0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (124)
  • R250 - R500 (454)
  • R500+ (1,355)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Connecting With Consumers - Marketing For New Marketplace Realities (Paperback, New): Allan J. Kimmel Connecting With Consumers - Marketing For New Marketplace Realities (Paperback, New)
Allan J. Kimmel
R1,949 Discovery Miles 19 490 Ships in 10 - 15 working days

These are exciting times for business managers and marketing professionals, yet the challenges imposed by ongoing social and technological developments are daunting. In an age in which marketers can reach their audiences with greater facility than ever before, firms have never been less in control of their customer targets.
This increasing connectedness of consumers provides a range of unique and promising opportunities for product and brand managers. Connecting With Consumers describes the various strategies and techniques that can be utilized to harness consumer influence. The book traces evolving developments in the consumer marketplace, considers their impact on the potential reshaping of the marketing profession, and describes the emerging set of tools that can enable marketers to respond to new marketplace realities. It provides, clear, up-to-date coverage of a number of topics currently on the minds of many: Web 2.0, word of mouth, buzz, the social web, social media metrics, customer engagement, viral and guerrilla marketing.
The book critically assesses emerging marketing strategies and tools within the context of research and theory, and provides numerous applied examples to illustrate marketing successes and common pitfalls to avoid. It argues throughout for a more collaborative relationship between companies and consumers towards their mutual benefit. Although the balance of power has shifted to the consumer for each of the various aspects of the marketing process, collaboration is what the future of marketing likely will be all about. Marketers can avoid irrelevance in the face of change, but this will require a clear commitment to connecting with consumers rather than searching for ways to regain control over them.
The book challenges marketers to make a choice: embrace the ongoing changes as opportunities for reshaping relationships with consumers, or cling to the past at the risk of becoming irrelevant. This is the book for those who choose the first alternative.

Designing Local e-Government - The Pillars of Organizational Structure (Paperback): Israel Patino Galvan Designing Local e-Government - The Pillars of Organizational Structure (Paperback)
Israel Patino Galvan
R1,652 Discovery Miles 16 520 Ships in 18 - 22 working days

In the age of digitalization, even the way we govern is adapting. Recently, with the successful implementation of e-governments, the way our systems are organized has changed. Here, Israel Patino Galvan suggests a specialized design structure as an alternative to the new, digital governments that are becoming increasingly more common. Through a thorough exploration of the history of these structures, and through field research in Mexico, serious deficiencies have been identified in the ways in which these e-governments have been implemented. Instead, Galvan offers a tri-phase solution to designing local governments, placing the direction and division of Information Technologies at the core to support the modernization and optimization process. For researchers and practitioners in public administration, information technologies, or information systems, this is a vital text providing a detailed case study as support for a new organizational system.

The Creator Revolution - How Today's Creative Talents Are Shaping Our Tomorrow (Paperback): Catherine Yeo The Creator Revolution - How Today's Creative Talents Are Shaping Our Tomorrow (Paperback)
Catherine Yeo
R374 R352 Discovery Miles 3 520 Save R22 (6%) Ships in 18 - 22 working days
Ein Recht Auf Vergessen Im Internet (German, Paperback): Livia Wagner Ein Recht Auf Vergessen Im Internet (German, Paperback)
Livia Wagner
R1,772 Discovery Miles 17 720 Ships in 10 - 15 working days

"Das Internet vergisst nicht." - Mit diesem Satz warnen Datenschutzrechtler vor der Permanenz online veroeffentlichter persoenlicher Informationen. Den Wunsch, das Internet das "Vergessen" zu lehren haben viele Personen im Laufe ihres Lebens. Seit dem 25. Mai 2018 gilt europaweit die Datenschutz-Grundverordnung, die in ihrem Artikel 17 das "Recht auf Loeschung" normiert. Die vorliegende Arbeit, die im privaten Datenschutzrecht mit internetrechtlicher Pragung angesiedelt ist, diskutiert das "Recht auf Vergessen" nach alter und neuer Rechtslage insbesondere im Falle selbst online gestellter Daten, im Falle identifizierender Berichte in journalistischen Online-Archiven sowie bei Direktanspruchen auf Loeschung gegenuber Internetsuchmaschinen wie Google.

