technologies. This alternative is rooted in the European tradition of human-centredness which emphasises the symbiosis of human capabilities and machine capacity. The human-centred tra dition celebrates the diversity of human skill and ingenuity and provides an alternative to the 'mechanistic' paradigm of 'one best way', the 'sameness of science' and the 'dream of the exact language'. This alternative vision has its origin in the founding European human-centred movements of the 1970s. These include the British movement of Socially Useful Technology, the Scandinavian move ment of Democratic Participation, and the German movement of Humanisation of Work and Technology. The present volume brings together various strands of human-centred systems philosophy which span the conceptual richness and cultural diversity of the human-centred movements. The core ideas of human-centredness include human-machine symbiosis, the tacit dimension of knowl edge, the system as a tool rather than a machine, dialogue, partici pation, social shaping and usability.

Guide to Computer Viruses - How to avoid them, how to get rid of them, and how to get help (Mixed media product, 2nd ed. 1996):... Guide to Computer Viruses - How to avoid them, how to get rid of them, and how to get help (Mixed media product, 2nd ed. 1996)
Robert Slade
R2,460 Discovery Miles 24 600 Ships in 18 - 22 working days

This book gives a thorough explanation of what computer viruses are, how they work, and how much computer users should worry about them. It is written to apply to all systems: micro, network, and mainframe and for both professional managers of computing systems and users of personal computers of all types, PCs, Macintoshes, and others. Robert Slade presents details of many of the most virulent of the known viruses and of the damage that they have done, as well as providing quidelines and recommendations to protect systems from infection. In addition, the book provides the widest possible range of reviews of the major anti-virus software packages available as well as many of the books on viruses. Contact addresses, telephone numbers, and electronic mail addresses are also given. In the event of a suspected virus infection, this book is the one that users will reach for! Included with the book is a diskette containing both four antiviral pieces of software for the PC and Macintosh and the complete virus catalog as produced by the Virus Test Centre at the University of Hamburg.

Concurrency and Parallelism, Programming, Networking, and Security - Second Asian Computing Science Conference, ASIAN '96,... Concurrency and Parallelism, Programming, Networking, and Security - Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2 - 5, 1996, Proceedings (Paperback, 1996 ed.)
Joxan Jaffar, Roland H.C. Yap
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second Asian Conference on Computing Science, ASIAN'96, held in Singapore in December 1996.
The volume presents 31 revised full papers selected from a total of 169 submissions; also included are three invited papers and 14 posters. The papers are organized in topical sections on algorithms, constraints and logic programming, distributed systems, formal systems, networking and security, programming and systems, and specification and verification.

Cryptography and Coding - Fifth IMA Conference; Cirencester, UK, December 1995. Proceedings (Paperback, 1995 ed.): Colin Boyd Cryptography and Coding - Fifth IMA Conference; Cirencester, UK, December 1995. Proceedings (Paperback, 1995 ed.)
Colin Boyd
R1,499 Discovery Miles 14 990 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th IMA Conference on Cryptography and Coding, held in Cirencester, UK in December 1995.
The volume presents 22 full revised papers selected from 48 submissions together with five invited full papers and three abstracts on the mathematical theory and practice of cryptography and coding; continuing advances in these strongly related areas are crucial for the security and reliability of data communication, processing, and storage. Among the topics addressed are linear codes, error-correcting codes, decoding, key distribution, authentication, hash functions, block ciphers, cryptanalysis, and electronic cash.

Digital Signature Schemes - General Framework and Fail-Stop Signatures (Paperback, 1996 ed.): Birgit Pfitzmann Digital Signature Schemes - General Framework and Fail-Stop Signatures (Paperback, 1996 ed.)
Birgit Pfitzmann
R1,559 Discovery Miles 15 590 Ships in 18 - 22 working days

This book, based on the author's Ph.D. thesis, was selected during the 1995 GI Doctoral Dissertation Competition as the winning thesis in the foundations-of-informatics track.
Securing integrity for digital communications in the age of global electronic information exchange and electronic commerce is vital to democratic societies and a central technical challenge for cryptologists. As core contribution to advancing the state of the art, the author develops the new class of digital fail-stop signatures. This monograph is self-contained regarding the historical background and cryptographic primitives used. For the first time, a general and sophisticated framework is introduced in which innovative fail-stop signatures are systematically presented and evaluated, from theoretical foundations to engineering aspects.

