0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (38)
  • R2,500 - R5,000 (18)
  • -
Status
Brand

Showing 1 - 25 of 56 matches in All Departments

Information Security Applications - 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised... Information Security Applications - 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Paperback, 2012)
Souhwan Jung, Moti Yung
R1,934 Discovery Miles 19 340 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA 2011, held in Jeju Island, Korea, in August 2011. The 21 revised full papers presented were carefully reviewed and selected from 74 submissions. The workshop serves as a forum for new results from the academic research community as well as from the industry; the papers are focusing on all technical and practical aspects of cryptographic and non-cryptographic security applications.

Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010,... Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers (Paperback, 2011)
Xuejia Lai, Moti Yung, Dongdai Lin
R1,632 Discovery Miles 16 320 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010.
The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.

Information Security Applications - 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised... Information Security Applications - 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers (Paperback)
Yongwha Chung, Moti Yung
R1,579 Discovery Miles 15 790 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010. The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.

Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009.... Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers (Paperback, Edition.)
Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing
R1,612 Discovery Miles 16 120 Ships in 10 - 15 working days

The5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information SecurityandbytheChineseAssociationforCryptologicResearchincooperation with the International Association for Cryptologic Research (IACR). The c- ference was held in Beijing, China, in the middle of December, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. The conference is a leading annual international event in the area of cryptog- phy and information security taking place in China. The scienti?c program of the conference covered all areas of current research in the ?eld, with sessions on central areas of cryptographic research and on many important areas of - formation security. The conference continues to get the support of the entire international community, re?ecting on the fact that the research areas covered byInscryptareimportantto moderncomputing,whereincreasedsecurity,trust, safety and reliability are required. The international Program Committee of Inscrypt 2009 received a total of 147 submissions from more than 20 countries and regions, from which only 32 submissions were selected for presentation, 22 of which in the regular papers track and 10 submissions in the short papers track. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, te- nical remarks and strict selection criteria the papers were chosen for the various tracks. The selection to both tracks was a highly competitive process.

Stabilization, Safety, and Security of Distributed Systems - 12th International Symposium, SSS 2010, New York, NY, USA,... Stabilization, Safety, and Security of Distributed Systems - 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010, Proceedings (Paperback, Edition.)
Shlomi Dolev, Jorge Cobb, Michael Fischer, Moti Yung
R3,057 Discovery Miles 30 570 Ships in 10 - 15 working days

The papers in this volume were presented at the 12th International Sym- sium on Stabilization, Safety, and Security of Distributed Systems (SSS), held September 20-22, 2010 at Columbia University, NYC, USA. The SSS symposium is an international forum for researchersand practiti- ers in the design and development of distributed systems with self-* properties: (theclassical)self-stabilizing,self-con?guring,self-organizing,self-managing,se- repairing,self-healing,self-optimizing,self-adaptive,andself-protecting. Research in distributed systems is now at a crucial point in its evolution, marked by the importance of dynamic systems such as peer-to-peer networks, large-scale wi- lesssensornetworks,mobileadhocnetworks,cloudcomputing,roboticnetworks, etc. Moreover, new applications such as grid and web services, banking and- commerce, e-health and robotics, aerospaceand avionics, automotive, industrial process control, etc. , have joined the traditional applications of distributed s- tems. SSS started as the Workshop on Self-Stabilizing Systems (WSS), the ?rst two of which were held in Austin in 1989 and in Las Vegas in 1995. Starting in 1995, the workshop began to be held biennially; it was held in Santa Barbara (1997), Austin (1999), and Lisbon (2001). As interest grew and the community expanded, the title of the forum was changed in 2003 to the Symposium on Self- Stabilizing Systems (SSS). SSS was organized in San Francisco in 2003 and in Barcelona in 2005. As SSS broadened its scope and attracted researchers from other communities, a couple of changes were made in 2006. It became an - nual event, and the name of the conference was changed to the International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS).

Trusted Systems - First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings (Paperback,... Trusted Systems - First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings (Paperback, 2010 ed.)
Liqun Chen, Moti Yung
R1,551 Discovery Miles 15 510 Ships in 10 - 15 working days

This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.

Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September... Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II (Paperback, 1st ed. 2021)
Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Herve Debar, Moti Yung
R3,037 Discovery Miles 30 370 Ships in 10 - 15 working days

This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September... Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Herve Debar, Moti Yung
R3,295 Discovery Miles 32 950 Ships in 10 - 15 working days

This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019,... Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings (Paperback, 1st ed. 2019)
Robert H. Deng, Valerie Gauthier-Umana, Martin Ochoa, Moti Yung
R2,553 Discovery Miles 25 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques.

Cyber Security Cryptography and Machine Learning - Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28,... Cyber Security Cryptography and Machine Learning - Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings (Paperback, 1st ed. 2019)
Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung
R2,082 Discovery Miles 20 820 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected... Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Feng Liu, Shouhuai Xu, Moti Yung
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the proceedings of the First International Conference on Science of Cyber Security, SciSec 2018, held in Beijing, China, in August 2018. The 11 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 54 submissions. The papers focus on science of security; cybersecurity dynamics; attacks and defenses; network security; security metrics and measurements; and performance enhancements.

Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013,... Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Dongdai Lin, Shouhuai Xu, Moti Yung
R1,598 Discovery Miles 15 980 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013. The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system security.

Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012,... Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Miroslaw Kutylowski, Moti Yung
R1,593 Discovery Miles 15 930 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.

Information Security Applications - 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised... Information Security Applications - 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers (Paperback, 2012 ed.)
Dong Hoon Lee, Moti Yung
R1,585 Discovery Miles 15 850 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.

Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3,... Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers (Paperback, 2012 ed.)
Chuankun Wu, Moti Yung, Dongdai Lin
R1,591 Discovery Miles 15 910 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.

Computer Security -- ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12,... Computer Security -- ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings (Paperback, 2012 ed.)
Sara Foresti, Moti Yung, Fabio Martinelli
R1,753 Discovery Miles 17 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.

Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers... Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers (Paperback, 2012)
Liqun Chen, Moti Yung, Liehuang Zhu
R1,579 Discovery Miles 15 790 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.

Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers... Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers (Paperback, 2011)
Liqun Chen, Moti Yung
R1,581 Discovery Miles 15 810 Ships in 10 - 15 working days

This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

Information Security Applications - 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected... Information Security Applications - 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers (Paperback, Edition.)
Heung Youl Youm, Moti Yung
R1,591 Discovery Miles 15 910 Ships in 10 - 15 working days

The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busan, Korea during August 25-27, 2009. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea Internet and Security Agency (KISA), sponsored by the Ministry of Public Administration and Security (MoPAS) and the Korea Communications Commission (KCC), financially sponsored by the ST. Ltd. The aim of the workshop was to serve as a forum for presenting new research and experimental results in the area of information security applications from academic communities as well as from industry. The workshop program covered a wide range of security aspects, from cryptography to systems and network security and experimental work as well. It was our great pleasure and honor to serve as the Program Committee Co-chairs of WISA2009. This year, too, the proceedings of the workshop were published in the LNCS series of Springer. The WISA 2009 Program Committee received 79 papers form 16 countries. This year the submissions were exceptionally strong, and the committee accepted 27 papers for the full paper presentation track. All the papers were carefully evaluated through blind peer-review by at least three members of the Program Comm- tee. We would like to say that acceptance is a great achievement since the selection process was highly competitive, and many good papers were not accepted.

Information Security - 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings (Paperback, 2009... Information Security - 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings (Paperback, 2009 ed.)
Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
R3,030 Discovery Miles 30 300 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009.

The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services.

Information Security Applications - 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised... Information Security Applications - 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers (Paperback, 2009 ed.)
Kiwook Sohn, Moti Yung
R1,574 Discovery Miles 15 740 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008.

The 24 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on smart card and secure hardware, wireless and sensor network security, public key crypto applications, privacy and anonymity, n/w security and intrusion detection, as well as application security and trust management.

Information Security and Cryptology - 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008,... Information Security and Cryptology - 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers (Paperback, 2009 ed.)
Moti Yung, Peng Liu, Dongdai Lin
R1,608 Discovery Miles 16 080 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008.

The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.

Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008,... Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings (Paperback, 2008 ed.)
Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung
R1,630 Discovery Miles 16 300 Ships in 10 - 15 working days

ACNS2008, the6thInternationalConferenceonAppliedCryptographyandN- work Security, was held in New York, New York, June 3-6, 2008, at Columbia University. ACNS 2008 was organized in cooperation with the International - sociation for Cryptologic Research (IACR) and the Department of Computer Science at Columbia University. The General Chairs of the conference were - gelos Keromytis and Moti Yung. The conference received 131 submissions, of which the Program Committee, chairedbyStevenBellovinandRosarioGennaro, selected 30 for presentation at the conference. The Best Student Paper Award was given to Liang Xie and Hui Song for their paper "On the E?ectiveness of Internal Patch Dissemination Against File-Sharing Worms" (co-authored with Sencun Zhu). These proceedings consist of revised versions of the presented papers. The revisions werenot reviewed.The authors bear full responsibility for the contents of their papers. Thereweremany submissionsof goodquality, and consequentlythe selection process was challenging and very competitive. Indeed, a number of good papers were not accepted due to lack of space in the program. The main considerations in selecting the program were conceptual and technical innovation and quality of presentation. As re?ected in the Call for Papers, an attempt was made to solicit and publish papers suggesting novel paradigms, original directions, or non-traditional perspectives.

Information Security Applications - 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised... Information Security Applications - 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Paperback, 2007 ed.)
Kim Sehun, Moti Yung, Hyung-Woo Lee
R1,591 Discovery Miles 15 910 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.

The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on Public Key Crypto Applications, Biometrics/Information Hiding, Secure Hardware, Secure Systems, Wireless and Mobile Security, Application Security/Secure Systems, Access Control/DB Security, Smart Cards/Secure Systems and Anonymity and P2P Security.

Progress in Cryptology - INDOCRYPT 2007 - 8th International Conference on Cryptology in India, Chennai, India, December 9-13,... Progress in Cryptology - INDOCRYPT 2007 - 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings (Paperback, 2007 ed.)
K. Srinathan, C. Pandu Rangan, Moti Yung
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007.

The 22 revised full papers and 11 revised short papers presented together with 3 invited lectures were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sweet Like Candy by Ariana Grande EDP…
R1,221 Discovery Miles 12 210
Closer To Love - How To Attract The…
Vex King Paperback R360 R309 Discovery Miles 3 090
Complete Clumping Cat Litter (10kg)
R137 Discovery Miles 1 370
Pamper Chunky Meat - Chicken and Lamb…
R21 Discovery Miles 210
Mellerware Swiss - Plastic Floor Fan…
R368 Discovery Miles 3 680
Deadpool 2 - Super Duper Cut
Ryan Reynolds Blu-ray disc R54 Discovery Miles 540
Bostik Glue Stick (40g)
R44 Discovery Miles 440
Gynaguard Ultimate Wash (250ml)
R120 R111 Discovery Miles 1 110
Watchman Lawn Hose (10M)
R699 R315 Discovery Miles 3 150
Bostik Glue Stick Value Pack (3 x 25g)
R61 R51 Discovery Miles 510

 

Partners