0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013.... Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings (Paperback, 2013 ed.)
Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini
R1,649 Discovery Miles 16 490 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.

Advances in Cryptology -- CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012,... Advances in Cryptology -- CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings (Paperback, 2012 ed.)
Reihaneh Safavi-Naini, Ran Canetti
R1,749 Discovery Miles 17 490 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functional encryption, proofs systems, protocols, hash functions, composable security, privacy, leakage and side-channels, signatures, implementation analysis, black-box separation, cryptanalysis, quantum cryptography, and key encapsulation and one-way functions.

Information Theoretic Security - Third International Conference, ICITS 2008, Calgary, Canada,  August 10-13, 2008, Proceedings... Information Theoretic Security - Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings (Paperback, 2008 ed.)
Reihaneh Safavi-Naini
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

ICITS 2008, the Third InternationalConference on Information Theoretic Se- rity, was held in Calgary, Alberta, Canada, during August 10-13, 2008, at the Universityof Calgary.This seriesof conferences wasstarted with the 2005IEEE InformationTheoryWorkshoponTheoryandPracticein Information-Theoretic Security (ITW 2005, Japan), held on Awaji Island, Japan, October 16-19,2005. The conference series aims at bringing focus to security research when there is no unproven computational assumption on the adversary. This is the fra- work proposed by Claude Shannon in his seminal paper formalizing modern unclassi?ed research on cryptography. Over the last few decades, Shannon's approach to formalizing security has been used in various other areas including authentication, secure communication, key exchange, multiparty computation and information hiding to name a few. Coding theory has also proven to be a powerful tool in the construction of security systems with information theoretic security. Therewere43submitted papers ofwhich14wereaccepted.Eachcontributed paper was reviewed by three members of the Program Committee. In the case of co-authorship by a Program Committee member the paper was reviewed by ?ve members of the committee (no committee member reviewed their own s- mission). In addition to the accepted papers, the conference also included nine invited speakers, whose contributions were not refereed. These proceedings c- tain the acceptedpapers with anyrevisionsrequiredbythe ProgramCommittee as well as the contributions by invited speakers.

Digital Rights Management - Technologies, Issues, Challenges and Systems (Paperback, 2006 ed.): Reihaneh Safavi-Naini, Moti Yung Digital Rights Management - Technologies, Issues, Challenges and Systems (Paperback, 2006 ed.)
Reihaneh Safavi-Naini, Moti Yung
R1,707 Discovery Miles 17 070 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems, DRMTICS 2005, held in Sydney, Australia, in October/November 2005. Presents 26 carefully reviewed full papers organized in topical sections on assurance and authentication issues, legal and related issues, expressing rights and management, watermarking, software issues, fingerprinting and image authentication, supporting cryptographic technology, P2P issues, implementations and architectures.

Information Security and Privacy - 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings... Information Security and Privacy - 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (Paperback, 2006 ed.)
Lynn Batten, Reihaneh Safavi-Naini
R1,764 Discovery Miles 17 640 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical sections on stream ciphers, symmetric key ciphers, network security, cryptographic applications, secure implementation, signatures, theory, security applications, provable security, protocols, as well as hashing and message authentication.

Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014,... Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Nicolas Christin, Reihaneh Safavi-Naini
R3,112 Discovery Miles 31 120 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile system security, incentives, game theory and risk, and bitcoin anonymity.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bostik Glue Stick (40g)
R44 Discovery Miles 440
An Evening With Silk Sonic
Bruno Mars, Anderson .Paak, … CD  (2)
R155 Discovery Miles 1 550
Love Sux
Avril Lavigne CD R185 Discovery Miles 1 850
Aquaman 2: The Lost Kingdom - 4K Ultra…
Jason Momoa, Patrick Wilson, … Blu-ray disc R680 Discovery Miles 6 800
Hani - A Life Too Short
Janet Smith, Beauregard Tromp Paperback R310 R248 Discovery Miles 2 480
Xbox One Replacement Case
 (8)
R55 Discovery Miles 550
Sony PlayStation 5 HD Camera (Glacier…
R1,299 R1,229 Discovery Miles 12 290
Docking Edition Multi-Functional…
R1,099 R799 Discovery Miles 7 990
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Chicco Natural Feeling Manual Breast…
R799 Discovery Miles 7 990

 

Partners