0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (85)
  • R500+ (1,288)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017,... Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings (Paperback, 1st ed. 2017)
Wieland Fischer, Naofumi Homma
R2,774 Discovery Miles 27 740 Ships in 18 - 22 working days

This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The 33 full papers presented in this volume were carefully reviewed and selected from 130 submissions. The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations. The workshop builds a valuable bridge between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations.

Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017,... Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings (Paperback, 1st ed. 2017)
Junji Shikata
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I... Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Yael Kalai, Leonid Reyzin
R2,792 Discovery Miles 27 920 Ships in 18 - 22 working days

The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24,... Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
R2,776 Discovery Miles 27 760 Ships in 18 - 22 working days

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Digital Forensics and Watermarking - 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017,... Digital Forensics and Watermarking - 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings (Paperback, 1st ed. 2017)
Christian Kraetzer, Yun Qing Shi, Jana Dittmann, Hyoung Joong Kim
R2,513 Discovery Miles 25 130 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches.

Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016,... Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Joseph K. Liu, Ron Steinfeld
R2,851 Discovery Miles 28 510 Ships in 18 - 22 working days

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random/One-Way Function.

Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24,... Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
R2,771 Discovery Miles 27 710 Ships in 18 - 22 working days

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017,... Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings (Paperback, 1st ed. 2017)
Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi
R1,524 Discovery Miles 15 240 Ships in 18 - 22 working days

This book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017. The 34 papers presented in this volume were carefully reviewed and selected from 149 submissions. The topics focus on innovative research and current developments that advance the areas of applied cryptography, security analysis, cyber security and privacy, data and server security.

Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings... Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings (Paperback, 1st ed. 2017)
Eric Bodden, Mathias Payer, Elias Athanasopoulos
R2,026 Discovery Miles 20 260 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, held in Bonn, Germany in July 2017. The 12 full papers presented together with 3 short papers were carefully reviewed and selected from 32 submissions. The goal of this symposium is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering.

Cyber Security Cryptography and Machine Learning - First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30,... Cyber Security Cryptography and Machine Learning - First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings (Paperback, 1st ed. 2017)
Shlomi Dolev, Sachin Lodha
R2,546 Discovery Miles 25 460 Ships in 18 - 22 working days

This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.

Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015,... Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Jan Camenisch, Dogan Kesdogan
R1,719 Discovery Miles 17 190 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2015, held in Zurich, Switzerland, in October 2015. iNetSec is the main workshop of the IFIP working group WG 11.4; its objective is to present and discuss open problems and new research directions on all aspects related to network security. The 9 revised full papers presented in this volume were carefully reviewed and selected from 13 submissions. They were organized in topical sections named: network security; intrusion detection; anonymous communication; and cryptography.

Handbook of Applied Cryptography (Hardcover, New): Alfred J. Menezes, Paul C.Van Oorschot, Scott A. Vanstone Handbook of Applied Cryptography (Hardcover, New)
Alfred J. Menezes, Paul C.Van Oorschot, Scott A. Vanstone; Series edited by Kenneth H Rosen
R4,994 Discovery Miles 49 940 Ships in 10 - 15 working days

Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.
The Handbook of Applied Cryptography provides a treatment that is multifunctional:

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R2,503 Discovery Miles 25 030 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015,... Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings (Paperback, 1st ed. 2016)
Frank Stajano, Stig F. Mjolsnes, Graeme Jenkinson, Per Thorsheim
R1,578 Discovery Miles 15 780 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conferenceproceedings of the 9th International Conference on Passwords, PASSWORDS2015, held in Cambridge, UK, in December 2015. The 6 revised full papers presented together with 3 revised short paperswere carefully reviewed and selected from 32 initial submissions. Thepapers are organized in topical sections on human factors, attacks, and cryptography.

Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016,... Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Kerstin Lemke-Rust, Michael Tunstall
R2,100 Discovery Miles 21 000 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Smart Card Research and Advanced Applications, CARDIS 2016, held in Cannes, France, in November 2016. The 15 revised full papers presented in this book were carefully reviewed and selected from 29 submissions. The focus of the conference was on all aspects of the design, development, deployment, validation, and application of smart cards or smart personal devices.

Arithmetic of Finite Fields - 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers... Arithmetic of Finite Fields - 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Sylvain Duquesne, Svetla Petkova-Nikova
R2,132 Discovery Miles 21 320 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on the Arithmetic of Finite Field, WAIFI 2016, held in Ghent, Belgium, in July 2016. The 14 revised full papers and 3 invited talks presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on invited talks; elliptic curves; applications; irreducible polynomials; applications to cryptography; Boolean functions; cryptography; cryptography and Boolean functions.

Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017,... Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet (Paperback, 1st ed. 2017)
Said El Hajji, Abderrahmane Nitaj, El Mamoun Souidi
R2,407 Discovery Miles 24 070 Ships in 18 - 22 working days

This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017. The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 72 submissions. The first aim of this conference is to pay homage to Claude Carlet for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography worldwide, especially in Africa. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.

Lightweight Cryptography for Security and Privacy - 5th International Workshop, LightSec 2016, Aksaray, Turkey, September... Lightweight Cryptography for Security and Privacy - 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Andrey Bogdanov
R1,783 Discovery Miles 17 830 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016.The 9 full papers presented were carefully reviewed and selected from 18 submissions. The papers are organized in the following topical sections: cryptanalysis, lightweight designs, implementation challenges.

Secure and Privacy-Preserving Data Communication in Internet of Things (Paperback, 1st ed. 2017): Liehuang Zhu, Zijian Zhang,... Secure and Privacy-Preserving Data Communication in Internet of Things (Paperback, 1st ed. 2017)
Liehuang Zhu, Zijian Zhang, Chang Xu
R1,706 Discovery Miles 17 060 Ships in 18 - 22 working days

This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader's horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Jean-Sebastien Coron, Jesper Buus Nielsen
R2,772 Discovery Miles 27 720 Ships in 18 - 22 working days

The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.

Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Jean-Sebastien Coron, Jesper Buus Nielsen
R4,134 Discovery Miles 41 340 Ships in 18 - 22 working days

The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.

Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Jean-Sebastien Coron, Jesper Buus Nielsen
R2,536 Discovery Miles 25 360 Ships in 18 - 22 working days

The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.

Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II (Paperback, 1st ed. 2015)
Tetsu Iwata, Jung Hee Cheon
R1,551 Discovery Miles 15 510 Ships in 18 - 22 working days

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.

Computer Security and Encryption - An Introduction (Paperback): S. R. Chauhan, S. Jangra Computer Security and Encryption - An Introduction (Paperback)
S. R. Chauhan, S. Jangra
R1,325 R1,098 Discovery Miles 10 980 Save R227 (17%) Ships in 18 - 22 working days

Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based. The book is designed to meet the needs of beginners as well as more advanced readers. Features: Covers the major components of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices used in the design of networks and systems Includes a discussion of emerging technologies such as Big Data Analytics, cloud computing, Internet of Things (IoT), Smart Grid, SCADA, control systems, and Wireless Sensor Networks (WSN)

Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015,... Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Paperback, 1st ed. 2015)
Michael Reiter, David Naccache
R2,068 Discovery Miles 20 680 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,483 Discovery Miles 34 830
Data Hiding Fundamentals and…
Husrev T. Sencar, Mahalingam Ramkumar, … Hardcover R1,644 Discovery Miles 16 440
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Conflicts, Crimes and Regulations in…
SY Laurent Hardcover R3,743 Discovery Miles 37 430
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,170 Discovery Miles 61 700
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
Information Security and Ethics - Social…
Marian Quigley Hardcover R2,140 Discovery Miles 21 400
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Advances in Enterprise Information…
Hardcover R4,239 Discovery Miles 42 390

 

Partners