0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (216)
  • R500+ (783)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Information Hiding - First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings (Paperback, 1996 ed.):... Information Hiding - First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings (Paperback, 1996 ed.)
Ross Anderson
R1,534 Discovery Miles 15 340 Ships in 18 - 22 working days

This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge.
Work on information hiding has been carried out over the last few years within different research communities, mostly unaware of each other's existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.

Information Security and Privacy - First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26,... Information Security and Privacy - First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings (Paperback, 1996 ed.)
Josef Pieprzyk, Jennifer Seberry
R1,523 Discovery Miles 15 230 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996.
The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.

Safe Comp 97 - The 16th International Conference on Computer Safety, Reliability and Security (Paperback, Softcover reprint of... Safe Comp 97 - The 16th International Conference on Computer Safety, Reliability and Security (Paperback, Softcover reprint of the original 1st ed. 1997)
Peter Daniel
R2,680 Discovery Miles 26 800 Ships in 18 - 22 working days

The safe and secure operation ofcomputer systems continues to be the major issue in many applications where there is a threat to people, the environment, investment or goodwill. Such applications include medical devices, railway signalling, energy distribution, vehicle control and monitoring, air traffic control, industrial process control, telecommunications systemsand manyothers. This book represents the proceedings of the 16th International Conference on Computer Safety, Reliability and Security, held in York, UK, 7-10 September 1997. The conference reviews the state ofthe art, experience and new trends in the areas of computer safety, reliability and security. It forms a platform for technology transfer between academia, industry and research institutions. In an expanding world-wide market for safe, secure and reliable computer systems SAFECOMP 97 provides an opportunity for technical developers, users and legislators to exchange and review the experience, to consider the best technologies now available and to identify the skills and technologies required for the future. The papers were carefully selected by the Conference International Programme Committee. The authors of the papers come from twelve different countries. The subjects covered include safe software, safety cases, management & development, security, human factors, guidelines standards & certification, applications & industrial experience, formal methods & models andvalidation, verification and testing. SAFECOMP '97 continues the successful series of SAFECOMP conferences first held in 1979 in Stuttgart. SAFECOMP is organised by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Security and Reliability (EWICS TC7).

Advances in Cryptology - ASIACRYPT '96 - International Conference on the Theory and Applications of Crypotology and... Advances in Cryptology - ASIACRYPT '96 - International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Korea, November 3 - 7, 1996, Proceedings (Paperback, 1996 ed.)
Kwangjo Kim, Tsutomu Matsumoto
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996.
The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean functions, electronic cash, special signatures, stream ciphers, and hard problems.

Computer Security - ESORICS 96 - 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996,... Computer Security - ESORICS 96 - 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings (Paperback, 1996 ed.)
Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo
R1,543 Discovery Miles 15 430 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.

Concurrency and Parallelism, Programming, Networking, and Security - Second Asian Computing Science Conference, ASIAN '96,... Concurrency and Parallelism, Programming, Networking, and Security - Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2 - 5, 1996, Proceedings (Paperback, 1996 ed.)
Joxan Jaffar, Roland H.C. Yap
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second Asian Conference on Computing Science, ASIAN'96, held in Singapore in December 1996.
The volume presents 31 revised full papers selected from a total of 169 submissions; also included are three invited papers and 14 posters. The papers are organized in topical sections on algorithms, constraints and logic programming, distributed systems, formal systems, networking and security, programming and systems, and specification and verification.

Digital Signature Schemes - General Framework and Fail-Stop Signatures (Paperback, 1996 ed.): Birgit Pfitzmann Digital Signature Schemes - General Framework and Fail-Stop Signatures (Paperback, 1996 ed.)
Birgit Pfitzmann
R1,559 Discovery Miles 15 590 Ships in 18 - 22 working days

This book, based on the author's Ph.D. thesis, was selected during the 1995 GI Doctoral Dissertation Competition as the winning thesis in the foundations-of-informatics track.
Securing integrity for digital communications in the age of global electronic information exchange and electronic commerce is vital to democratic societies and a central technical challenge for cryptologists. As core contribution to advancing the state of the art, the author develops the new class of digital fail-stop signatures. This monograph is self-contained regarding the historical background and cryptographic primitives used. For the first time, a general and sophisticated framework is introduced in which innovative fail-stop signatures are systematically presented and evaluated, from theoretical foundations to engineering aspects.

