0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (14)
  • R250 - R500 (85)
  • R500+ (1,292)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Advances in Cryptology - CRYPTO '96 - 16th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '96 - 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings (Paperback, 1996 ed.)
Neal Koblitz
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

Crypto '96, the Sixteenth Annual Crypto Conference, is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and P- vacy and the Computer Science Department of the University of California at Santa Barbara (UCSB). It takes place at UCSB from August 18 to 22, 1996. The General Chair, Richard Graveman, is responsible for local organization and registration. The scientific program was organized by the 16-member Program C- mittee. We considered 115 papers. (An additional 15 submissions had to be summarily rejected because of lateness or major noncompliance with the c- ditions in the Call for Papers.) Of these, 30 were accepted for presentation. In addition, there will be five invited talks by Ernest Brickell. Andrew Clark, Whitfield Diffie, Ronald Rivest, and Cliff Stoll. A Rump Session will be chaired by Stuart Haber. These proceedings contain the revised versions of the 30 contributed talks. least three com- The submitted version of each paper was examined by at mittee members and/or outside experts, and their comments were taken into account in the revisions. However, the authors (and not the committee) bear full responsibility for the content of their papers.

Human Machine Symbiosis - The Foundations of Human-centred Systems Design (Paperback, Softcover reprint of the original 1st ed.... Human Machine Symbiosis - The Foundations of Human-centred Systems Design (Paperback, Softcover reprint of the original 1st ed. 1996)
Karamjit S. Gill
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

There is now a serious discussion taking place about the moment at which human beings will be surpassed and replaced by the machine. On the one hand we are designing machines which embed more and more human intelligence, but at the same time we are in danger of becoming more and more like machines. In these circumstances, we all need to consider: * What can we do? * What should we do? * What are the alternatives of doing it? This book is about the human-centred alternative of designing systems and technologies. This alternative is rooted in the European tradition of human-centredness which emphasises the symbiosis of human capabilities and machine capacity. The human-centred tra dition celebrates the diversity of human skill and ingenuity and provides an alternative to the 'mechanistic' paradigm of 'one best way', the 'sameness of science' and the 'dream of the exact language'. This alternative vision has its origin in the founding European human-centred movements of the 1970s. These include the British movement of Socially Useful Technology, the Scandinavian move ment of Democratic Participation, and the German movement of Humanisation of Work and Technology. The present volume brings together various strands of human-centred systems philosophy which span the conceptual richness and cultural diversity of the human-centred movements. The core ideas of human-centredness include human-machine symbiosis, the tacit dimension of knowl edge, the system as a tool rather than a machine, dialogue, partici pation, social shaping and usability.

Guide to Computer Viruses - How to avoid them, how to get rid of them, and how to get help (Mixed media product, 2nd ed. 1996):... Guide to Computer Viruses - How to avoid them, how to get rid of them, and how to get help (Mixed media product, 2nd ed. 1996)
Robert Slade
R2,460 Discovery Miles 24 600 Ships in 18 - 22 working days

This book gives a thorough explanation of what computer viruses are, how they work, and how much computer users should worry about them. It is written to apply to all systems: micro, network, and mainframe and for both professional managers of computing systems and users of personal computers of all types, PCs, Macintoshes, and others. Robert Slade presents details of many of the most virulent of the known viruses and of the damage that they have done, as well as providing quidelines and recommendations to protect systems from infection. In addition, the book provides the widest possible range of reviews of the major anti-virus software packages available as well as many of the books on viruses. Contact addresses, telephone numbers, and electronic mail addresses are also given. In the event of a suspected virus infection, this book is the one that users will reach for! Included with the book is a diskette containing both four antiviral pieces of software for the PC and Macintosh and the complete virus catalog as produced by the Virus Test Centre at the University of Hamburg.