Super-sticky WeChat and Chinese Society (Paperback): Yujie Chen, Zhifei Mao, Jack Qiu Super-sticky WeChat and Chinese Society (Paperback)
Yujie Chen, Zhifei Mao, Jack Qiu
R1,654 Discovery Miles 16 540 Ships in 18 - 22 working days

App designers dream of creating a platform that users never want to leave, that keeps them glued forever - a platform that is "sticky". Over 846 million WeChat users leave text and voice messages, share life moments, play games, use stickers, purchase rail and flight tickets, shop online, pay utilities and bills, transfer money to friends, and even donate to charity without leaving WeChat, the super-sticky platform. The Economist called WeChat "one app to rule them all", and as it starts to gain global appeal, it is rewriting the rules for social media platforms. This book provides a balanced and nuanced study of how the super-sticky WeChat platform interweaves into the fabric of Chinese social, cultural, and political life. It keeps the wider global and national social media landscape in view and compares and contrasts WeChat with Weibo and QQ, two other popular social media platforms in China, and other Western social media platforms.

Commercial and Industrial Internet of Things Applications with the Raspberry Pi - Prototyping IoT Solutions (Paperback, 1st... Commercial and Industrial Internet of Things Applications with the Raspberry Pi - Prototyping IoT Solutions (Paperback, 1st ed.)
Ioana Culic, Alexandru Radovici, Cristian Rusu
R993 R846 Discovery Miles 8 460 Save R147 (15%) Ships in 18 - 22 working days

Use the Raspberry Pi and modern computing techniques to build industrial Internet of Things systems. Principles and theoretical aspects of IoT technologies combine with hands-on projects leading to detailed descriptions of several industrial IoT applications. This book presents real-life IoT applications based on the Raspberry Pi, beyond the relatively simplistic demos built for educational purposes or hobbyists. You'll make the transition from tinkering with a couple of sensors and simple devices to building fully developed products for commercial use and industrial systems. You'll also work with sensors and actuators, web technologies used for communications in IoT networks, and the large-scale deployment of IoT software solutions. And see how to design these systems as well as maintain them long term. See the Raspberry Pi in a new light that highlights the true industrial potential of the device. Move beyond connecting an LED to the Raspberry Pi and making it blink to actually managing a network of IoT devices. What You'll Learn Design industrial and large scale professional Internet of Things systems Extend your basic IoT knowledge by building advanced products Learn how large scale IoT systems are deployed and maintained Who This Book Is For Advanced hobbyists who want to stretch their abilities into the professional sector. Also professional industrial engineers looking for low-cost solutions to basic IoT needs.

Designing for a Digital and Globalized World - 13th International Conference, DESRIST 2018, Chennai, India, June 3-6, 2018,... Designing for a Digital and Globalized World - 13th International Conference, DESRIST 2018, Chennai, India, June 3-6, 2018, Proceedings (Paperback, 1st ed. 2018)
Samir Chatterjee, Kaushik Dutta, Rangaraja P Sundarraj
R2,407 Discovery Miles 24 070 Ships in 18 - 22 working days

This book constitutes the proceedings of the 13th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2018, held in June 2018 in Chennai, India. The 24 full papers presented in this volume were carefully reviewed and selected from 96 papers. The contributions are organized in topical sections named: HCI and Design, Design Foundations, Design Foundations, Design in Healthcare, Advances in Data Science and Analytics, ICT for Development, Designing Cybersecurity, and Design Applications.

Turning Your Business Into A Success Monster - The LinkedIn B2B Lead Generation Revolution (Paperback): Chris Harasty Turning Your Business Into A Success Monster - The LinkedIn B2B Lead Generation Revolution (Paperback)
Chris Harasty
R440 R407 Discovery Miles 4 070 Save R33 (7%) Ships in 18 - 22 working days
Big Data in Context - Legal, Social and Technological Insights (Paperback, 1st ed. 2018): Thomas Hoeren, Barbara Kolany-Raiser Big Data in Context - Legal, Social and Technological Insights (Paperback, 1st ed. 2018)
Thomas Hoeren, Barbara Kolany-Raiser
R1,030 Discovery Miles 10 300 Ships in 18 - 22 working days

This book is open access under a CC BY 4.0 license. This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, sociological and economic approaches to fundamental big data topics such as privacy, data quality and the ECJ's Safe Harbor decision on the one hand, and practical applications such as smart cars, wearables and web tracking on the other. Addressing the interests of researchers and practitioners alike, it provides a comprehensive overview of and introduction to the emerging challenges regarding big data.All contributions are based on papers submitted in connection with ABIDA (Assessing Big Data), an interdisciplinary research project exploring the societal aspects of big data and funded by the German Federal Ministry of Education and Research.This volume was produced as a part of the ABIDA project (Assessing Big Data, 01IS15016A-F). ABIDA is a four-year collaborative project funded by the Federal Ministry of Education and Research. However the views and opinions expressed in this book reflect only the authors' point of view and not necessarily those of all members of the ABIDA project or the Federal Ministry of Education and Research.