Fast Software Encryption - Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings (Paperback, 1995... Fast Software Encryption - Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings (Paperback, 1995 ed.)
Bart Preneel
R1,541 Discovery Miles 15 410 Ships in 18 - 22 working days

This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994.
The 28 papers presented significantly advance the state of the art of software algorithms for two cryptographic primitives requiring very high speeds, namely encryption algorithms and hash functions: this volume contains six proposals for new ciphers as well as new results on the security of the new proposals. In addition, there is an introductory overview by the volume editor. The papers are organized in several sections on stream ciphers and block ciphers; other papers deal with new algorithms and protocols or other recent results.

Integrity Primitives for Secure Information Systems - Final RIPE Report of RACE Integrity Primitives Evaluation (Paperback,... Integrity Primitives for Secure Information Systems - Final RIPE Report of RACE Integrity Primitives Evaluation (Paperback, 1995 ed.)
Antoon Bosselaers, Bart Preneel
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man-month project conducted by 16 leading European security experts.
This book offers expert advice to professionals seeking to secure information systems by applying up-to-date cryptographic techniques. The core of this volume is a detailed integrity primitives portfolio recommendation. Among the issues addressed are security services, integrity mechanisms, data origin authentication, entity authentication, access control, data integrity, non-repudiation, signatures, and key exchange.

Executive Guide to Preventing Information Technology Disasters (Paperback, Edition. ed.): Richard Ennals Executive Guide to Preventing Information Technology Disasters (Paperback, Edition. ed.)
Richard Ennals
R1,383 Discovery Miles 13 830 Ships in 18 - 22 working days

Recent and well-publicised disasters have highlighted the fact that organisations of all kinds - from healthcare to aerospace - are critically dependent on Information Technology systems. The prevention of catastrophic I.T. failure is now an essential part of management.
In this thought-provoking guide for executives and managers Richard Ennals argues that the critical factor is not technology, but people and communication.

Advances in Cryptology - EUROCRYPT '94 - Workshop on the Theory and Application of Cryptographic Techniques, Perugia,... Advances in Cryptology - EUROCRYPT '94 - Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9 - 12, 1994. Proceedings (Paperback, 1995 ed.)
Alfredo De Santis
R1,604 Discovery Miles 16 040 Ships in 18 - 22 working days

This book constitutes the proceedings of the 1994 Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT '94, held in Perugia, Italy in May 1994.
The 36 revised full papers presented in the book are selected from 137 submissions and address all current research and advanced applicational aspects of cryptography; in addition, there are 11 short papers originating from the best special presentations accepted for the traditional rump session. The papers are organized in sections on secret sharing, hash functions, signatures, cryptosystems, pseudorandom generators, authentication codes, key agreement and key distribution, protocols, cryptanalysis and block ciphers, and number theory and algorithms.

Advances in Cryptology - CRYPTO '95 - 15th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '95 - 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995. Proceedings (Paperback, 1995 ed.)
Don Coppersmith
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

The Crypto '95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciety Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. It took place at the University of California, Santa Barbara, from August 27-31, 1995. This was the fifteenth annual Crypto conference; all have been held at UCSB. For the second time, proceedings were available at the conference. The General Chair, Stafford Tavares, was responsible for local organization and registration. The Program Committee considered 151 papers and selected 36 for pres- tation. There were also two invited talks. Robert Morris, Sr. gave a talk on "Ways of Losing Information," which included some non-cryptographic means of leaking secrets that are often overlooked by cryptographers. The second talk, "Cryptography - Myths and Realities," was given by Adi Shamir, this year's IACR Distinguished Lecturer. Shamir is the second person to receive this honor, the first having been Gus Simmons at Crypto '94. These proceedings contain revised versions of the 36 contributed talks. Each paper was sent to at least three members of the program committee for c- ments. Revisions were not checked on their scientific aspects. Some authors will write final versions of their papers for publication in refereed journals. Of course, the authors bear full responsibility for the contents of their papers.

