0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017,... Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings (Paperback, 1st ed. 2017)
Junji Shikata
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023 Yokohama, Japan, August... Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023 Yokohama, Japan, August 29–31, 2023 Proceedings (1st ed. 2023)
Junji Shikata, Hiroki Kuzuno
R1,809 Discovery Miles 18 090 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29–31, 2023. The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: System and Hardware Security; Symmetric Key Cryptography; Public Key Cryptography; Zero Knowledge Proofs; and Card Based Cryptography.

Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
R3,074 Discovery Miles 30 740 Ships in 10 - 15 working days

The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022. The conference was originally planned to take place in Yokohama, Japan, but had to change to an online format due to the COVID-19 pandemic.The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.

Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
R2,781 Discovery Miles 27 810 Ships in 10 - 15 working days

The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022. The conference was originally planned to take place in Yokohama, Japan, but had to change to an online format due to the COVID-19 pandemic.The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Wonder Organic Compost Activator (Single…
R59 R52 Discovery Miles 520
Razer Kaira Pro Wireless Gaming…
R3,656 Discovery Miles 36 560
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
Shield Air Conditioner Treatment Fogger…
R39 R35 Discovery Miles 350
Sweet Like Candy by Ariana Grande EDP…
R1,221 Discovery Miles 12 210
Multi Colour Jungle Stripe Neckerchief
R119 Discovery Miles 1 190
Oversized Top & Ribbed Leggings Set…
R599 Discovery Miles 5 990
Dunlop Pro Padel Balls (Green)(Pack of…
R199 R165 Discovery Miles 1 650
Wonder Plant Food Stix - Premium Plant…
R49 R41 Discovery Miles 410
How To Raise A Man - The Modern Mother's…
Megan de Beyer Paperback R230 R180 Discovery Miles 1 800

 

Partners