Chasing Likes - The Unflattering Reality of Being an Influencer (Paperback): Carlee Krtolica Chasing Likes - The Unflattering Reality of Being an Influencer (Paperback)
Carlee Krtolica
R384 Discovery Miles 3 840 Ships in 18 - 22 working days
Maximizing Content Promotion, Podcasting and Advocacy - The Explained! Pocketbook (Paperback): Steven Christianson Maximizing Content Promotion, Podcasting and Advocacy - The Explained! Pocketbook (Paperback)
Steven Christianson
R391 Discovery Miles 3 910 Ships in 18 - 22 working days
Best Practices for Transportation Agency Use of Social Media (Hardcover, New): Susan Bregman, Kari Edison Watkins Best Practices for Transportation Agency Use of Social Media (Hardcover, New)
Susan Bregman, Kari Edison Watkins
R2,155 Discovery Miles 21 550 Ships in 10 - 15 working days

Timely updates, increased citizen engagement, and more effective marketing are just a few of the reasons transportation agencies have already started to adopt social media networking tools. Best Practices for Transportation Agency Use of Social Media offers real-world advice for planning and implementing social media from leading government practitioners, academic researchers, and industry experts. The book provides an overview of the various social media platforms and tools, with examples of how transportation organizations use each platform. It contains a series of interviews that illustrate what creative agencies are doing to improve service, provide real-time updates, garner valuable information from their customers, and better serve their communities. It reveals powerful lessons learned from various transportation agencies, including a regional airport, city and state departments of transportation, and municipal transit agencies. Filled with examples from transportation organizations, the text provides ideas that can apply to all modes of transportation including mass transit, highways, aviation, ferries, bicycling, and walking. It describes how to measure the impact of your social media presence and also examines advanced uses of social media for obtaining information by involving customers and analyzing their social media use. The book outlines all the resources you will need to maintain a social media presence and describes how to use social media analytical tools to assess service strengths and weaknesses and customer sentiment. Explaining how to overcome the digital divide, language barriers, and accessibility challenges for patrons with disabilities, it provides you with the understanding of the various social media technologies along with the knowhow to determine which one is best for a specific situation and purpose.

Disruptive Power - The Crisis of the State in the Digital Age (Hardcover): Taylor Owen Disruptive Power - The Crisis of the State in the Digital Age (Hardcover)
Taylor Owen
R608 Discovery Miles 6 080 Ships in 10 - 15 working days

Anonymous. WikiLeaks. The Syrian Electronic Army. Edward Snowden. Bitcoin. The Arab Spring. Five years ago, these terms were meaningless to the vast majority of people in the world. Today, they and many like them dominate the news and keep policymakers, security experts, and military and intelligence officials up at night. These groups and individuals are enabled and empowered by digital technology to confound and provoke the state in a way not possible before the Internet revolution. They are representative of a wide range of 21st century global actors and a new form of 21st century power: disruptive power. In Disruptive Power, Taylor Owen provides a sweeping look at the way that digital technologies are shaking up the workings of the institutions that have traditionally controlled international affairs: humanitarianism, diplomacy, war, journalism, activism, and finance. The traditional nation state system and the subsequent multinational system were founded on and have long functioned through a concentration of power in the state, through the military, currency controls, foreign policy, the rule of law, and so on. In this book, Owen argues that in every aspect of international affairs, the digitally enabled are changing the way the world works and disrupting the institutions that once held a monopoly on power. Each chapter of Owen's book looks at a different aspect of international affairs, profiling the disruptive innovators and demonstrating how they are challenging existing power structures for good and ill. Owen considers what constitutes successful online international action, what sorts of technologies are being used as well as what these technologies might look like a decade from now, and what new institutions will be needed to moderate the new power structures and ensure accountability. With cutting edge analysis of the fast-changing relationship between the declining state and increasingly powerful non-state actors, Disruptive Power is the essential road map for navigating a networked world.