Safe Comp 96 - The 15th International Conference on Computer Safety, Reliability and Security, Vienna, Austria October 23-25... Safe Comp 96 - The 15th International Conference on Computer Safety, Reliability and Security, Vienna, Austria October 23-25 1996 (Paperback, Softcover reprint of the original 1st ed. 1997)
Austrian Research Centre Seibersdorf; Edited by Erwin Schoitsch
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

SAFECOMP '96 contains papers presented at the 15th International Conference on Computer Safety, Reliability and Security held in Vienna, Austria, 23-25 October 1996. The conference aimed to provide an opportunity for technical developers and users to discuss and review their experiences, to consider the best technologies currently available, and to identify the skills and technologies required for the future. SAFECOMP '96 focuses on critical computer applications and is intended as a platform for technology transfer between academia, industry and research institutions. SAFECOMP '96 will be of interest to all those in universities, research institutions, industry and business who want to be well-informed about the current international state of the art in computer safety, reliability and security.

Advances in Cryptology - EUROCRYPT '96 - International Conference on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '96 - International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12-16, 1996 Proceedings (Paperback, 1996 ed.)
Ueli Maurer
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Saragossa. It took place at the Palacio de Congresos in Saragossa, Spain, during May 12-16, 1996. This was the fifteenth annual EUROCRYPT conference (this name has been used since the third conference held in 1984), each of which has been held in a different city in Europe. For the second time, proceedings were available at the conference. JosC Pastor Franco, the General Chair, was resp- sible for local organization and registration. His contribution to the snccess of the conference is gratefully acknowledged. The Program Committee considered 126 submitted papers and selected 34 for presentation. Each paper was sent to all members of the Program Committee and was assigned to at least three of them for careful evaluation. There were also two invited talks. James L. Massey, this year's IACR Distinguished Ltcturer, gave a lecture entitled "The difficulty with difficulty". Massey is the third to receive this honor, the first two being Gustavus Simmons and Adi Shamir. Shafi Goldwasser gave an invited talk entitled "Multi party secure protocols: past and present". These proceedings contain revised versions of the 34 contributed talks. While the papers were carefully selected, they have not been refereed like submissions to a refereed journal. The authors bear full responsibility for the contents of their papers. Some authors may write final versions of their papers for publication in a refereed journal.

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes - 11th International Symposium, AAECC-11, Paris, France, July... Applied Algebra, Algebraic Algorithms and Error-Correcting Codes - 11th International Symposium, AAECC-11, Paris, France, July 17-22, 1995. Proceedings (Paperback, 1995 ed.)
Gerard Cohen, Marc Giusti, Teo Mora
R1,608 Discovery Miles 16 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the 11th International Conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-11, held in Paris, France in July 1995.
The volume presents five invited papers and 32 full revised research papers selected from a total of 68 submissions; it is focussed on research directed to the exploitation of algebraic techniques and methodologies for the application in coding and computer algebra. Among the topics covered are coding, cryptoloy, communication, factorization of polynomials, Gr bner bases, computer algebra, algebraic algorithms, symbolic computation, algebraic manipulation.

Advances in Cryptology - EUROCRYPT '95 - International Conference on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '95 - International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995 Proceedings (Paperback, 1995 ed.)
Louis C. Guillou, Jean-Jacques Quisquater
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

EUROCRYPT '95. Sponsored by the International Association for Cryp- logic Research (IACR), in cooperation with the Centre Commun d'Etudes de T616vision et T61Qcommunications (CCETT), a workshop on the theory and - plications of cryptographic techniques takes place at the Palais du Grand Large, Saint Malo, France, May 21-25, 1995. The General Chair of EUROCRYPT '95 is Franqoise Scarabin. The Or- nization Committee was helped by Maryvonne Lahaie and her communication team. Moreover, the CCETT has generously provided the help of a young - glish lady, Miss Virginia Cooper, for the secretariat of both the Organization arid Program Committees. They all did an excellent job in preparing the conference. It is our pleasure to thank them for their essential work. IACR and EUROCRYPT. According to a very good suggestion expressed during CRYPTO '82, the Association was established at CRYPTO '83. Today, the Association has approximately 600 members and the mailing file managed by its Secretariat consists of more than 2 000 names. The main goal of the Association is the sponsoring of two annual conferences: CRYPTO, every summer at the University of California, Santa Barbara (UCSB), and EUROCRYPT, every spring in a different European country. Moreover, the Association edits quarterly the Journal of Cryptology (JoC).

