0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (88)
  • R500+ (1,310)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes - 11th International Symposium, AAECC-11, Paris, France, July... Applied Algebra, Algebraic Algorithms and Error-Correcting Codes - 11th International Symposium, AAECC-11, Paris, France, July 17-22, 1995. Proceedings (Paperback, 1995 ed.)
Gerard Cohen, Marc Giusti, Teo Mora
R1,608 Discovery Miles 16 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the 11th International Conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-11, held in Paris, France in July 1995.
The volume presents five invited papers and 32 full revised research papers selected from a total of 68 submissions; it is focussed on research directed to the exploitation of algebraic techniques and methodologies for the application in coding and computer algebra. Among the topics covered are coding, cryptoloy, communication, factorization of polynomials, Gr bner bases, computer algebra, algebraic algorithms, symbolic computation, algebraic manipulation.

Advances in Cryptology - CRYPTO '95 - 15th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '95 - 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995. Proceedings (Paperback, 1995 ed.)
Don Coppersmith
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

The Crypto '95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciety Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. It took place at the University of California, Santa Barbara, from August 27-31, 1995. This was the fifteenth annual Crypto conference; all have been held at UCSB. For the second time, proceedings were available at the conference. The General Chair, Stafford Tavares, was responsible for local organization and registration. The Program Committee considered 151 papers and selected 36 for pres- tation. There were also two invited talks. Robert Morris, Sr. gave a talk on "Ways of Losing Information," which included some non-cryptographic means of leaking secrets that are often overlooked by cryptographers. The second talk, "Cryptography - Myths and Realities," was given by Adi Shamir, this year's IACR Distinguished Lecturer. Shamir is the second person to receive this honor, the first having been Gus Simmons at Crypto '94. These proceedings contain revised versions of the 36 contributed talks. Each paper was sent to at least three members of the program committee for c- ments. Revisions were not checked on their scientific aspects. Some authors will write final versions of their papers for publication in refereed journals. Of course, the authors bear full responsibility for the contents of their papers.

Advances in Cryptology - EUROCRYPT '96 - International Conference on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '96 - International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12-16, 1996 Proceedings (Paperback, 1996 ed.)
Ueli Maurer
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Saragossa. It took place at the Palacio de Congresos in Saragossa, Spain, during May 12-16, 1996. This was the fifteenth annual EUROCRYPT conference (this name has been used since the third conference held in 1984), each of which has been held in a different city in Europe. For the second time, proceedings were available at the conference. JosC Pastor Franco, the General Chair, was resp- sible for local organization and registration. His contribution to the snccess of the conference is gratefully acknowledged. The Program Committee considered 126 submitted papers and selected 34 for presentation. Each paper was sent to all members of the Program Committee and was assigned to at least three of them for careful evaluation. There were also two invited talks. James L. Massey, this year's IACR Distinguished Ltcturer, gave a lecture entitled "The difficulty with difficulty". Massey is the third to receive this honor, the first two being Gustavus Simmons and Adi Shamir. Shafi Goldwasser gave an invited talk entitled "Multi party secure protocols: past and present". These proceedings contain revised versions of the 34 contributed talks. While the papers were carefully selected, they have not been refereed like submissions to a refereed journal. The authors bear full responsibility for the contents of their papers. Some authors may write final versions of their papers for publication in a refereed journal.

Safe Comp 96 - The 15th International Conference on Computer Safety, Reliability and Security, Vienna, Austria October 23-25... Safe Comp 96 - The 15th International Conference on Computer Safety, Reliability and Security, Vienna, Austria October 23-25 1996 (Paperback, Softcover reprint of the original 1st ed. 1997)
Austrian Research Centre Seibersdorf; Edited by Erwin Schoitsch
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

SAFECOMP '96 contains papers presented at the 15th International Conference on Computer Safety, Reliability and Security held in Vienna, Austria, 23-25 October 1996. The conference aimed to provide an opportunity for technical developers and users to discuss and review their experiences, to consider the best technologies currently available, and to identify the skills and technologies required for the future. SAFECOMP '96 focuses on critical computer applications and is intended as a platform for technology transfer between academia, industry and research institutions. SAFECOMP '96 will be of interest to all those in universities, research institutions, industry and business who want to be well-informed about the current international state of the art in computer safety, reliability and security.