Concurrency and Parallelism, Programming, Networking, and Security - Second Asian Computing Science Conference, ASIAN '96,... Concurrency and Parallelism, Programming, Networking, and Security - Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2 - 5, 1996, Proceedings (Paperback, 1996 ed.)
Joxan Jaffar, Roland H.C. Yap
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second Asian Conference on Computing Science, ASIAN'96, held in Singapore in December 1996.
The volume presents 31 revised full papers selected from a total of 169 submissions; also included are three invited papers and 14 posters. The papers are organized in topical sections on algorithms, constraints and logic programming, distributed systems, formal systems, networking and security, programming and systems, and specification and verification.

Cryptography and Coding - Fifth IMA Conference; Cirencester, UK, December 1995. Proceedings (Paperback, 1995 ed.): Colin Boyd Cryptography and Coding - Fifth IMA Conference; Cirencester, UK, December 1995. Proceedings (Paperback, 1995 ed.)
Colin Boyd
R1,499 Discovery Miles 14 990 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th IMA Conference on Cryptography and Coding, held in Cirencester, UK in December 1995.
The volume presents 22 full revised papers selected from 48 submissions together with five invited full papers and three abstracts on the mathematical theory and practice of cryptography and coding; continuing advances in these strongly related areas are crucial for the security and reliability of data communication, processing, and storage. Among the topics addressed are linear codes, error-correcting codes, decoding, key distribution, authentication, hash functions, block ciphers, cryptanalysis, and electronic cash.

Digital Signature Schemes - General Framework and Fail-Stop Signatures (Paperback, 1996 ed.): Birgit Pfitzmann Digital Signature Schemes - General Framework and Fail-Stop Signatures (Paperback, 1996 ed.)
Birgit Pfitzmann
R1,559 Discovery Miles 15 590 Ships in 18 - 22 working days

This book, based on the author's Ph.D. thesis, was selected during the 1995 GI Doctoral Dissertation Competition as the winning thesis in the foundations-of-informatics track.
Securing integrity for digital communications in the age of global electronic information exchange and electronic commerce is vital to democratic societies and a central technical challenge for cryptologists. As core contribution to advancing the state of the art, the author develops the new class of digital fail-stop signatures. This monograph is self-contained regarding the historical background and cryptographic primitives used. For the first time, a general and sophisticated framework is introduced in which innovative fail-stop signatures are systematically presented and evaluated, from theoretical foundations to engineering aspects.

Fast Software Encryption - Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings (Paperback, 1995... Fast Software Encryption - Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings (Paperback, 1995 ed.)
Bart Preneel
R1,541 Discovery Miles 15 410 Ships in 18 - 22 working days

This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994.
The 28 papers presented significantly advance the state of the art of software algorithms for two cryptographic primitives requiring very high speeds, namely encryption algorithms and hash functions: this volume contains six proposals for new ciphers as well as new results on the security of the new proposals. In addition, there is an introductory overview by the volume editor. The papers are organized in several sections on stream ciphers and block ciphers; other papers deal with new algorithms and protocols or other recent results.

Integrity Primitives for Secure Information Systems - Final RIPE Report of RACE Integrity Primitives Evaluation (Paperback,... Integrity Primitives for Secure Information Systems - Final RIPE Report of RACE Integrity Primitives Evaluation (Paperback, 1995 ed.)
Antoon Bosselaers, Bart Preneel
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man-month project conducted by 16 leading European security experts.
This book offers expert advice to professionals seeking to secure information systems by applying up-to-date cryptographic techniques. The core of this volume is a detailed integrity primitives portfolio recommendation. Among the issues addressed are security services, integrity mechanisms, data origin authentication, entity authentication, access control, data integrity, non-repudiation, signatures, and key exchange.

