0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (83)
  • R500+ (1,298)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Digital Forensics and Watermarking - 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25-27, 2020,... Digital Forensics and Watermarking - 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Xianfeng Zhao, Yun Qing Shi, Alessandro Piva, Hyoung Joong Kim
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This volume constitutes the proceedings of the 19th International Workshop on Digital Forensics and Watermarking, IWDW 2020, held in Melbourne, VIC, Australia, in November 2020.The 20 full papers in this volume were carefully reviewed and selected from 43 submissions. They cover topics such as: novel research, development and application of digital watermarking and forensics techniques for multimedia security.

Smart Card Research and Advanced Applications - 19th International Conference, CARDIS 2020, Virtual Event, November 18-19,... Smart Card Research and Advanced Applications - 19th International Conference, CARDIS 2020, Virtual Event, November 18-19, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Pierre-Yvan Liardet, Nele Mentens
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lubeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.

Security and Privacy in New Computing Environments - Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August... Security and Privacy in New Computing Environments - Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings (Paperback, 1st ed. 2021)
Ding Wang, Weizhi Meng, Jinguang Han
R1,457 Discovery Miles 14 570 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.

Digital Transformation for a Sustainable Society in the 21st Century - I3E 2019 IFIP WG 6.11 International Workshops,... Digital Transformation for a Sustainable Society in the 21st Century - I3E 2019 IFIP WG 6.11 International Workshops, Trondheim, Norway, September 18-20, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Ilias O. Pappas, Patrick Mikalef, Yogesh K. Dwivedi, Letizia Jaccheri, John Krogstie, …
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes papers from the workshops held at the 18th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2019, which took place in Trondheim, Norway, in September 2019. The 11 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 33 submissions to the following workshops: DTIS: Digital Transformation for an Inclusive Society TPSIE: Trust and Privacy Aspects of Smart Information Environments 3(IT): Innovative Teaching of Introductory Topics in Information Technology CROPS: CROwd-Powered e-Services

Lattice-Based Public-Key Cryptography in Hardware (Paperback, 1st ed. 2020): Sujoy Sinha Roy, Ingrid Verbauwhede Lattice-Based Public-Key Cryptography in Hardware (Paperback, 1st ed. 2020)
Sujoy Sinha Roy, Ingrid Verbauwhede
R1,521 Discovery Miles 15 210 Ships in 18 - 22 working days

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.

Advanced Communication Systems and Information Security - Second International Conference, ACOSIS 2019, Marrakesh, Morocco,... Advanced Communication Systems and Information Security - Second International Conference, ACOSIS 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Mostafa Belkasmi, Jalel Ben-Othman, Cheng Li, Mohamed Essaaidi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes selected papers of the Second International Conference on Advanced Communication Systems and Information Security, ACOSIS 2019, held in Marrakesh, Morocco, in November 2019. The 10 full papers and 10 short papers were thoroughly reviewed and selected from 94 submissions. The papers are organized accroding to the following topical sections: wireless communications and services; vehicular communications; channel coding; construction of error correcting codes; intrusion detection techniques; wireless and mobile network security; applied cryptography.

Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings... Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings (Paperback, 1st ed. 2020)
Jintai Ding, Jean-Pierre Tillich
R3,181 Discovery Miles 31 810 Ships in 18 - 22 working days

This volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography, PQCrypto 2020, held in Paris, France in April 2020. The 29 full papers presented in this volume were carefully reviewed and selected from 86 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.

Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings... Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings (Paperback, 1st ed. 2020)
Robert Krimmer, Melanie Volkamer, Bernhard Beckert, Ralf Kusters, Oksana Kulyk, …
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the 5th International Conference on Electronic Voting, E-Vote-ID 2020, held online -due to COVID -19- in Bregenz, Austria, in October 2020. The 14 full papers presented were carefully reviewed and selected from 55 submissions.The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social or political aspects, amongst others; turning out to be an important global referent in relation to this issue.

Encryption for Organizations and Individuals - Basics of Contemporary and Quantum Cryptography (Paperback, 1st ed.): Robert... Encryption for Organizations and Individuals - Basics of Contemporary and Quantum Cryptography (Paperback, 1st ed.)
Robert Ciesla
R1,495 R1,223 Discovery Miles 12 230 Save R272 (18%) Ships in 18 - 22 working days

Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems. Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. What You Will Learn Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD) Who This Book Is For This book is aimed at readers who have an interest in both well-established and up-and-coming types of cryptography, as well as members of organizations to whom privacy is a top priority.

Fully Homomorphic Encryption in Real World Applications (Paperback, 1st ed. 2019): Ayantika Chatterjee, Khin Mi Mi Aung Fully Homomorphic Encryption in Real World Applications (Paperback, 1st ed. 2019)
Ayantika Chatterjee, Khin Mi Mi Aung
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the 'cloud'. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.

Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops - DECSoS 2020, DepDevOps 2020, USDAI 2020, and WAISE 2020,... Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops - DECSoS 2020, DepDevOps 2020, USDAI 2020, and WAISE 2020, Lisbon, Portugal, September 15, 2020, Proceedings (Paperback, 1st ed. 2020)
Antonio Casimiro, Frank Ortmeier, Erwin Schoitsch, Friedemann Bitsch, Pedro Ferreira
R2,463 Discovery Miles 24 630 Ships in 18 - 22 working days

This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2020, 39th International Conference on Computer Safety, Reliability and Security, Lisbon, Portugal, September 2020. The 26 regular papers included in this volume were carefully reviewed and selected from 45 submissions; the book also contains one invited paper. The workshops included in this volume are: DECSoS 2020: 15th Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems. DepDevOps 2020: First International Workshop on Dependable Development-Operation Continuum Methods for Dependable Cyber-Physical Systems. USDAI 2020: First International Workshop on Underpinnings for Safe Distributed AI. WAISE 2020: Third International Workshop on Artificial Intelligence Safety Engineering. The workshops were held virtually due to the COVID-19 pandemic.

Financial Cryptography and Data Security - 24th International Conference, FC 2020 , Kota Kinabalu, Malaysia, February 10-14,... Financial Cryptography and Data Security - 24th International Conference, FC 2020 , Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers (Paperback, 1st ed. 2020)
Joseph Bonneau, Nadia Heninger
R2,762 Discovery Miles 27 620 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Conference on Financial Cryptography and Data Security, FC 2020, held in Kota Kinabalu, Malaysia, in February 2020. The 34 revised full papers and 2 short papers were carefully selected and reviewed from 162 submissions. The papers are grouped in the following topical sections: attacks; consensus; cryptoeconomics; layer 2; secure computation; privacy; crypto foundations; empirical studies; and smart contracts.

Data and Applications Security and Privacy XXXIV - 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June... Data and Applications Security and Privacy XXXIV - 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings (Paperback, 1st ed. 2020)
Anoop Singhal, Jaideep Vaidya
R1,440 Discovery Miles 14 400 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.* The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy. *The conference was held virtually due to the COVID-19 pandemic.

Essential PHP Security (Paperback): Chris Shiflett Essential PHP Security (Paperback)
Chris Shiflett
R643 R572 Discovery Miles 5 720 Save R71 (11%) Ships in 18 - 22 working days

Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks. Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book. In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks. Topics covered include: * Preventing cross-site scripting (XSS) vulnerabilities * Protecting against SQL injection attacks * Complicating session hijacking attempts You are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.

Security and Usability (Paperback): Lorrie Cranor Security and Usability (Paperback)
Lorrie Cranor; Contributions by Simson Garfinkel
R1,375 Discovery Miles 13 750 Ships in 18 - 22 working days

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users.

Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless.

There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. "Security & Usability" is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer

interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research.

"Security & Usability" groups 34 essays into six parts:

Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic.

Authentication Mechanisms-- techniques for identifying and authenticating computer users.

Secure Systems--how system software can deliver or destroy a secure user experience.

Privacy and Anonymity Systems--methods for allowing people to control the release of personal information.

Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,

IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability.

The Classics--groundbreaking papers that sparked the field of security and usability.

This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

Cryptography for Dummies (Paperback, 1st ed): C Cobb Cryptography for Dummies (Paperback, 1st ed)
C Cobb
R896 R775 Discovery Miles 7 750 Save R121 (14%) Ships in 18 - 22 working days

  • Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking
  • This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations
  • Discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards
  • Based entirely on real-world issues and situations, the material provides instructions for already available technologies that readers can put to work immediately
  • Expert author Chey Cobb is retired from the NRO, where she held a Top Secret security clearance, instructed employees of the CIA and NSA on computer security and helped develop the computer security policies used by all U.S. intelligence agencies
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II (Paperback, 1st ed. 2019)
Dongdai Lin, Kazue Sako
R2,536 Discovery Miles 25 360 Ships in 18 - 22 working days

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.

Understanding and Applying Cryptography and Data Security (Paperback): Adam J. Elbirt Understanding and Applying Cryptography and Data Security (Paperback)
Adam J. Elbirt
R1,921 Discovery Miles 19 210 Ships in 10 - 15 working days

A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author's teaching notes and research publications, the text is designed for electrical engineering and computer science courses. Provides the Foundation for Constructing Cryptographic Protocols The first several chapters present various types of symmetric-key cryptographic algorithms. These chapters examine basic substitution ciphers, cryptanalysis, the Data Encryption Standard (DES), and the Advanced Encryption Standard (AES). Subsequent chapters on public-key cryptographic algorithms cover the underlying mathematics behind the computation of inverses, the use of fast exponentiation techniques, tradeoffs between public- and symmetric-key algorithms, and the minimum key lengths necessary to maintain acceptable levels of security. The final chapters present the components needed for the creation of cryptographic protocols and investigate different security services and their impact on the construction of cryptographic protocols. Offers Implementation Comparisons By examining tradeoffs between code size, hardware logic resource requirements, memory usage, speed and throughput, power consumption, and more, this textbook provides students with a feel for what they may encounter in actual job situations. A solutions manual is available to qualified instructors with course adoptions.

Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March... Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings (Paperback, 1st ed. 2019)
Mitsuru Matsui
R1,488 Discovery Miles 14 880 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2019, CT-RSA 2019, held in San Francisco, CA, USA, in March 2019. The 28 papers presented in this volume were carefully reviewed and selected from 75 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto- graphic protocols to primitives and their implementation security.

Introduction to Security Reduction (Paperback, Softcover reprint of the original 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Paperback, Softcover reprint of the original 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R4,238 Discovery Miles 42 380 Ships in 18 - 22 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

CYBERSECURITY and HACKING for Beginners - The Essential Guide to Mastering Computer Network Security and Learning all the... CYBERSECURITY and HACKING for Beginners - The Essential Guide to Mastering Computer Network Security and Learning all the Defensive Actions to Protect Yourself from Network Dangers, Including the Basics of Kali Linux (Paperback)
Robert M Huss
R433 R399 Discovery Miles 3 990 Save R34 (8%) Ships in 18 - 22 working days
Cellular Automata - 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy,... Cellular Automata - 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17-21, 2018, Proceedings (Paperback, 1st ed. 2018)
Giancarlo Mauri, Samira El Yacoubi, Alberto Dennunzio, Katsuhiro Nishinari, Luca Manzoni
R1,475 Discovery Miles 14 750 Ships in 18 - 22 working days

This book constitutes the proceedings of the 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, held in Como, Italy, in September 2018. The 47 full papers presented in this volume were carefully reviewed and selected from 64 submissions.This volume contains invited contributions and accepted papers from the main track and from the three organized workshops. The volume is organized in the following topics: biological systems modeling; simulation and other applications of CA; multi-agent systems; pedestrian and traffic dynamics; synchronization and control; theory and cryptography; asynchronous cellular automata; and crowds, traffic and cellular automata.

Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Hovav Shacham, Alexandra Boldyreva
R2,802 Discovery Miles 28 020 Ships in 18 - 22 working days

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22,... Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings (Paperback, 1st ed. 2018)
Itai Dinur, Shlomi Dolev, Sachin Lodha
R1,409 Discovery Miles 14 090 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.

Cryptology Transmitted Message Protection - From Deterministic Chaos up to Optical Vortices (Paperback, Softcover reprint of... Cryptology Transmitted Message Protection - From Deterministic Chaos up to Optical Vortices (Paperback, Softcover reprint of the original 1st ed. 2016)
Igor Izmailov, Boris Poizner, Ilia Romanov, Sergey Smolskiy
R3,642 Discovery Miles 36 420 Ships in 18 - 22 working days

This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, with nonlinearity playing a key "evolving" role. The proposed solutions allow the universal phenomenon of deterministic chaos to be discussed in the context of information security problems on the basis of examples of both electronic and optical systems. Further, the book presents the vortex detector and communication systems and describes mathematical models of the chaos oscillator as a coder in the synchronous chaotic communication and appropriate decoders, demonstrating their efficiency both analytically and experimentally. Lastly it discusses the cryptologic features of analyzed systems and suggests a series of new structures for confident communication.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ethical Hacking - The Ultimate Guide to…
Lester Evans Hardcover R664 R593 Discovery Miles 5 930
Hardware Accelerator Systems for…
Shiho Kim, Ganesh Chandra Deka Hardcover R3,950 Discovery Miles 39 500
Developer Marketing Does Not Exist - The…
Adam Duvander Hardcover R609 Discovery Miles 6 090
14 Habits of Highly Productive…
Zeno Rocha Hardcover R457 R427 Discovery Miles 4 270
Internet of Things
S. Ananda Murugan Hardcover R1,237 Discovery Miles 12 370
Lean Analytics - How to Use Data to…
Greg Caldwell Hardcover R602 R541 Discovery Miles 5 410
Research Anthology on Architectures…
Information R Management Association Hardcover R12,639 Discovery Miles 126 390
Research Anthology on Architectures…
Information R Management Association Hardcover R12,633 Discovery Miles 126 330
Handbook of Research on Innovations in…
Vincente Garcia Diaz Hardcover R7,721 Discovery Miles 77 210
Software Engineering: Principles and…
Tom Halt Hardcover R3,292 R2,982 Discovery Miles 29 820

 

Partners