Strengthening SME Performance Through Social Media Adoption and Usage (Paperback): Sikandar Ali Qalati, Dragana Ostic, Rohit... Strengthening SME Performance Through Social Media Adoption and Usage (Paperback)
Sikandar Ali Qalati, Dragana Ostic, Rohit Bansal
R4,771 Discovery Miles 47 710 Ships in 18 - 22 working days

Small and medium-sized enterprises (SMEs) are recognized as the backbone of today's world economy. However, SMEs are well known for having limitations and acceptance barriers in adopting new technology even though the internet and communications channel's revolution has changed the way people conduct business today. Further, the COVID-19 pandemic has disturbed the operations of SMEs and increased the burden on social media application globally. It is essential that SMEs utilize social media to strengthen their performance. Strengthening SME Performance Through Social Media Adoption and Usage explores experiences in different technological, managerial, organizational, and entrepreneurial environmental issues. It focuses on different conceptions of factors and consequences influencing social media usage and SME performance. Covering topics such as corporate social responsibility, marketing frameworks, and social media adoption, this premier reference source is a valuable resource for entrepreneurs, business leaders and managers, human resource managers, marketers, consultants, students and educators of higher education, librarians, researchers, and academicians.

The Culture of Connectivity - A Critical History of Social Media (Paperback, New): Jose van Dijck The Culture of Connectivity - A Critical History of Social Media (Paperback, New)
Jose van Dijck
R1,103 Discovery Miles 11 030 Ships in 10 - 15 working days

Social media has come to deeply penetrate our lives: Facebook, YouTube, Twitter and many other platforms define many of our daily habits of communication and creative production. The Culture of Connectivity studies the rise of social media in the first decade of the twenty-first century up until 2012, providing both a historical and a critical analysis of the emergence of major platforms in the context of a rapidly changing ecosystem of connective media. Such history is needed to understand how these media have come to profoundly affect our experience of online sociality. The first stage of their development shows a fundamental shift. While most sites started out as amateur-driven community platforms, half a decade later they have turned into large corporations that do not just facilitate user connectedness, but have become global information and data mining companies extracting and exploiting user connectivity. Author and media scholar Jose van Dijck offers an analytical prism to examine techno-cultural as well as socio-economic aspects of this transformation. She dissects five major platforms: Facebook, Twitter, Flickr, YouTube, and Wikipedia. Each of these microsystems occupies a distinct position in the larger ecology of connective media, and yet, their underlying mechanisms for coding interfaces, steering users, and filtering content rely on shared ideological principles. At the level of management and organization, we can also observe striking similarities between these platforms' shifting ownership status, governance strategies, and business models. Reconstructing the premises on which these platforms are built, this study highlights how norms for online interaction and communication gradually changed. "Sharing," "friending," "liking," "following," "trending," and "favoriting" have come to denote online practices imbued with specific technological and economic meanings. This process of normalization, the author argues, is part of a larger political and ideological battle over information control in an online world where everything is bound to become social. Crossing lines of technological, historical, sociological, and cultural inquiry, The Culture of Connectivity will reshape the way we think about interpersonal connection in the digital age.

Digital Media and Democratic Futures (Hardcover): Michael X.Delli Carpini Digital Media and Democratic Futures (Hardcover)
Michael X.Delli Carpini
R1,916 Discovery Miles 19 160 Ships in 18 - 22 working days

The revolution in digital communications has altered the relationship between citizens and political elites, with important implications for democracy. As new information ecosystems have evolved, as unforeseen examples of their positive and negative consequences have emerged, and as theorizing, data, and research methods have expanded and improved, the central question has shifted from if the digital information environment is good or bad for democratic politics to how and in what contexts particular attributes of this environment are having an influence. It is only through the careful analysis of specific cases that we can begin to build a more comprehensive and nuanced understanding of the role of digital media in democratic theory and practice. The essays in Digital Media and Democratic Futures focus on a variety of information and communication technologies, politically relevant actors, substantive issues, and digital political practices, doing so from distinct theoretical perspectives and methodological approaches. Individually, each of these case studies provides deep insights into the complex and context-dependent relationship between media and democracy. Collectively, they show that there is no single outcome for democracy in the digital age, only a range of possible futures. Contributors: Rena Bivens, Michael X. Delli Carpini, Jennifer Earl, Thomas Elliott, Deen Freelon, Kelly Gates, Philip N. Howard, Daniel Kreiss, Ting Luo, Helen Nissenbaum, Beth Simone Noveck, Jennifer Pan, Lisa Poggiali, Daniela Stockmann.