Integrity Primitives for Secure Information Systems - Final RIPE Report of RACE Integrity Primitives Evaluation (Paperback,... Integrity Primitives for Secure Information Systems - Final RIPE Report of RACE Integrity Primitives Evaluation (Paperback, 1995 ed.)
Antoon Bosselaers, Bart Preneel
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man-month project conducted by 16 leading European security experts.
This book offers expert advice to professionals seeking to secure information systems by applying up-to-date cryptographic techniques. The core of this volume is a detailed integrity primitives portfolio recommendation. Among the issues addressed are security services, integrity mechanisms, data origin authentication, entity authentication, access control, data integrity, non-repudiation, signatures, and key exchange.

Advances in Cryptology - EUROCRYPT '94 - Workshop on the Theory and Application of Cryptographic Techniques, Perugia,... Advances in Cryptology - EUROCRYPT '94 - Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9 - 12, 1994. Proceedings (Paperback, 1995 ed.)
Alfredo De Santis
R1,604 Discovery Miles 16 040 Ships in 18 - 22 working days

This book constitutes the proceedings of the 1994 Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT '94, held in Perugia, Italy in May 1994.
The 36 revised full papers presented in the book are selected from 137 submissions and address all current research and advanced applicational aspects of cryptography; in addition, there are 11 short papers originating from the best special presentations accepted for the traditional rump session. The papers are organized in sections on secret sharing, hash functions, signatures, cryptosystems, pseudorandom generators, authentication codes, key agreement and key distribution, protocols, cryptanalysis and block ciphers, and number theory and algorithms.

Advances in Cryptology - CRYPTO '95 - 15th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '95 - 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995. Proceedings (Paperback, 1995 ed.)
Don Coppersmith
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

The Crypto '95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciety Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. It took place at the University of California, Santa Barbara, from August 27-31, 1995. This was the fifteenth annual Crypto conference; all have been held at UCSB. For the second time, proceedings were available at the conference. The General Chair, Stafford Tavares, was responsible for local organization and registration. The Program Committee considered 151 papers and selected 36 for pres- tation. There were also two invited talks. Robert Morris, Sr. gave a talk on "Ways of Losing Information," which included some non-cryptographic means of leaking secrets that are often overlooked by cryptographers. The second talk, "Cryptography - Myths and Realities," was given by Adi Shamir, this year's IACR Distinguished Lecturer. Shamir is the second person to receive this honor, the first having been Gus Simmons at Crypto '94. These proceedings contain revised versions of the 36 contributed talks. Each paper was sent to at least three members of the program committee for c- ments. Revisions were not checked on their scientific aspects. Some authors will write final versions of their papers for publication in refereed journals. Of course, the authors bear full responsibility for the contents of their papers.

Advances in Cryptology - EUROCRYPT '96 - International Conference on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '96 - International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12-16, 1996 Proceedings (Paperback, 1996 ed.)
Ueli Maurer
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Saragossa. It took place at the Palacio de Congresos in Saragossa, Spain, during May 12-16, 1996. This was the fifteenth annual EUROCRYPT conference (this name has been used since the third conference held in 1984), each of which has been held in a different city in Europe. For the second time, proceedings were available at the conference. JosC Pastor Franco, the General Chair, was resp- sible for local organization and registration. His contribution to the snccess of the conference is gratefully acknowledged. The Program Committee considered 126 submitted papers and selected 34 for presentation. Each paper was sent to all members of the Program Committee and was assigned to at least three of them for careful evaluation. There were also two invited talks. James L. Massey, this year's IACR Distinguished Ltcturer, gave a lecture entitled "The difficulty with difficulty". Massey is the third to receive this honor, the first two being Gustavus Simmons and Adi Shamir. Shafi Goldwasser gave an invited talk entitled "Multi party secure protocols: past and present". These proceedings contain revised versions of the 34 contributed talks. While the papers were carefully selected, they have not been refereed like submissions to a refereed journal. The authors bear full responsibility for the contents of their papers. Some authors may write final versions of their papers for publication in a refereed journal.