Executive Guide to Preventing Information Technology Disasters (Paperback, Edition. ed.): Richard Ennals Executive Guide to Preventing Information Technology Disasters (Paperback, Edition. ed.)
Richard Ennals
R1,383 Discovery Miles 13 830 Ships in 18 - 22 working days

Recent and well-publicised disasters have highlighted the fact that organisations of all kinds - from healthcare to aerospace - are critically dependent on Information Technology systems. The prevention of catastrophic I.T. failure is now an essential part of management.
In this thought-provoking guide for executives and managers Richard Ennals argues that the critical factor is not technology, but people and communication.

Advances in Cryptology - EUROCRYPT '94 - Workshop on the Theory and Application of Cryptographic Techniques, Perugia,... Advances in Cryptology - EUROCRYPT '94 - Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9 - 12, 1994. Proceedings (Paperback, 1995 ed.)
Alfredo De Santis
R1,604 Discovery Miles 16 040 Ships in 18 - 22 working days

This book constitutes the proceedings of the 1994 Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT '94, held in Perugia, Italy in May 1994.
The 36 revised full papers presented in the book are selected from 137 submissions and address all current research and advanced applicational aspects of cryptography; in addition, there are 11 short papers originating from the best special presentations accepted for the traditional rump session. The papers are organized in sections on secret sharing, hash functions, signatures, cryptosystems, pseudorandom generators, authentication codes, key agreement and key distribution, protocols, cryptanalysis and block ciphers, and number theory and algorithms.

Advances in Cryptology - CRYPTO '95 - 15th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '95 - 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995. Proceedings (Paperback, 1995 ed.)
Don Coppersmith
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

The Crypto '95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciety Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. It took place at the University of California, Santa Barbara, from August 27-31, 1995. This was the fifteenth annual Crypto conference; all have been held at UCSB. For the second time, proceedings were available at the conference. The General Chair, Stafford Tavares, was responsible for local organization and registration. The Program Committee considered 151 papers and selected 36 for pres- tation. There were also two invited talks. Robert Morris, Sr. gave a talk on "Ways of Losing Information," which included some non-cryptographic means of leaking secrets that are often overlooked by cryptographers. The second talk, "Cryptography - Myths and Realities," was given by Adi Shamir, this year's IACR Distinguished Lecturer. Shamir is the second person to receive this honor, the first having been Gus Simmons at Crypto '94. These proceedings contain revised versions of the 36 contributed talks. Each paper was sent to at least three members of the program committee for c- ments. Revisions were not checked on their scientific aspects. Some authors will write final versions of their papers for publication in refereed journals. Of course, the authors bear full responsibility for the contents of their papers.

Safe Comp 96 - The 15th International Conference on Computer Safety, Reliability and Security, Vienna, Austria October 23-25... Safe Comp 96 - The 15th International Conference on Computer Safety, Reliability and Security, Vienna, Austria October 23-25 1996 (Paperback, Softcover reprint of the original 1st ed. 1997)
Austrian Research Centre Seibersdorf; Edited by Erwin Schoitsch
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

SAFECOMP '96 contains papers presented at the 15th International Conference on Computer Safety, Reliability and Security held in Vienna, Austria, 23-25 October 1996. The conference aimed to provide an opportunity for technical developers and users to discuss and review their experiences, to consider the best technologies currently available, and to identify the skills and technologies required for the future. SAFECOMP '96 focuses on critical computer applications and is intended as a platform for technology transfer between academia, industry and research institutions. SAFECOMP '96 will be of interest to all those in universities, research institutions, industry and business who want to be well-informed about the current international state of the art in computer safety, reliability and security.