On Bts - Pop Music, Fandom, Sincerity (Paperback): Lenika Cruz On Bts - Pop Music, Fandom, Sincerity (Paperback)
Lenika Cruz
R278 R255 Discovery Miles 2 550 Save R23 (8%) Ships in 18 - 22 working days
Business-Webdesign - Benutzerfreundlichkeit, Konzeptionierung, Technik, Wartung (German, Paperback, Softcover Reprint of the... Business-Webdesign - Benutzerfreundlichkeit, Konzeptionierung, Technik, Wartung (German, Paperback, Softcover Reprint of the Original 1st 2002 ed.)
Thorsten Stocksmeier
R1,503 Discovery Miles 15 030 Ships in 18 - 22 working days

Die Optimierung des Web-Auftritts ist fur Entscheider und Mediengestalter ein wesentliches Ziel ihrer Tatigkeit. Anhand von Erkenntnissen der Ergonomie und Arbeitswissenschaft erklart der Autor, was Besucher auf Internetseiten fesselt und zum Kauf anregt, aber auch, was abschreckt. Fur die Planung eines erfolgreichen E-Business-Auftritts vermittelt das Buch wichtige Grundsatze. Fur das Design einer Informationsseite werden Internet-spezifische Prasentationsregeln erlautert, deren Ziel ein Internet-Auftritt ist. Ein Uberblick uber die grundlegenden Internet-Konzepte rundet das Werk ab."

Handbuch zum Internetrecht (German, Paperback, Softcover reprint of the original 1st ed. 2000): Detlef Kroger, Marc A Gimmy Handbuch zum Internetrecht (German, Paperback, Softcover reprint of the original 1st ed. 2000)
Detlef Kroger, Marc A Gimmy
R1,604 Discovery Miles 16 040 Ships in 18 - 22 working days

Das Internet stellt eine interessante und bedeutende Herausforderung an die Rechtswissenschaften dar. Die rasante technische Entwicklung dieses Mediums fiihrte zunachst zu der Erfahrung, daB es zu jeder Regel eine technische Umge hungsmOglichkeit zu geben schien, die diese ihrer Wirkung beraubte. Sowohl der Gesetzgeber als auch die mit der Thematik bescWiftigten Juristen haben Schwie rigkeiten, sich auf diese Situation einzustellen. Gleichwohl ist die Vorstellung von Rechtssicherheit im Internet zu einem entscheidenden Gesichtspunkt fUr dessen positive Fortentwickiung geworden. Der elektronische Geschliftsverkehr und die Bereitschaft von Unternehmen, neue Marketing-und Distributionswege zu bege hen, hangt ma6geblich von der zu erzielenden Rechtssicherheit abo Aber auch der in der Presse in den Vordergrund gespielte Mi6brauch des Mediums erfordert angemessene rechtliche MaBnalunen. Allerdings sind LOsungen fur derartige Pro blemlagen nicht mehr alleine durch Rechtsregeln zu erreichen, sondern miissen von technischen Rahmenbedingungen wie etwa die "Digitale Signatur," Sicher heitskonzepte etc. flankiert werden. Dieses Handbuch verfolgt das Ziel, dem Nutzer in der juristischen oder unter nehmerischen Praxis ebenso wie an Universitat oder Fachhochschule einen Weg durch dieses neue Rechtsgebiet zu schlagen. Obschon es fUr dieses junge Rechts gebiet noch keine festgelegten systematischen Strukturen gibt, wird ein vorsichti ger Versuch unternommen, eine Gliederung zu entwerfen, die sich an die Gege benheit der Materie anIehnt. Dazu ist das Werk in vier Abschnitte unterteilt. 1m ersten Abschnitt werden "Grund/agen" behandelt. Den Einstieg bildet ein Kapitel fiber "Europarechtliche und Internationalrechtliche Regelungen.""

Introduction to Modern Cryptography (Hardcover, 3rd Edition): Jonathan Katz, Yehuda Lindell Introduction to Modern Cryptography (Hardcover, 3rd Edition)
Jonathan Katz, Yehuda Lindell
R1,210 R1,142 Discovery Miles 11 420 Save R68 (6%) Ships with 15 working days

Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.