Building in Big Brother - The Cryptographic Policy Debate (Paperback, New): Lance J. Hoffman Building in Big Brother - The Cryptographic Policy Debate (Paperback, New)
Lance J. Hoffman
R2,749 Discovery Miles 27 490 Ships in 18 - 22 working days

This book presents the best readings on cryptographic policy and current cryptography trends. Topics include a survey of cryptography, the new "key escrow" systems, the Government solution, the debate between law enforcement views and civil liberties, and export control analysis. Detailed technological descriptions of promising new software schemes are included as well as analysis of the constitutional issues by legal scholars. Important government cost analyses appear here for the first time in any book. Other highlights include the text of the new US digital telephony law and the pending encryption regulation bill and a list of hundreds of cryptographic products available around the world. There is even a paper on how to commit the perfect crime electronically, using public key encryption.

Integrity Primitives for Secure Information Systems - Final RIPE Report of RACE Integrity Primitives Evaluation (Paperback,... Integrity Primitives for Secure Information Systems - Final RIPE Report of RACE Integrity Primitives Evaluation (Paperback, 1995 ed.)
Antoon Bosselaers, Bart Preneel
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man-month project conducted by 16 leading European security experts.
This book offers expert advice to professionals seeking to secure information systems by applying up-to-date cryptographic techniques. The core of this volume is a detailed integrity primitives portfolio recommendation. Among the issues addressed are security services, integrity mechanisms, data origin authentication, entity authentication, access control, data integrity, non-repudiation, signatures, and key exchange.

Distributed Programming Paradigms with Cryptography Applications (Paperback, 1994 ed.): Jonathan S Greenfield Distributed Programming Paradigms with Cryptography Applications (Paperback, 1994 ed.)
Jonathan S Greenfield
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

This monograph describes a programming methodology based upon programming paradigms and generic programs and demonstates how distributed application programs can be developed by simple substitution of data structures and sequential procedures. The author introduces generic programs for two paradigms and shows how to derive new distributed programs for several applications related to the RSA cryptosystem, including RSA enciphering and deciphering, prime number generation, and factoring.
The book is well-written and easily accessible to the non-expert. The work is an appealing combination of the theory and practice of parallel computing and provides a clear introduction to the theory and practice of RSA cryptography.

Fast Software Encryption - Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings (Paperback, 1996... Fast Software Encryption - Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings (Paperback, 1996 ed.)
Dieter Gollmann
R1,461 Discovery Miles 14 610 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996.
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.

Cryptography: Policy and Algorithms - International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings... Cryptography: Policy and Algorithms - International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings (Paperback, 1996 ed.)
Edward Pyle Dawson, Jovan Goli c
R1,521 Discovery Miles 15 210 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995.Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.

Computer Security - ESORICS 94 - Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November... Computer Security - ESORICS 94 - Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings (Paperback, 1994 ed.)
Dieter Gollmann
R1,597 Discovery Miles 15 970 Ships in 18 - 22 working days

This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures.

Advances in Cryptology - CRYPTO '94 - 14th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '94 - 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994. Proceedings (Paperback, 1994 ed.)
Yvo G. Desmedt
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

The CRYPTO '94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy. It has taken place at the Univ- sity of California, Santa Barbara, from August 21-25,1994. This is the fourteenth annual CRYPTO conference, all of which have been held at UCSB. This is the first time that proceedings are available at the conference. The General Chair, Jimmy R. Upton has been responsible for local organization, registration, etc. There were 114 submitted papers which were considered by the Program Committee. Of these, 1 was withdrawn and 38 were selected for the proce- ings. There are also 3 invited talks. Two of these are on aspects of cryptog- phy in the commercial world. The one on hardware aspects will be presented by David Maher (AT&T), the one on software aspects by Joseph Pato (Hewlett- Packard). There will also be a panel discussion on "Securing an Electronic World: Are We Ready?" The panel members will be: Ross Anderson, Bob Blakley, Matt Blaze, George Davida, Yvo Desmedt (moderator), Whitfield Diffie, Joan Feig- baum, Blake Greenlee, Martin Hellman, David Maher, Miles Smid. The topic of the panel will be introduced by the invited talk of Whitfield Diffie on "Securing the Information Highway. " These proceedings contain revised versions of the 38 contributed talks. Each i paper was sent to at least 3 members of the program committee for comments.

