0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (86)
  • R500+ (1,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Fully Homomorphic Encryption in Real World Applications (Paperback, 1st ed. 2019): Ayantika Chatterjee, Khin Mi Mi Aung Fully Homomorphic Encryption in Real World Applications (Paperback, 1st ed. 2019)
Ayantika Chatterjee, Khin Mi Mi Aung
R4,348 Discovery Miles 43 480 Ships in 10 - 15 working days

This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the 'cloud'. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.

Advanced Communication Systems and Information Security - Second International Conference, ACOSIS 2019, Marrakesh, Morocco,... Advanced Communication Systems and Information Security - Second International Conference, ACOSIS 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Mostafa Belkasmi, Jalel Ben-Othman, Cheng Li, Mohamed Essaaidi
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes selected papers of the Second International Conference on Advanced Communication Systems and Information Security, ACOSIS 2019, held in Marrakesh, Morocco, in November 2019. The 10 full papers and 10 short papers were thoroughly reviewed and selected from 94 submissions. The papers are organized accroding to the following topical sections: wireless communications and services; vehicular communications; channel coding; construction of error correcting codes; intrusion detection techniques; wireless and mobile network security; applied cryptography.

Metaverse Investing & Marketing Book - Guide to Web 3.0, Non-Fungible Tokens (NFTs) Virtual Real Estate, Games, Development and... Metaverse Investing & Marketing Book - Guide to Web 3.0, Non-Fungible Tokens (NFTs) Virtual Real Estate, Games, Development and Future of the metaverse. (Paperback)
Doran Pauley
R614 Discovery Miles 6 140 Ships in 10 - 15 working days
Nft for Beginners - Learn the Basics of Investing in Digital Crypto Art and Collectibles to Make a Profit (2022 Guide for... Nft for Beginners - Learn the Basics of Investing in Digital Crypto Art and Collectibles to Make a Profit (2022 Guide for Newbies) (Paperback)
Shaun Badman
R605 R543 Discovery Miles 5 430 Save R62 (10%) Ships in 10 - 15 working days
Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings... Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings (Paperback, 1st ed. 2020)
Jintai Ding, Jean-Pierre Tillich
R3,447 Discovery Miles 34 470 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography, PQCrypto 2020, held in Paris, France in April 2020. The 29 full papers presented in this volume were carefully reviewed and selected from 86 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.

Decentralized Applications (Paperback): Siraj Raval Decentralized Applications (Paperback)
Siraj Raval
R1,038 R695 Discovery Miles 6 950 Save R343 (33%) Ships in 12 - 19 working days

Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. In this practical guide, author Siraj Raval explains why dapps will become more widely used-and profitable-than today's most popular web apps. You'll learn how the blockchain's cryptographically stored ledger, scarce-asset model, and peer-to-peer (P2P) technology provide a more flexible, better-incentivized structure than current software models. Once you understand the theory behind dapps and what a thriving dapp ecosystem looks like, Raval shows you how to use existing tools to create a working dapp. You'll then take a deep dive into the OpenBazaar decentralized market, and examine two case studies of successful dapps currently in use. Learn advances in distributed-system technology that make distributed data, wealth, identity, computing, and bandwidth possible Build a Twitter clone with the Go language, distributed architecture, decentralized messaging app, and peer-to-peer data store Learn about OpenBazaar's decentralized market and its structure for supporting transactions Explore Lighthouse, a decentralized crowdfunding project that rivals sites such as Kickstarter and IndieGogo Take an in-depth look at La'Zooz, a P2P ridesharing app that transmits data directly between riders and drivers

Metaverse Mastery - Understand and Profit from Virtual Worlds and Land, NFTs, Web3, Blockchain, VR, Gaming, A.I, Art &... Metaverse Mastery - Understand and Profit from Virtual Worlds and Land, NFTs, Web3, Blockchain, VR, Gaming, A.I, Art & Cryptocurrencies (Paperback)
Cameron Belford
R324 Discovery Miles 3 240 Ships in 10 - 15 working days
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II (Paperback, 1st ed. 2019)
Dongdai Lin, Kazue Sako
R2,746 Discovery Miles 27 460 Ships in 10 - 15 working days

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.

Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March... Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings (Paperback, 1st ed. 2019)
Mitsuru Matsui
R1,608 Discovery Miles 16 080 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2019, CT-RSA 2019, held in San Francisco, CA, USA, in March 2019. The 28 papers presented in this volume were carefully reviewed and selected from 75 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto- graphic protocols to primitives and their implementation security.

CYBERSECURITY and HACKING for Beginners - The Essential Guide to Mastering Computer Network Security and Learning all the... CYBERSECURITY and HACKING for Beginners - The Essential Guide to Mastering Computer Network Security and Learning all the Defensive Actions to Protect Yourself from Network Dangers, Including the Basics of Kali Linux (Paperback)
Robert M Huss
R470 R433 Discovery Miles 4 330 Save R37 (8%) Ships in 10 - 15 working days
Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency... Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Best Defi Projects and Strategies to Maximize Your Profits (Paperback)
Harper Fraley
R622 R555 Discovery Miles 5 550 Save R67 (11%) Ships in 10 - 15 working days
Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R2,658 Discovery Miles 26 580 Ships in 12 - 19 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

NFT (Non-Fungible Token) For Beginners - THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like... NFT (Non-Fungible Token) For Beginners - THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like Ethereum, BSC, And Flow (Paperback)
Megalodona Streamings
R428 R396 Discovery Miles 3 960 Save R32 (7%) Ships in 10 - 15 working days
Cryptocurrency Trading - A Crypto Investing Guide for Beginners - BITCOIN, ETHEREUM, LITECOIN (Paperback): Megalodona Streamings Cryptocurrency Trading - A Crypto Investing Guide for Beginners - BITCOIN, ETHEREUM, LITECOIN (Paperback)
Megalodona Streamings
R371 R341 Discovery Miles 3 410 Save R30 (8%) Ships in 10 - 15 working days
Understanding and Applying Cryptography and Data Security (Paperback): Adam J. Elbirt Understanding and Applying Cryptography and Data Security (Paperback)
Adam J. Elbirt
R1,948 Discovery Miles 19 480 Ships in 12 - 19 working days

A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author's teaching notes and research publications, the text is designed for electrical engineering and computer science courses. Provides the Foundation for Constructing Cryptographic Protocols The first several chapters present various types of symmetric-key cryptographic algorithms. These chapters examine basic substitution ciphers, cryptanalysis, the Data Encryption Standard (DES), and the Advanced Encryption Standard (AES). Subsequent chapters on public-key cryptographic algorithms cover the underlying mathematics behind the computation of inverses, the use of fast exponentiation techniques, tradeoffs between public- and symmetric-key algorithms, and the minimum key lengths necessary to maintain acceptable levels of security. The final chapters present the components needed for the creation of cryptographic protocols and investigate different security services and their impact on the construction of cryptographic protocols. Offers Implementation Comparisons By examining tradeoffs between code size, hardware logic resource requirements, memory usage, speed and throughput, power consumption, and more, this textbook provides students with a feel for what they may encounter in actual job situations. A solutions manual is available to qualified instructors with course adoptions.

Security and Usability (Paperback): Lorrie Cranor Security and Usability (Paperback)
Lorrie Cranor; Contributions by Simson Garfinkel
R1,486 Discovery Miles 14 860 Ships in 10 - 15 working days

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users.

Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless.

There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. "Security & Usability" is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer

interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research.

"Security & Usability" groups 34 essays into six parts:

Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic.

Authentication Mechanisms-- techniques for identifying and authenticating computer users.

Secure Systems--how system software can deliver or destroy a secure user experience.

Privacy and Anonymity Systems--methods for allowing people to control the release of personal information.

Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,

IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability.

The Classics--groundbreaking papers that sparked the field of security and usability.

This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

The Crypto Kid (Paperback): Jackson Shembekar The Crypto Kid (Paperback)
Jackson Shembekar
R351 R323 Discovery Miles 3 230 Save R28 (8%) Ships in 10 - 15 working days
Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018,... Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings (Paperback, 1st ed. 2018)
Junfeng Fan, Benedikt Gierlichs
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, held in Singapore, in April 2018.The 14 papers presented in this volume were carefully reviewed and selected from 31 submissions. They were organized in topical sections named: countermeasures against side-channel attacks; tools for side-channel analysis; fault attacks and hardware trojans; and side-channel analysis attacks.

Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised... Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Carlisle Adams, Jan Camenisch
R1,573 Discovery Miles 15 730 Ships in 10 - 15 working days

This book contains revised selected papers from the 24th International Conference on Selected Areas in Cryptography, SAC 2017, held in Ottawa, ON, Canada in August 2017. The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. The focus of the conference was on specific themes in the area of cryptographic system design and analysis such as: Design and analysis of symmetric key cryptosystems Primitives for symmetric key cryptography, including block and stream ciphers, hash functions, and MAC algorithms Efficient implementations of symmetric and public key algorithms

Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta,... Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, …
R3,364 Discovery Miles 33 640 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017.The 39 full papers presented were carefully reviewed and selected from 96 submissions. They feature the outcome of the 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, the 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, the Second Workshop on Secure Voting Systems, VOTING 2017, the First Workshop on Trusted Smart Contracts, WTSC 2017, and the First Workshop on Targeted Attacks, TA 2017.The papers are grouped in topical sections named: encrypted computing and applied homomorphic cryptography; bitcoin and blockchain research; advances in secure electronic voting schemes; trusted smart contracts; targeted attacks.

Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016,... Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Roberto Avanzi, Howard Heys
R3,181 Discovery Miles 31 810 Ships in 10 - 15 working days

This book contains revised selected papers from the 23rd International Conference on Selected Areas in Cryptography, SAC 2016, held in St. John's, NL, Canada in August 2016. The 28 full papers and 2 invited papers presented in this volume were carefully reviewed and selected from 100 submissions. They are organized in the following topical sections: side channels and fault attacks; design and implementation of symmetric cryptography; efficient symmetric primitives; cryptanalysis of symmetric primitives; MACs and PRNGs; lattice-based cryptography; and cryptanalysis of asymmetric primitives.

Learn How to Earn With Cryptocurrency Trading (Paperback): Donald Keyn Learn How to Earn With Cryptocurrency Trading (Paperback)
Donald Keyn
R682 R598 Discovery Miles 5 980 Save R84 (12%) Ships in 10 - 15 working days
Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings... Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings (Paperback, 1st ed. 2017)
Tatsuaki Okamoto, Yong Yu, Man-Ho Au, Yannan Li
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols.

Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and... Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Tsuyoshi Takagi, Thomas Peyrin
R2,882 Discovery Miles 28 820 Ships in 10 - 15 working days

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part... Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Yael Kalai, Leonid Reyzin
R1,668 Discovery Miles 16 680 Ships in 10 - 15 working days

The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,692 Discovery Miles 66 920
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,573 Discovery Miles 35 730
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,692 Discovery Miles 66 920
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
TLS Mastery
Michael W Lucas Hardcover R970 R875 Discovery Miles 8 750
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,221 Discovery Miles 12 210
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R3,117 Discovery Miles 31 170
Alice and Bob Learn Application Security
T Janca Paperback R1,084 R924 Discovery Miles 9 240
Cryptographic Solutions for Secure…
Kannan Balasubramanian, K. Mala, … Hardcover R5,505 Discovery Miles 55 050
Information Security and Ethics - Social…
Marian Quigley Hardcover R2,316 Discovery Miles 23 160

 

Partners