Table of Contents

I Introduction and Classical Cryptography

1. Introduction

Cryptography and Modern Cryptography

The Setting of Private-Key Encryption

Historical Ciphers and Their Cryptanalysis

Principles of Modern Cryptography

Principle 1 - Formal Definitions

Principle 2 - Precise Assumptions

Principle 3 - Proofs of Security

Provable Security and Real-World Security

References and Additional Reading

Exercises

2. Perfectly Secret Encryption

Definitions

The One-Time Pad

Limitations of Perfect Secrecy

*Shannon's Theorem

References and Additional Reading

Exercises

II Private-Key (Symmetric) Cryptography

3. Private-Key Encryption

Computational Security

The Concrete Approach

The Asymptotic Approach

Defining Computationally Secure Encryption

The Basic Definition of Security (EAV-Security)

*Semantic Security

Constructing an EAV-Secure Encryption Scheme

Pseudorandom Generators

Proofs by Reduction

EAV-Security from a Pseudorandom Generator

Stronger Security Notions

Security for Multiple Encryptions

Chosen-Plaintext Attacks and CPA-Security

CPA-Security for Multiple Encryptions

Constructing a CPA-Secure Encryption Scheme

Pseudorandom Functions and Permutations

CPA-Security from a Pseudorandom Function

Modes of Operation and Encryption in Practice

Stream Ciphers

Stream-Cipher Modes of Operation

Block Ciphers and Block-Cipher Modes of Operation

*Nonce-Based Encryption

References and Additional Reading

Exercises

4. Message Authentication Codes

Message Integrity

Secrecy vs Integrity

Encryption vs Message Authentication

Message Authentication Codes (MACs) - Definitions

Constructing Secure Message Authentication Codes

A Fixed-Length MAC

Domain Extension for MACs

CBC-MAC

The Basic Construction

*Proof of Security

GMAC and Poly

MACs from Difference-Universal Functions

Instantiations

*Information-Theoretic MACs

One-Time MACs from Strongly Universal Functions

One-Time MACs from Difference-Universal Functions

Limitations on Information-Theoretic MACs

References and Additional Reading

Exercises

5. CCA-Security and Authenticated Encryption

Chosen-Ciphertext Attacks and CCA-Security

Padding-Oracle Attacks

Defining CCA-Security

Authenticated Encryption

Defining Authenticated Encryption

CCA Security vs Authenticated Encryption

Authenticated Encryption Schemes

Generic Constructions

Standardized Schemes

Secure Communication Sessions

References and Additional Reading

Exercises

6. Hash Functions and Applications

Definitions

Collision Resistance

Weaker Notions of Security

Domain Extension: The Merkle-Damgard Transform

Message Authentication Using Hash Functions

Hash-and-MAC

HMAC

Generic Attacks on Hash Functions

Birthday Attacks for Finding Collisions

Small-Space Birthday Attacks

*Time/Space Tradeo s for Inverting Hash Functions

The Random-Oracle Model

The Random-Oracle Model in Detail

Is the Random-Oracle Methodology Sound?

Additional Applications of Hash Functions

Fingerprinting and Deduplication

Merkle Trees

Password Hashing

Key Derivation

Commitment Schemes

References and Additional Reading

Exercises

7. Practical Constructions of Symmetric-Key Primitives

Stream Ciphers

Linear-Feedback Shift Registers

Adding Nonlinearity

Trivium

RC4

ChaCha20

Block Ciphers

Substitution-Permutation Networks

Feistel Networks

DES - The Data Encryption Standard

3 DES: Increasing the Key Length of a Block Cipher

AES -The Advanced Encryption Standard

*Differential and Linear Cryptanalysis

Compression Functions and Hash Functions

Compression Functions from Block Ciphers

MD5, SHA-1, and SHA-2

The Sponge Construction and SHA-3 (Keccak)