Fast Software Encryption - Cambridge Security Workshop, Cambridge, U.K., December 9 - 11, 1993. Proceedings (Paperback, 1994... Fast Software Encryption - Cambridge Security Workshop, Cambridge, U.K., December 9 - 11, 1993. Proceedings (Paperback, 1994 ed.)
Ross Anderson
R1,463 Discovery Miles 14 630 Ships in 18 - 22 working days

This volume contains the refereed papers presented at the International Workshop on Software Encryption Algorithms, held at Cambridge University, U.K. in December 1993.
The collection of papers by representatives of all relevant research centers gives a thorough state-of-the-art report on all theoretical aspects of encryption algorithms and takes into account the new demands from new applications, as for example from the data-intensive multimedia applications. The 26 papers are organized in sections on block ciphers, stream ciphers, software performance, cryptanalysis, hash functions and hybrid ciphers, and randomness and nonlinearity.

Fast Software Encryption - Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings (Paperback, 1995... Fast Software Encryption - Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings (Paperback, 1995 ed.)
Bart Preneel
R1,541 Discovery Miles 15 410 Ships in 18 - 22 working days

This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994.
The 28 papers presented significantly advance the state of the art of software algorithms for two cryptographic primitives requiring very high speeds, namely encryption algorithms and hash functions: this volume contains six proposals for new ciphers as well as new results on the security of the new proposals. In addition, there is an introductory overview by the volume editor. The papers are organized in several sections on stream ciphers and block ciphers; other papers deal with new algorithms and protocols or other recent results.

Security for Object-Oriented Systems - Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented... Security for Object-Oriented Systems - Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington DC, USA, 26 September 1993 (Paperback, Edition. ed.)
Bhavani Thuraisingham, Ravi Sandhu, T.C. Ting
R1,397 Discovery Miles 13 970 Ships in 18 - 22 working days

This volume contains papers from the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, held in Washington DC, USA, on 26 September 1993. The workshop addressed the issue of how to introduce an acceptable level of security into object-oriented systems, as the use of such systems becomes increasingly widespread. The topic is approached from two different, but complementary, viewpoints: the incorporation of security into object-oriented systems, and the use of object-oriented design and modelling techniques for designing secure applications. The papers cover a variety of issues, relating to both mandatory and discretionary security, including security facilities of PCTE, information flow control, the design of multilevel secure data models, and secure database interoperation via role translation. The resulting volume provides a comprehensive overview of current work in this important area of research.

Safe Comp 95 - The 14th International Conference on Computer Safety, Reliability and Security, Belgirate, Italy 11-13 October... Safe Comp 95 - The 14th International Conference on Computer Safety, Reliability and Security, Belgirate, Italy 11-13 October 1995 (Paperback, Edition. ed.)
Gerhard Rabe
R1,472 Discovery Miles 14 720 Ships in 18 - 22 working days

Safety-related computer systems are those which may lead to loss of life, injury or plant and environmental damage. Such systems therefore have to be developed and implemented so that they meet strict require and security because their applications cover ments on safety, reliability nearly all areas of daily life and range from controlling and monitoring industrial processes, through robotics and power generation, to transport systems. Highly reliable electronic systems for safety-related applications represent an area in which industry has been involved for many years and which is now gaining increasing importance in academia. Their relevance also results from an increased perception of safety by society. Therefore, not only are technicians involved in this area, but psycho logical and sociological aspects also play a major role. Dealing with safety-related systems we have to consider the whole lifecycle of these systems, starting from specification up to implementation, assessment and operation. All those issues mentioned above are covered in this book, which represents the proceedings of the 14th International Conference on Computer Safety, Reliability and Security, SAFECOMP '95, held in Belgirate, Italy, 11-13 October 1995. The conference continues the series of SAFECOMP conferences which was originated by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Security and Reliability (EWICS TC7) and reflects the state of the art, experience and new trends in the area of safety-related computer systems."

Cryptoeconomics - Igniting a New Era of Blockchain (Hardcover): Jian Gong, Wei Xu Cryptoeconomics - Igniting a New Era of Blockchain (Hardcover)
Jian Gong, Wei Xu
R1,867 Discovery Miles 18 670 Ships in 10 - 15 working days