Advances in Cryptology - EUROCRYPT '96 - International Conference on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '96 - International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12-16, 1996 Proceedings (Paperback, 1996 ed.)
Ueli Maurer
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Saragossa. It took place at the Palacio de Congresos in Saragossa, Spain, during May 12-16, 1996. This was the fifteenth annual EUROCRYPT conference (this name has been used since the third conference held in 1984), each of which has been held in a different city in Europe. For the second time, proceedings were available at the conference. JosC Pastor Franco, the General Chair, was resp- sible for local organization and registration. His contribution to the snccess of the conference is gratefully acknowledged. The Program Committee considered 126 submitted papers and selected 34 for presentation. Each paper was sent to all members of the Program Committee and was assigned to at least three of them for careful evaluation. There were also two invited talks. James L. Massey, this year's IACR Distinguished Ltcturer, gave a lecture entitled "The difficulty with difficulty". Massey is the third to receive this honor, the first two being Gustavus Simmons and Adi Shamir. Shafi Goldwasser gave an invited talk entitled "Multi party secure protocols: past and present". These proceedings contain revised versions of the 34 contributed talks. While the papers were carefully selected, they have not been refereed like submissions to a refereed journal. The authors bear full responsibility for the contents of their papers. Some authors may write final versions of their papers for publication in a refereed journal.

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes - 11th International Symposium, AAECC-11, Paris, France, July... Applied Algebra, Algebraic Algorithms and Error-Correcting Codes - 11th International Symposium, AAECC-11, Paris, France, July 17-22, 1995. Proceedings (Paperback, 1995 ed.)
Gerard Cohen, Marc Giusti, Teo Mora
R1,608 Discovery Miles 16 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the 11th International Conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-11, held in Paris, France in July 1995.
The volume presents five invited papers and 32 full revised research papers selected from a total of 68 submissions; it is focussed on research directed to the exploitation of algebraic techniques and methodologies for the application in coding and computer algebra. Among the topics covered are coding, cryptoloy, communication, factorization of polynomials, Gr bner bases, computer algebra, algebraic algorithms, symbolic computation, algebraic manipulation.

Advances in Cryptology - EUROCRYPT '95 - International Conference on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '95 - International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995 Proceedings (Paperback, 1995 ed.)
Louis C. Guillou, Jean-Jacques Quisquater
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

EUROCRYPT '95. Sponsored by the International Association for Cryp- logic Research (IACR), in cooperation with the Centre Commun d'Etudes de T616vision et T61Qcommunications (CCETT), a workshop on the theory and - plications of cryptographic techniques takes place at the Palais du Grand Large, Saint Malo, France, May 21-25, 1995. The General Chair of EUROCRYPT '95 is Franqoise Scarabin. The Or- nization Committee was helped by Maryvonne Lahaie and her communication team. Moreover, the CCETT has generously provided the help of a young - glish lady, Miss Virginia Cooper, for the secretariat of both the Organization arid Program Committees. They all did an excellent job in preparing the conference. It is our pleasure to thank them for their essential work. IACR and EUROCRYPT. According to a very good suggestion expressed during CRYPTO '82, the Association was established at CRYPTO '83. Today, the Association has approximately 600 members and the mailing file managed by its Secretariat consists of more than 2 000 names. The main goal of the Association is the sponsoring of two annual conferences: CRYPTO, every summer at the University of California, Santa Barbara (UCSB), and EUROCRYPT, every spring in a different European country. Moreover, the Association edits quarterly the Journal of Cryptology (JoC).

Building in Big Brother - The Cryptographic Policy Debate (Paperback, New): Lance J. Hoffman Building in Big Brother - The Cryptographic Policy Debate (Paperback, New)
Lance J. Hoffman
R2,749 Discovery Miles 27 490 Ships in 18 - 22 working days

This book presents the best readings on cryptographic policy and current cryptography trends. Topics include a survey of cryptography, the new "key escrow" systems, the Government solution, the debate between law enforcement views and civil liberties, and export control analysis. Detailed technological descriptions of promising new software schemes are included as well as analysis of the constitutional issues by legal scholars. Important government cost analyses appear here for the first time in any book. Other highlights include the text of the new US digital telephony law and the pending encryption regulation bill and a list of hundreds of cryptographic products available around the world. There is even a paper on how to commit the perfect crime electronically, using public key encryption.