References and Additional Reading

Exercises

8. *Theoretical Constructions of Symmetric-Key Primitives

One-Way Functions

Definitions

Candidate One-Way Functions

Hard-Core Predicates

From One-Way Functions to Pseudorandomness

Hard-Core Predicates from One-Way Functions

A Simple Case

A More Involved Case

The Full Proof

Constructing Pseudorandom Generators

Pseudorandom Generators with Minimal Expansion

Increasing the Expansion Factor

Constructing Pseudorandom Functions

Constructing (Strong) Pseudorandom Permutations

Assumptions for Private-Key Cryptography

Computational Indistinguishability

References and Additional Reading

Exercises

III Public-Key (Asymmetric) Cryptography

9. Number Theory and Cryptographic Hardness Assumptions

Preliminaries and Basic Group Theory

Primes and Divisibility

Modular Arithmetic

Groups

The Group ZN

*Isomorphisms and the Chinese Remainder Theorem

Primes, Factoring, and RSA

Generating Random Primes

*Primality Testing

The Factoring Assumption

The RSA Assumption

*Relating the Factoring and RSA Assumptions

Cryptographic Assumptions in Cyclic Groups

Cyclic Groups and Generators

The Discrete-Logarithm/Diffie-Hellman Assumptions

Working in (Subgroups of) Zp

Elliptic Curves

*Cryptographic Applications

One-Way Functions and Permutations

Collision-Resistant Hash Functions

References and Additional Reading

Exercises

10. *Algorithms for Factoring and Computing Discrete Logarithms

Algorithms for Factoring

Pollard's p - Algorithm

Pollard's Rho Algorithm

The Quadratic Sieve Algorithm

Generic Algorithms for Computing Discrete Logarithms

The Pohlig-Hellman Algorithm

The Baby-Step/Giant-Step Algorithm

Discrete Logarithms from Collisions

Index Calculus: Computing Discrete Logarithms in Zp

Recommended Key Lengths

References and Additional Reading

Exercises

11. Key Management and the Public-Key Revolution

Key Distribution and Key Management

A Partial Solution: Key-Distribution Centers

Key Exchange and the Diffie-Hellman Protocol

The Public-Key Revolution

References and Additional Reading

Exercises

12. Public-Key Encryption

Public-Key Encryption - An Overview

Definitions

Security against Chosen-Plaintext Attacks

Multiple Encryptions

Security against Chosen-Ciphertext Attacks

Hybrid Encryption and the KEM/DEM Paradigm

CPA-Security

CCA-Security

CDH/DDH-Based Encryption

El Gamal Encryption

DDH-Based Key Encapsulation

*A CDH-Based KEM in the Random-Oracle Model

*Chosen-Ciphertext Security and DHIES/ECIES

RSA-Based Encryption

Plain RSA Encryption

Padded RSA and PKCS # v

*CPA-Secure Encryption without Random Oracles

OAEP and PKCS # v

*A CCA-Secure KEM in the Random-Oracle Model

RSA Implementation Issues and Pitfalls

References and Additional Reading

Exercises

13. Digital Signature Schemes

Digital Signatures - An Overview

Definitions

The Hash-and-Sign Paradigm

RSA-Based Signatures

Plain RSA Signatures

RSA-FDH and PKCS #1 Standards

Signatures from the Discrete-Logarithm Problem

Identification Schemes and Signatures

The Schnorr Identification/Signature Schemes

DSA and ECDSA

Certificates and Public-Key Infrastructures

Putting It All Together { TLS

*Signcryption

References and Additional Reading

Exercises

14. *Post-Quantum Cryptography

Post-Quantum Symmetric-Key Cryptography

Grover's Algorithm and Symmetric-Key Lengths

Collision-Finding Algorithms and Hash Functions

Shor's Algorithm and its Impact on Cryptography

Post-Quantum Public-Key Encryption

Post-Quantum Signatures

Lamport's Signature Scheme

Chain-Based Signatures

Tree-Based Signatures

References and Additional Reading

Exercises

15. *Advanced Topics in Public-Key Encryption

Public-Key Encryption from Trapdoor Permutations

Trapdoor Permutations

Public-Key Encryption from Trapdoor Permutations

The Paillier Encryption Scheme

The Structure of Z_N

The Paillier Encryption Scheme

Homomorphic Encryption

Secret Sharing and Threshold Encryption

Secret Sharing

Verifiable Secret Sharing

Threshold Encryption and Electronic Voting

The Goldwasser-Micali Encryption Scheme

Quadratic Residues Modulo a Prime

Quadratic Residues Modulo a Composite

The Quadratic Residuosity Assumption

The Goldwasser-Micali Encryption Scheme

The Rabin Encryption Scheme

Computing Modular Square Roots

A Trapdoor Permutation Based on Factoring

The Rabin Encryption Scheme

References and Additional Reading

Exercises

Index of Common Notation

Appendix A Mathematical Background

A Identities and Inequalities

A Asymptotic Notation

A Basic Probability

A The \Birthday" Problem

A *Finite Fields

Appendix B Basic Algorithmic Number Theory

B Integer Arithmetic

B Basic Operations

B The Euclidean and Extended Euclidean Algorithms

B Modular Arithmetic

B Basic Operations

B Computing Modular Inverses

B Modular Exponentiation

B *Montgomery Multiplication

B Choosing a Uniform Group Element

B *Finding a Generator of a Cyclic Group

B Group-Theoretic Background

B Efficient Algorithms

References and Additional Reading

Exercises



 