"A systematic review of the structure and context of the blockchain-derived economic model... (the book) describes cryptoeconomics in connection with the game theory, behavioral economics and others in simple understandable language."-Wang Feng, founder of Linekong Interactive Group and Mars Finance, partner in Geekbang Venture Capital Blockchain technology has subverted existing perceptions and is the start of an economic revolution, called, cryptoeconomics. Blockchain is a key component of cryptoeconomics. Vlad Zamfir, a developer of Ethereum, defines this term as "a formal discipline that studies protocols that governs the production, distribution, and consumption of goods and services in a decentralized digital economy. Cryptoeconomics is a practical science that focuses on the design and characterization of these protocols". This book explains the structures of blockchain-derived economic models, their history, and their application. It uses real-world cases to illustrate the relationship between cryptoeconomics and blockchain. Blockchain technology solves trust issues. A blockchain application can restrict behavior on the blockchain through a reward and punishment system that enables consensus in an innovative way. The greatest significance of cryptoeconomics lies in guaranteeing safety, stability, activity, and order in a decentralized consensus system. Security and stability are achieved mainly by cryptographical mechanisms. Activity and order are achieved through economic mechanisms. Cryptoeconomics and Blockchain: Ignighting a New Era of Blockchain discusses the most popular consensus algorithms and optimization mechanisms. With examples explained in clear and simple terms that are easy to understand, the book also explores economic mechanisms of blockchain such as game theory and behavioral economics.

Advances in Cryptology - CRYPTO '93 - 13th Annual International Cryptology Conference Santa Barbara, California, USA... Advances in Cryptology - CRYPTO '93 - 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22-26, 1993 Proceedings (Paperback, 1994 ed.)
Douglas R. Stinson
R1,464 Discovery Miles 14 640 Ships in 18 - 22 working days

The CRYPTO '93 conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom), in co-operation with the IEEE Computer Society Technical Committee. It took place at the University of California, Santa Barbara, from August 22-26, 1993. This was the thirteenth annual CRYPTO conference, all of which have been held at UCSB. The conference was very enjoyable and ran very of the General Chair, Paul Van Oorschot. smoothly, largely due to the efforts It was a pleasure working with Paul throughout the months leading up to the conference. There were 136 submitted papers which were considered by the Program Committee. Of these, 38 were selected for presentation at the conference. There was also one invited talk at the conference, presented by Miles Smid, the title of which was "A Status Report On the Federal Government Key Escrow System." The conference also included the customary Rump Session, which was presided over by Whit Diffie in his usual inimitable fashion. Thanks again to Whit for organizing and running the Rump session. This year, the Rump Session included an interesting and lively panel discussion on issues pertaining to key escrowing. Those taking part were W. Diffie, J. Gilmore, S. Goldwasser, M. Hellman, A. Herzberg, S. Micali, R. Rueppel, G. Simmons and D. Weitzner.

Technology and Assessment of Safety-Critical Systems - Proceedings of the Second Safety-critical Systems Symposium, Birmingham,... Technology and Assessment of Safety-Critical Systems - Proceedings of the Second Safety-critical Systems Symposium, Birmingham, UK, 8-10 February 1994 (Paperback, Softcover reprint of the original 1st ed. 1994)
Felix Redmill, Tom Anderson
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The programme for the Second Safety-critical Systems Symposium was planned to examine the various aspects of technology currently employed in the design of safety-critical systems, as well as to emphasise the importance of safety and risk management in their design and operation. assessment There is an even balance of contributions from academia and industry. Thus, industry is given the opportunity to express its views of the safety-critical domain and at the same time offered a glimpse of the technologies which are currently under development and which, if successful, will be available in the medium-term future. In the field of technology, a subject whose importance is increasingly being recognised is human factors, and there are papers on this from the University of Hertfordshire and Rolls-Royce. Increasingly, PLCs are being employed in safety-critical applications, and this domain is represented by contributions from Nuclear Electric and August Computers. Then there are papers on maintainability, Ada, reverse engineering, social issues, formal methods, and medical systems, all in the context of safety. And, of course, it is not possible to keep the 'new' technologies out of the safety-critical domain: there are papers on neural networks from the University of Exeter and knowledge-based systems from ERA Technology.

Advances in Cryptology - EUROCRYPT '95 - International Conference on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '95 - International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995 Proceedings (Paperback, 1995 ed.)
Louis C. Guillou, Jean-Jacques Quisquater
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

EUROCRYPT '95. Sponsored by the International Association for Cryp- logic Research (IACR), in cooperation with the Centre Commun d'Etudes de T616vision et T61Qcommunications (CCETT), a workshop on the theory and - plications of cryptographic techniques takes place at the Palais du Grand Large, Saint Malo, France, May 21-25, 1995. The General Chair of EUROCRYPT '95 is Franqoise Scarabin. The Or- nization Committee was helped by Maryvonne Lahaie and her communication team. Moreover, the CCETT has generously provided the help of a young - glish lady, Miss Virginia Cooper, for the secretariat of both the Organization arid Program Committees. They all did an excellent job in preparing the conference. It is our pleasure to thank them for their essential work. IACR and EUROCRYPT. According to a very good suggestion expressed during CRYPTO '82, the Association was established at CRYPTO '83. Today, the Association has approximately 600 members and the mailing file managed by its Secretariat consists of more than 2 000 names. The main goal of the Association is the sponsoring of two annual conferences: CRYPTO, every summer at the University of California, Santa Barbara (UCSB), and EUROCRYPT, every spring in a different European country. Moreover, the Association edits quarterly the Journal of Cryptology (JoC).