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes - 11th International Symposium, AAECC-11, Paris, France, July... Applied Algebra, Algebraic Algorithms and Error-Correcting Codes - 11th International Symposium, AAECC-11, Paris, France, July 17-22, 1995. Proceedings (Paperback, 1995 ed.)
Gerard Cohen, Marc Giusti, Teo Mora
R1,608 Discovery Miles 16 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the 11th International Conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-11, held in Paris, France in July 1995.
The volume presents five invited papers and 32 full revised research papers selected from a total of 68 submissions; it is focussed on research directed to the exploitation of algebraic techniques and methodologies for the application in coding and computer algebra. Among the topics covered are coding, cryptoloy, communication, factorization of polynomials, Gr bner bases, computer algebra, algebraic algorithms, symbolic computation, algebraic manipulation.

Advances in Cryptology - EUROCRYPT '95 - International Conference on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '95 - International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995 Proceedings (Paperback, 1995 ed.)
Louis C. Guillou, Jean-Jacques Quisquater
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

EUROCRYPT '95. Sponsored by the International Association for Cryp- logic Research (IACR), in cooperation with the Centre Commun d'Etudes de T616vision et T61Qcommunications (CCETT), a workshop on the theory and - plications of cryptographic techniques takes place at the Palais du Grand Large, Saint Malo, France, May 21-25, 1995. The General Chair of EUROCRYPT '95 is Franqoise Scarabin. The Or- nization Committee was helped by Maryvonne Lahaie and her communication team. Moreover, the CCETT has generously provided the help of a young - glish lady, Miss Virginia Cooper, for the secretariat of both the Organization arid Program Committees. They all did an excellent job in preparing the conference. It is our pleasure to thank them for their essential work. IACR and EUROCRYPT. According to a very good suggestion expressed during CRYPTO '82, the Association was established at CRYPTO '83. Today, the Association has approximately 600 members and the mailing file managed by its Secretariat consists of more than 2 000 names. The main goal of the Association is the sponsoring of two annual conferences: CRYPTO, every summer at the University of California, Santa Barbara (UCSB), and EUROCRYPT, every spring in a different European country. Moreover, the Association edits quarterly the Journal of Cryptology (JoC).

Safe Comp 95 - The 14th International Conference on Computer Safety, Reliability and Security, Belgirate, Italy 11-13 October... Safe Comp 95 - The 14th International Conference on Computer Safety, Reliability and Security, Belgirate, Italy 11-13 October 1995 (Paperback, Edition. ed.)
Gerhard Rabe
R1,472 Discovery Miles 14 720 Ships in 18 - 22 working days

Safety-related computer systems are those which may lead to loss of life, injury or plant and environmental damage. Such systems therefore have to be developed and implemented so that they meet strict require and security because their applications cover ments on safety, reliability nearly all areas of daily life and range from controlling and monitoring industrial processes, through robotics and power generation, to transport systems. Highly reliable electronic systems for safety-related applications represent an area in which industry has been involved for many years and which is now gaining increasing importance in academia. Their relevance also results from an increased perception of safety by society. Therefore, not only are technicians involved in this area, but psycho logical and sociological aspects also play a major role. Dealing with safety-related systems we have to consider the whole lifecycle of these systems, starting from specification up to implementation, assessment and operation. All those issues mentioned above are covered in this book, which represents the proceedings of the 14th International Conference on Computer Safety, Reliability and Security, SAFECOMP '95, held in Belgirate, Italy, 11-13 October 1995. The conference continues the series of SAFECOMP conferences which was originated by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Security and Reliability (EWICS TC7) and reflects the state of the art, experience and new trends in the area of safety-related computer systems."

Fast Software Encryption - Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings (Paperback, 1996... Fast Software Encryption - Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings (Paperback, 1996 ed.)
Dieter Gollmann
R1,461 Discovery Miles 14 610 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996.
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.

Cryptography: Policy and Algorithms - International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings... Cryptography: Policy and Algorithms - International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings (Paperback, 1996 ed.)
Edward Pyle Dawson, Jovan Goli c
R1,521 Discovery Miles 15 210 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995.Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.

Modern Socio-Technical Perspectives on Privacy (Hardcover, 1st ed. 2022): Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski,... Modern Socio-Technical Perspectives on Privacy (Hardcover, 1st ed. 2022)
Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, …
R1,323 Discovery Miles 13 230 Ships in 10 - 15 working days

This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a "professional issues" course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.