/

Scambait (Paperback): Ryan R Campbell Scambait (Paperback)
Ryan R Campbell
R368 Discovery Miles 3 680 Ships in 18 - 22 working days
Information Hiding - 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers... Information Hiding - 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Stefan Katzenbeisser, Ahmad-Reza Sadeghi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009.

The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.

Computational Forensics - Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009, Proceedings... Computational Forensics - Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009, Proceedings (Paperback, 2009 ed.)
Zeno J.M.H. Geradts, Katrin Franke, Cor J. Veenman
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

ThisLectureNotesinComputerScience(LNCS)volumecontainsthepapersp- sentedatthe ThirdInternationalWorkshoponComputationalForensics(IWCF 2009), held August 13-14, 2009 at The Netherlands Forensic Institute in The Hague, The Netherlands. Computational forensics is a research domain focusing on the investigation of forensic problems using computational methods. Its primary goal is the d- covery and advancement of forensic knowledge involving modeling, computer simulation, and computer-based analysis and recognition in studying and so- ing forensic problems. The Computational Forensics Workshop series is intended as a forum for researchers and practicioners in all areas of computational and forensic s- ences. This forum discusses current challenges in computer-assisted forensics and presents recent progress and advances. IWCF addressesa broadspectrum of forensicdisciplines fromcriminal inv- tigation. The NAS report "Strengthening Forensic Science in the United States: A Path Forward," published in 2009, already concluded that: "With the exc- tion of nuclear DNA analysis, no forensic method has been rigorously shown to havethecapacitytoconsistentlyandwithahighdegreeofcertaintydemonstrate aconnectionbetweenevidenceandspeci?cindividualorsource."Computational methods can assist with statistical methods using, for example, likelihood ratios to strengthen the di?erent ?elds of forensic science. The organization of such an event is not possible without the e?ort and the enthousiasm of everyone involved. We thank all the members of the P- gram Committee for the timely reviewing process and the adherence to high standards. June 2009 Zeno J.M.H. Geradts Katrin Y. Franke Cor J. Veenman IWCF2009 Organization IWCF2009 was jointly organized by The Netherlands Forensic Institute, The Hague, The Netherlands and the University of Amsterdam, Amsterdam, The Netherlands.

Blogging on Instagram - Engagement Writing on One of the World's Best Social Media Platforms (Paperback): Terri Nakamura Blogging on Instagram - Engagement Writing on One of the World's Best Social Media Platforms (Paperback)
Terri Nakamura
R424 R400 Discovery Miles 4 000 Save R24 (6%) Ships in 18 - 22 working days
Instagram Marketing SECRETS - The Complete Guide for Effective Improving Brand Awareness, Growing Your Real Following, How to... Instagram Marketing SECRETS - The Complete Guide for Effective Improving Brand Awareness, Growing Your Real Following, How to Crack the Instagram Algorithm & Generate Calculable Profits (Paperback)
Uwe W Klemm
R410 Discovery Miles 4 100 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R283 Discovery Miles 2 830
Research Anthology on Strategies for…
Information R Management Association Hardcover R13,719 Discovery Miles 137 190
Management of Cybersecurity
Michael E. Whitman, Herbert J Mattord Paperback R1,143 R1,065 Discovery Miles 10 650
Multisensory Experiences - Where the…
Carlos Velasco, Marianna Obrist Hardcover R1,169 Discovery Miles 11 690
Social Media Marketing - A Quickstudy…
Edwards Poster R232 Discovery Miles 2 320
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R380 R357 Discovery Miles 3 570
Facebook
Dana Kilroy Fold-out book or chart R229 Discovery Miles 2 290
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi Paperback R664 R612 Discovery Miles 6 120
Social Media Marketing - A Comprehensive…
Jason Lazar Hardcover R554 R509 Discovery Miles 5 090
The Honest Guide to Becoming A Digital…
Elizabeth Benton Paperback R221 Discovery Miles 2 210

 

Partners