SAFECOMP '93 - The 12th International Conference on Computer Safety, Reliability and Security (Paperback, Softcover... SAFECOMP '93 - The 12th International Conference on Computer Safety, Reliability and Security (Paperback, Softcover reprint of the original 1st ed. 1993)
Janusz G orski
R1,448 Discovery Miles 14 480 Ships in 18 - 22 working days

The safe operation of computer systems continues to be a key issue in many applications where people, environment, investment, or goodwill can be at risk. Such applications include medical, railways, power generation and distribution, road transportation, aerospace, process industries, mining, military and many others. This book represents the proceedings of the 12th International Conference on Computer Safety, Reliability and Security, held in Poznan, Poland, 27-29 October 1993. The conference reviews the state of the art, experiences and new trends in the areas of computer safety, reliability and security. It forms a platform for technology transfer between academia, industry and research institutions. In an expanding world-wide market for safe, secure and reliable computer systems SAFECOMP'93 provides an opportunity for technical developers, users, and legislators to exchange and review the experience, to consider the best technologies now available and to identify the skills and technologies required for the future. The papers were carefully selected by the International Program Com mittee of the Conference. The authors of the papers come from 16 different countries. The subjects covered include formal methods and models, safety assessment and analysis, verification and validation, testing, reliability issues and dependable software tech nology, computer languages for safety related systems, reactive systems technology, security and safety related applications. As to its wide international coverage, unique way of combining partici pants from academia, research and industry and topical coverage, SAFECOMP is outstanding among the other related events in the field."

Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6 - 9, 1993.... Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6 - 9, 1993. Selected Papers (Paperback, 1994 ed.)
Andrew Chmora, Stephen B Wicker
R1,409 Discovery Miles 14 090 Ships in 18 - 22 working days

This volume comprises a collection of papers presented at the Workshop on Information Protection, held in Moscow, Russia in December 1993. The 16 thoroughly refereed papers by internationally known scientists selected for this volume offer an exciting perspective on error control coding, cryptology, and speech compression. In the former Soviet Union, research related to information protection was often shielded from the international scientific community. Therefore, the results presented by Russian researchers and engineers at this first international workshop on this topic are of particular interest; their work defines the cutting edge of research in many areas of error control, cryptology, and speech recognition.

Advances in Cryptology - EUROCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Balatonfured,... Advances in Cryptology - EUROCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Balatonfured, Hungary, May 24-28, 1992 Proceedings (Paperback, 1993 ed.)
Rainer A Rueppel
R1,464 Discovery Miles 14 640 Ships in 18 - 22 working days

A series of workshops devoted to modern cryptography began in Santa Barbara,California in 1981 and was followed in 1982 by a European counterpart in Burg Feuerstein, Germany. The series has been maintained with summer meetings in Santa Barbara and spring meetings somewhere in Europe. At the 1983 meeting in Santa Barbara the International Association for Cryptologic Research was launched and it now sponsors all the meetings of the series. This volume presents the proceedings of Eurocrypt '92, held in Hungary. The papers are organized into the following parts: Secret sharing, Hash functions, Block ciphers, Stream ciphers, Public key I, Factoring, Trapdoor primes and moduli (panel report), Public key II, Pseudo-random permutation generators, Complexity theory and cryptography I, Zero-knowledge, Digital knowledge and electronic cash, Complexity theory andcryptography II, Applications, and selected papers from the rump session. Following the tradition of the series, the authors produced full papers after the meeting, in some cases with revisions.