Building in Big Brother - The Cryptographic Policy Debate (Paperback, New): Lance J. Hoffman Building in Big Brother - The Cryptographic Policy Debate (Paperback, New)
Lance J. Hoffman
R2,749 Discovery Miles 27 490 Ships in 18 - 22 working days

This book presents the best readings on cryptographic policy and current cryptography trends. Topics include a survey of cryptography, the new "key escrow" systems, the Government solution, the debate between law enforcement views and civil liberties, and export control analysis. Detailed technological descriptions of promising new software schemes are included as well as analysis of the constitutional issues by legal scholars. Important government cost analyses appear here for the first time in any book. Other highlights include the text of the new US digital telephony law and the pending encryption regulation bill and a list of hundreds of cryptographic products available around the world. There is even a paper on how to commit the perfect crime electronically, using public key encryption.

Safe Comp 95 - The 14th International Conference on Computer Safety, Reliability and Security, Belgirate, Italy 11-13 October... Safe Comp 95 - The 14th International Conference on Computer Safety, Reliability and Security, Belgirate, Italy 11-13 October 1995 (Paperback, Edition. ed.)
Gerhard Rabe
R1,472 Discovery Miles 14 720 Ships in 18 - 22 working days

Safety-related computer systems are those which may lead to loss of life, injury or plant and environmental damage. Such systems therefore have to be developed and implemented so that they meet strict require and security because their applications cover ments on safety, reliability nearly all areas of daily life and range from controlling and monitoring industrial processes, through robotics and power generation, to transport systems. Highly reliable electronic systems for safety-related applications represent an area in which industry has been involved for many years and which is now gaining increasing importance in academia. Their relevance also results from an increased perception of safety by society. Therefore, not only are technicians involved in this area, but psycho logical and sociological aspects also play a major role. Dealing with safety-related systems we have to consider the whole lifecycle of these systems, starting from specification up to implementation, assessment and operation. All those issues mentioned above are covered in this book, which represents the proceedings of the 14th International Conference on Computer Safety, Reliability and Security, SAFECOMP '95, held in Belgirate, Italy, 11-13 October 1995. The conference continues the series of SAFECOMP conferences which was originated by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Security and Reliability (EWICS TC7) and reflects the state of the art, experience and new trends in the area of safety-related computer systems."

Distributed Programming Paradigms with Cryptography Applications (Paperback, 1994 ed.): Jonathan S Greenfield Distributed Programming Paradigms with Cryptography Applications (Paperback, 1994 ed.)
Jonathan S Greenfield
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

This monograph describes a programming methodology based upon programming paradigms and generic programs and demonstates how distributed application programs can be developed by simple substitution of data structures and sequential procedures. The author introduces generic programs for two paradigms and shows how to derive new distributed programs for several applications related to the RSA cryptosystem, including RSA enciphering and deciphering, prime number generation, and factoring.
The book is well-written and easily accessible to the non-expert. The work is an appealing combination of the theory and practice of parallel computing and provides a clear introduction to the theory and practice of RSA cryptography.

Fast Software Encryption - Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings (Paperback, 1996... Fast Software Encryption - Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings (Paperback, 1996 ed.)
Dieter Gollmann
R1,461 Discovery Miles 14 610 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996.
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cross-Disciplinary Uses of Gamification…
Oscar Bernardes, Vanessa Amorim, … Hardcover R7,962 Discovery Miles 79 620
30 Programs for the Sinclair ZX80
Retro Reproductions Hardcover R541 Discovery Miles 5 410
Development and Deployment of…
'No Bugs' Hare Hardcover R977 R856 Discovery Miles 8 560
Videogame Marketing and PR - Vol. 1…
Scott Steinberg Hardcover R567 Discovery Miles 5 670
NES/Famicom: a visual compendium
Bitmap Books Hardcover R1,253 Discovery Miles 12 530
Over the Spectrum
Philip Williams Hardcover R614 Discovery Miles 6 140
Programming Concepts in C++
Robert Burns Hardcover R729 Discovery Miles 7 290
Next-Generation Applications and…
Filipe Portela, Ricardo Queiros Hardcover R6,648 Discovery Miles 66 480
C64 Machine Language for the Absolute…
Danny Davis Hardcover R623 Discovery Miles 6 230
Die in Obscurity - Fan Insights and…
Sean Matuk Hardcover R611 Discovery Miles 6 110

 

Partners