Safe Comp 95 - The 14th International Conference on Computer Safety, Reliability and Security, Belgirate, Italy 11-13 October... Safe Comp 95 - The 14th International Conference on Computer Safety, Reliability and Security, Belgirate, Italy 11-13 October 1995 (Paperback, Edition. ed.)
Gerhard Rabe
R1,472 Discovery Miles 14 720 Ships in 18 - 22 working days

Safety-related computer systems are those which may lead to loss of life, injury or plant and environmental damage. Such systems therefore have to be developed and implemented so that they meet strict require and security because their applications cover ments on safety, reliability nearly all areas of daily life and range from controlling and monitoring industrial processes, through robotics and power generation, to transport systems. Highly reliable electronic systems for safety-related applications represent an area in which industry has been involved for many years and which is now gaining increasing importance in academia. Their relevance also results from an increased perception of safety by society. Therefore, not only are technicians involved in this area, but psycho logical and sociological aspects also play a major role. Dealing with safety-related systems we have to consider the whole lifecycle of these systems, starting from specification up to implementation, assessment and operation. All those issues mentioned above are covered in this book, which represents the proceedings of the 14th International Conference on Computer Safety, Reliability and Security, SAFECOMP '95, held in Belgirate, Italy, 11-13 October 1995. The conference continues the series of SAFECOMP conferences which was originated by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Security and Reliability (EWICS TC7) and reflects the state of the art, experience and new trends in the area of safety-related computer systems."

Distributed Programming Paradigms with Cryptography Applications (Paperback, 1994 ed.): Jonathan S Greenfield Distributed Programming Paradigms with Cryptography Applications (Paperback, 1994 ed.)
Jonathan S Greenfield
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

This monograph describes a programming methodology based upon programming paradigms and generic programs and demonstates how distributed application programs can be developed by simple substitution of data structures and sequential procedures. The author introduces generic programs for two paradigms and shows how to derive new distributed programs for several applications related to the RSA cryptosystem, including RSA enciphering and deciphering, prime number generation, and factoring.
The book is well-written and easily accessible to the non-expert. The work is an appealing combination of the theory and practice of parallel computing and provides a clear introduction to the theory and practice of RSA cryptography.

Fast Software Encryption - Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings (Paperback, 1996... Fast Software Encryption - Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings (Paperback, 1996 ed.)
Dieter Gollmann
R1,461 Discovery Miles 14 610 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996.
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.

Cryptography: Policy and Algorithms - International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings... Cryptography: Policy and Algorithms - International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings (Paperback, 1996 ed.)
Edward Pyle Dawson, Jovan Goli c
R1,521 Discovery Miles 15 210 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995.Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.

Advances in Cryptology - CRYPTO '94 - 14th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '94 - 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994. Proceedings (Paperback, 1994 ed.)
Yvo G. Desmedt
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

The CRYPTO '94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy. It has taken place at the Univ- sity of California, Santa Barbara, from August 21-25,1994. This is the fourteenth annual CRYPTO conference, all of which have been held at UCSB. This is the first time that proceedings are available at the conference. The General Chair, Jimmy R. Upton has been responsible for local organization, registration, etc. There were 114 submitted papers which were considered by the Program Committee. Of these, 1 was withdrawn and 38 were selected for the proce- ings. There are also 3 invited talks. Two of these are on aspects of cryptog- phy in the commercial world. The one on hardware aspects will be presented by David Maher (AT&T), the one on software aspects by Joseph Pato (Hewlett- Packard). There will also be a panel discussion on "Securing an Electronic World: Are We Ready?" The panel members will be: Ross Anderson, Bob Blakley, Matt Blaze, George Davida, Yvo Desmedt (moderator), Whitfield Diffie, Joan Feig- baum, Blake Greenlee, Martin Hellman, David Maher, Miles Smid. The topic of the panel will be introduced by the invited talk of Whitfield Diffie on "Securing the Information Highway. " These proceedings contain revised versions of the 38 contributed talks. Each i paper was sent to at least 3 members of the program committee for comments.