Directions in Safety-Critical Systems - Proceedings of the First Safety-critical Systems Symposium The Watershed Media Centre,... Directions in Safety-Critical Systems - Proceedings of the First Safety-critical Systems Symposium The Watershed Media Centre, Bristol 9-11 February 1993 (Paperback, Softcover reprint of the original 1st ed. 1993)
Felix Redmill, Tom Anderson
R1,415 Discovery Miles 14 150 Ships in 18 - 22 working days

0 e This is the proceedings of the first annual symposium of the Safety-critical Systems Club (The Watershed Media Centre, Bristol, 9-11 February 1993), which provided a forum for exploring and discussing ways of achieving safety in computer systems to be used in safety-critical industrial applications. The book is divided into three parts, which correspond with the themes of the three days of the symposium. The first - "Experience from Around Europe" - brings together information on developments in safety-critical systems outside the UK. The second - "Current" "Research" - consists of papers on large projects within the UK, which involve collaboration between academia and industry, providing techniques and methods to enhance safety. The final part - "Achieving and Evaluating Safety" - explores how methods already in use in other domains may be applied to safety, and examines the relationships between safety and other attributes such as quality and security. The papers identify the current problems and issues of interest in the field of safety-critical software-based systems, and provide valuable up-to-date material for those in both academia and industry. The academic will benefit from information about current research complimentary to his own, and the industrialist will learn of the technologies which will soon be available and where to find them.

Advances in Cryptology - ASIACRYPT '91 - International Conference on the Theory and Application of Cryptology,... Advances in Cryptology - ASIACRYPT '91 - International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991. Proceedings (Paperback, 1993 ed.)
Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto
R1,613 Discovery Miles 16 130 Ships in 18 - 22 working days

This volume contains the proceedings of ASIACRYPT '91, the first international conference on the theory and application of cryptology to be held in the Asian area. It was held at Fujiyoshida, near Mount Fuji in Japan, in November 1991. The conference was modeled after the very successful CRYTO and EUROCRYPT series of conferences sponsored by the International Association for Cryptologic Research (IACR). The IACR and the Institute of Electronics, Information and Communication Engineers were sponsors for ASIACRYPT '91. The papers from the conference were improved and corrected for inclusion in this volume. The papers are grouped into parts on: differential cryptanalysis and DES-like cryptosystems; hashing and signature schemes; secret sharing, threshold, and authenticationcodes; block ciphers - foundations and analysis; cryptanalysis and new ciphers; proof systems and interactive protocols; public key ciphers - foundations and analysis. Also included are four invited lectures and impromptu talks from the rump session.

Information Theory and Applications - Third Canadian Workshop, Rockland, Ontario, Canada, May 30 - June 2, 1993. Proceedings... Information Theory and Applications - Third Canadian Workshop, Rockland, Ontario, Canada, May 30 - June 2, 1993. Proceedings (Paperback, 1994 ed.)
T. Aaron Gulliver, Norman P Secord
R1,555 Discovery Miles 15 550 Ships in 18 - 22 working days

This volume contains a selection of refereed papers from the 1993 Canadian Workshop on Information Theory, held in Rockland, Ontario, May 30 - June 2.
The workshop provided a forum for Canadian and international researchers to gather and discuss new results in the areas of information theory, algebraic coding, digital communications, and networks.
A number of novel approaches to research problems are presented, and seminal works by several renowned experts are included in the volume.
The papers have been loosely grouped into four parts: coding and cryptography, coding and modulation of fading channels, decoding techniques, and networks and information theory.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Pocket Photographer - How to take…
Mike Kus Hardcover R435 R396 Discovery Miles 3 960
Discover Magnets
Tammy Enz Paperback R178 R165 Discovery Miles 1 650
Tectonic Uplift and Climate Change
William F. Ruddiman Hardcover R4,178 Discovery Miles 41 780
Geometric Level Set Methods in Imaging…
Stanley Osher, Nikos Paragios Hardcover R2,760 Discovery Miles 27 600
Productivity with Health, Safety, and…
Lakhwinder Pal Singh, Arvind Bhardwaj, … Hardcover R4,753 Discovery Miles 47 530
Computational Intelligence for Machine…
Rajshree Srivastava, Pradeep Kumar Mallick, … Hardcover R3,875 Discovery Miles 38 750
Black Mirror - Season 4
DVD R380 R264 Discovery Miles 2 640
Vesuvius, Campi Flegrei, and Campanian…
Benedetto De Vivo, Harvey E Belkin, … Paperback R3,524 Discovery Miles 35 240
Sherlock - Season 1-4 - And The…
Benedict Cumberbatch, Martin Freeman DVD  (3)
R613 Discovery Miles 6 130
Earthquake Engineering and Structural…
Agnes Nolan Hardcover R2,968 R2,696 Discovery Miles 26 960

 

Partners