Managing with Information Technology (Paperback, Softcover reprint of the original 1st ed. 1993): Richard Ennals, Philip... Managing with Information Technology (Paperback, Softcover reprint of the original 1st ed. 1993)
Richard Ennals, Philip Molyneux
R1,410 Discovery Miles 14 100 Ships in 18 - 22 working days

The language of business and management, and of infor mation technology, is being employed across all sectors of economic and social activity. In recent years computers and information technology (IT) in general have moved from being a scarce resource to being a more generally available commodity, without a corresponding increase in understanding of how the new generation of tools can be used. IT is available on individual desktops, supporting decision making and communication, but often conven tional organizations have failed to adapt, individuals lack competence and confidence, and senior managers lack both the strategic insight to develop appropriate strategies and the humility to accept that they need to learn. As each sector, whether business, education, public sec tor management or the community and voluntary sector, realizes that the potential of IT is not being exploited to the full, calls are issued for the development of new "hybrid managers," a term coined to describe the gap in understanding and competence that is to be filled. The two editors work in the hybrid field of business information technology, which is a melting pot of ideas and experience from numerous traditional disciplines. The pace of change is such that no one individual could ever be abreast of all technical and business develop ments, but the field is now sufficiently mature for us to identify certain underlying issues and principles, and areas of research for the coming years."

Advances in Cryptology - CRYPTO '92 - 12th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '92 - 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992. Proceedings (Paperback, 1993 ed.)
Ernest F. Brickell
R1,491 Discovery Miles 14 910 Ships in 18 - 22 working days

Crypto'92 took place on August 16-20, 1992. It was the twelfth in the series of annual cryptology conferences held on the beautiful campus of the University of California, Santa Barbara. Once again, it was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy. The conference ran smoothly, due to the diligent efforts of the g- eral chair, Spyros Magliveras of the University of Nebraska. One of the measures of the success of this series of conferences is represented by the ever increasing number of papers submitted. This year, there were 135 submissions to the c- ference, which represents a new record. Following the practice of recent program comm- tees, the papers received anonymous review. The program committee accepted 38 papers for presentation. In addition, there were two invited presentations, one by Miles Smid on the Digital Signature Standard, and one by Mike Fellows on presenting the concepts of cryptology to elementary-age students. These proceedings contains these 40 papers plus 3 papers that were presented at the Rump Session. I would like to thank all of the authors of the submitted papers and all of the speakers who presented papers. I would like to express my sincere appreciation to the work of the program committee: Ivan Damgard (Aarhus University, Denmark), Odd Goldreich (Technion, Israel), Burt Kaliski (RSA Data Security, USA), Joe Kilian (NEC, USA).

Advances in Cryptology - ASIACRYPT '91 - International Conference on the Theory and Application of Cryptology,... Advances in Cryptology - ASIACRYPT '91 - International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991. Proceedings (Paperback, 1993 ed.)
Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto
R1,613 Discovery Miles 16 130 Ships in 18 - 22 working days

This volume contains the proceedings of ASIACRYPT '91, the first international conference on the theory and application of cryptology to be held in the Asian area. It was held at Fujiyoshida, near Mount Fuji in Japan, in November 1991. The conference was modeled after the very successful CRYTO and EUROCRYPT series of conferences sponsored by the International Association for Cryptologic Research (IACR). The IACR and the Institute of Electronics, Information and Communication Engineers were sponsors for ASIACRYPT '91. The papers from the conference were improved and corrected for inclusion in this volume. The papers are grouped into parts on: differential cryptanalysis and DES-like cryptosystems; hashing and signature schemes; secret sharing, threshold, and authenticationcodes; block ciphers - foundations and analysis; cryptanalysis and new ciphers; proof systems and interactive protocols; public key ciphers - foundations and analysis. Also included are four invited lectures and impromptu talks from the rump session.

Computer Security and Industrial Cryptography - State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991... Computer Security and Industrial Cryptography - State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Paperback, 1993 ed.)
Bart Preneel, Rene Govaerts, Joos Vandewalle
R1,492 Discovery Miles 14 920 Ships in 18 - 22 working days

This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure protocols, digital signatures, security architectures, network security, and data encryption standards (DES).