Security for Object-Oriented Systems - Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented... Security for Object-Oriented Systems - Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington DC, USA, 26 September 1993 (Paperback, Edition. ed.)
Bhavani Thuraisingham, Ravi Sandhu, T.C. Ting
R1,397 Discovery Miles 13 970 Ships in 18 - 22 working days

This volume contains papers from the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, held in Washington DC, USA, on 26 September 1993. The workshop addressed the issue of how to introduce an acceptable level of security into object-oriented systems, as the use of such systems becomes increasingly widespread. The topic is approached from two different, but complementary, viewpoints: the incorporation of security into object-oriented systems, and the use of object-oriented design and modelling techniques for designing secure applications. The papers cover a variety of issues, relating to both mandatory and discretionary security, including security facilities of PCTE, information flow control, the design of multilevel secure data models, and secure database interoperation via role translation. The resulting volume provides a comprehensive overview of current work in this important area of research.

Fast Software Encryption - Cambridge Security Workshop, Cambridge, U.K., December 9 - 11, 1993. Proceedings (Paperback, 1994... Fast Software Encryption - Cambridge Security Workshop, Cambridge, U.K., December 9 - 11, 1993. Proceedings (Paperback, 1994 ed.)
Ross Anderson
R1,463 Discovery Miles 14 630 Ships in 18 - 22 working days

This volume contains the refereed papers presented at the International Workshop on Software Encryption Algorithms, held at Cambridge University, U.K. in December 1993.
The collection of papers by representatives of all relevant research centers gives a thorough state-of-the-art report on all theoretical aspects of encryption algorithms and takes into account the new demands from new applications, as for example from the data-intensive multimedia applications. The 26 papers are organized in sections on block ciphers, stream ciphers, software performance, cryptanalysis, hash functions and hybrid ciphers, and randomness and nonlinearity.

Computer Security - ESORICS 94 - Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November... Computer Security - ESORICS 94 - Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings (Paperback, 1994 ed.)
Dieter Gollmann
R1,597 Discovery Miles 15 970 Ships in 18 - 22 working days

This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures.

Advances in Cryptology - CRYPTO '93 - 13th Annual International Cryptology Conference Santa Barbara, California, USA... Advances in Cryptology - CRYPTO '93 - 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22-26, 1993 Proceedings (Paperback, 1994 ed.)
Douglas R. Stinson
R1,464 Discovery Miles 14 640 Ships in 18 - 22 working days

The CRYPTO '93 conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom), in co-operation with the IEEE Computer Society Technical Committee. It took place at the University of California, Santa Barbara, from August 22-26, 1993. This was the thirteenth annual CRYPTO conference, all of which have been held at UCSB. The conference was very enjoyable and ran very of the General Chair, Paul Van Oorschot. smoothly, largely due to the efforts It was a pleasure working with Paul throughout the months leading up to the conference. There were 136 submitted papers which were considered by the Program Committee. Of these, 38 were selected for presentation at the conference. There was also one invited talk at the conference, presented by Miles Smid, the title of which was "A Status Report On the Federal Government Key Escrow System." The conference also included the customary Rump Session, which was presided over by Whit Diffie in his usual inimitable fashion. Thanks again to Whit for organizing and running the Rump session. This year, the Rump Session included an interesting and lively panel discussion on issues pertaining to key escrowing. Those taking part were W. Diffie, J. Gilmore, S. Goldwasser, M. Hellman, A. Herzberg, S. Micali, R. Rueppel, G. Simmons and D. Weitzner.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,170 Discovery Miles 61 700
Sockets, Shellcode, Porting, and Coding…
James C Foster Paperback R1,135 Discovery Miles 11 350
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
How to Cheat at Windows System…
Pawan K. Bhardwaj Paperback R941 Discovery Miles 9 410
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,170 Discovery Miles 61 700
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,483 Discovery Miles 34 830
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120

 

Partners