Advances in Cryptology - AUSCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast,... Advances in Cryptology - AUSCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings (Paperback, 1993 ed.)
Jennifer Seberry, Yuliang Zheng
R1,641 Discovery Miles 16 410 Ships in 18 - 22 working days

This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.

Advances in Cryptology - CRYPTO '90 - Proceedings (Paperback, 1991 ed.): Alfred John Menezes, Scott A. Vanstone Advances in Cryptology - CRYPTO '90 - Proceedings (Paperback, 1991 ed.)
Alfred John Menezes, Scott A. Vanstone
R1,691 Discovery Miles 16 910 Ships in 18 - 22 working days

Crypto '90 marked the tenth anniversary of the Crypto conferences held at the University of California at Santa Barbara. The conference was held from August 11 to August 15, 1990 and was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Department of Computer Science of the University of California at Santa Barbara. 227 participants from twenty countries around the world. Crypto '90 attracted Roughly 35% of attendees were from academia, 45% from industry and 20% from government. The program was intended to provide a balance between the purely theoretical and the purely practical aspects of cryptography to meet the needs and diversified interests of these various groups. The overall organization of the conference was superbly handled by the general chairperson Sherry McMahan. All of the outstanding features of Crypto, which we have come to expect over the years, were again present and, in addition to all of this, she did a magnificent job in the preparation of the book of abstracts. This is a crucial part of the program and we owe her a great deal of thanks.

The Stability Theory of Stream Ciphers (Paperback, 1991 ed.): Cunsheng Ding, Guozhen Xiao, Weijuan Shan The Stability Theory of Stream Ciphers (Paperback, 1991 ed.)
Cunsheng Ding, Guozhen Xiao, Weijuan Shan
R1,443 Discovery Miles 14 430 Ships in 18 - 22 working days

Secure message transmission is of extreme importance in today's information-based society. Stream encryption is a practically important means to this end. This monograph is devoted to a new aspect of stream ciphers, namely the stability theory of stream ciphers, with the purpose of developing bounds on complexity which can form part of the basis for a general theory of data security and of stabilizing stream-cipher systems. The approach adopted in this monograph is new. The topic is treated by introducing measure indexes on the security of stream ciphers, developing lower bounds on these indexes, and establishing connections among them. The treatment involves the stability of boolean functions, the stability of linear complexity of key streams, the period stability of key streams, and the stability of source codes. Misleading ideas about stream ciphers are exposed and new viewpoints presented. The numerous measure indexes and bounds on them that are introduced here, the approach based on spectrum techniques, andthe ten open problems presented will all be useful to the reader concerned with analyzing and designing stream ciphers for securing data.

Local Area Network Security - Workshop LANSEC '89. European Institute for System Security (E.I.S.S.) Karlsruhe, FRG, April... Local Area Network Security - Workshop LANSEC '89. European Institute for System Security (E.I.S.S.) Karlsruhe, FRG, April 3-6, 1989. Proceedings (Paperback, 1989 ed.)
Thomas A. Berson, Thomas Beth
R1,084 Discovery Miles 10 840 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mathematical Methodologies in Pattern…
Pedro Latorre Carmona, J. Salvador Sanchez, … Hardcover R4,369 R3,298 Discovery Miles 32 980
Pattern Recognition and Image Processing
D Luo Hardcover R1,600 Discovery Miles 16 000
Supervised and Unsupervised Learning for…
Michael W. Berry, Azlinah Mohamed, … Hardcover R2,533 Discovery Miles 25 330
Digital Speech Processing - Synthesis…
Sadaoki Furui Hardcover R5,802 Discovery Miles 58 020
Computer Analysis of Human Behavior
Albert Ali Salah, Theo Gevers Hardcover R1,471 Discovery Miles 14 710
Document Analysis Systems: Theory and…
Seong-Whan Lee, Yasuaki Nakano Paperback R1,546 Discovery Miles 15 460
3D Imaging for Safety and Security
Andreas Koschan, Marc Pollefeys, … Hardcover R1,455 Discovery Miles 14 550
Computer Vision and Pattern Recognition…
Jun Zhou, Xiao Bai, … Hardcover R5,607 Discovery Miles 56 070
Describing and Recognizing 3-D Objects…
Ting-Jun Fan Hardcover R2,734 Discovery Miles 27 340
Principles of Visual Information…
Michael S. Lew Hardcover R2,855 Discovery Miles 28 550

 

Partners