0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (13)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 16 of 16 matches in All Departments

Compilation for Secure Multi-party Computation (Paperback, 1st ed. 2017): Niklas Buscher, Stefan Katzenbeisser Compilation for Secure Multi-party Computation (Paperback, 1st ed. 2017)
Niklas Buscher, Stefan Katzenbeisser
R2,077 Discovery Miles 20 770 Ships in 10 - 15 working days

This book presents a holistic view on compiler assisted practical secure multi-party computation (MPC) over Boolean circuits. It discusses that two or more parties jointly evaluate a function over their inputs in such a way that each party keeps its input unknown to the other parties in MPC. MPC provides a generic way to construct Privacy-Enhancing Technologies, which protect sensitive data during processing steps in untrusted environments. A major obstacle in the past was to generate MPC applications by hand. Recently, special compilers have been developed to build all kinds of applications. This book also explains in detail how efficient MPC applications can be created automatically from ANSI-C, thus, bridging the areas of cryptography, compilation and hardware synthesis. It also gives an insight into the requirements for creating efficient applications for MPC and is hence of interest to not only researchers in the area of MPC but also developers realizing practical applications with MPC. For a better understanding of the complete compile chain from ANSI-C to circuits, which is the 'machine code' of MPC, the authors first give the necessary background information on MPC protocols, Boolean logic, and logic synthesis. Then the authors describe the various compilation steps required to translate any code into an adequate circuit description. Afterwards, the authors introduce a variety of optimization techniques for two classes of MPC protocols, namely techniques that improve the runtime of applications in constant- and multi-round MPC protocols. The authors also illustrate how efficient parallelization of MPC protocols can be achieved using the assistance of compilers. It presents the effectiveness of the proposed techniques by giving a detailed evaluation on benchmarking applications. Most of the aforementioned techniques are implemented in our open source compiler that is accompanying this book and allows to study compilation for MPC in practice.Researchers who are interested in practical secure multi-party computation (MPC), and developers who are interested in realizing MPC applications in practice will find this book useful as a reference, as well as advanced-level students in computer science.

Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday (Paperback, 2013):... Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday (Paperback, 2013)
Marc Fischlin, Stefan Katzenbeisser
R1,430 Discovery Miles 14 300 Ships in 10 - 15 working days

Johannes Buchmann is internationally recognized as one of the leading figures in areas of computational number theory, cryptography and information security. He has published numerous scientific papers and books spanning a very wide spectrum of interests; besides R&D he also fulfilled lots of administrative tasks for instance building up and directing his research group CDC at Darmstadt, but he also served as the Dean of the Department of Computer Science at TU Darmstadt and then went on to become Vice President of the university for six years (2001-2007). This festschrift, published in honor of Johannes Buchmann on the occasion of his 60th birthday, contains contributions by some of his colleagues, former students and friends. The papers give an overview of Johannes Buchmann's research interests, ranging from computational number theory and the hardness of cryptographic assumptions to more application-oriented topics such as privacy and hardware security. With this book we celebrate Johannes Buchmann's vision and achievements.

Recent Advances in RSA Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001): Stefan Katzenbeisser Recent Advances in RSA Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001)
Stefan Katzenbeisser
R2,913 Discovery Miles 29 130 Ships in 10 - 15 working days

Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against low-exponent RSA, Hastad's broadcast attack, and Franklin-Reiter attacks). Finally, the last chapter reviews the use of the RSA function in signature schemes. Recent Advances in RSA Cryptography is of interest to graduate level students and researchers who will gain an insight into current research topics in the field and an overview of recent results in a unified way. Recent Advances in RSA Cryptography is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.

Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings... Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings (Paperback, 2012 ed.)
Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, …
R1,575 Discovery Miles 15 750 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.

SOFSEM 2012: Theory and Practice of Computer Science - 38th Conference on Current Trends in Theory and Practice of Computer... SOFSEM 2012: Theory and Practice of Computer Science - 38th Conference on Current Trends in Theory and Practice of Computer Science, Spindleruv Mlyn, Czech Republic, January 21-27, 2012, Proceedings (Paperback, 2012)
Maria Bielikova, Gerhard Friedrich, Georg Gottlob, Stefan Katzenbeisser, Gyoergy Turan
R1,683 Discovery Miles 16 830 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 38th Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2012, held in Spindleruv Mlyn, Czech Republic, in January 2012. The 43 revised papers presented in this volume were carefully reviewed and selected from 121 submissions. The book also contains 11 invited talks, 10 of which are in full-paper length. The contributions are organized in topical sections named: foundations of computer science; software and Web engineering; cryptography, security, and verification; and artificial intelligence.

Digital Watermarking - 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers (Paperback,... Digital Watermarking - 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers (Paperback, 2009 ed.)
Hyoung Joong Kim, Stefan Katzenbeisser, Anthony T.S. Ho
R1,618 Discovery Miles 16 180 Ships in 10 - 15 working days

th It is our great pleasure to present in this volume the proceedings of the 7 Inter- tional Workshop on Digital Watermarking (IWDW) which was held in Busan, Korea, during November 10-12, 2008. The workshop was hosted by the by Korea Institute of Information Security and Cryptology (KIISC) and sponsored by MarkAny, BK21 CIST (Korea University), ETRI. Since its birth in the early 1990s, digital watermarking has become a mature e- bling technology for solving security problems associated with multimedia distri- tion schemes. Digital watermarks are now used in applications like broadcast mo- toring, movie fingerprinting, digital rights management, and document authentication, to name but a few. Still, many research challenges remain open, among them security and robustness issues, reversibility, and authentication. Continuing the tradition of previous workshops, IWDW 2008 also featured besides papers dealing with digital watermarking contributions from other related fields, such as steganography, ste- nalysis, and digital forensics. The selection of the program was a challenging task. From more than 62 subm- sions (received from authors in 15 different countries) the Program Committee - lected 36 as regular papers. At this point we would like to thank all the authors who submitted their latest research results to IWDW 2008 and all members of the Program Committee who put significant effort into the review process, assuring a balanced program. In addition to the contributed papers, the workshop featured three invited lectures delivered by Y. Q. Shi, C. -C."

Digital Watermarking - 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings (Paperback, 2008... Digital Watermarking - 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings (Paperback, 2008 ed.)
Yun Q. Shi, Hyoung Joong Kim, Stefan Katzenbeisser
R1,620 Discovery Miles 16 200 Ships in 10 - 15 working days

th It is our great pleasure to present in this volume the proceedings of the 6 Inter- tional Workshop on Digital Watermarking (IWDW), which was held in Guangzhou, China, during December 3-5, 2007. The workshop was hosted by the Sun Yat-sen University and sponsored by both the National Science Foundation of China and the Korea Institute of Information Security and Cryptology. Since its birth in the early 1990s, digital watermarking has become a mature e- bling technology for solving security problems associated with multimedia distribution schemes. Digital watermarks are now used in applications such as broadcast monit- ing, movie fingerprinting, digital rights management, and document authentication, to name but a few. Still, many research challenges remain open, among them security and robustness issues, reversibility and authentication. Continuing the tradition of previous workshops, IWDW 2007 also featured-besides papers dealing with digital watermarking-contributions from other related fields, such as steganography, ste- nalysis and digital forensics.

Information Hiding - 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers (Paperback,... Information Hiding - 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers (Paperback, 2005 ed.)
Mauro Barni, Jordi Herrera Joancomarti, Stefan Katzenbeisser, Fernando Perez-Gonzalez
R1,743 Discovery Miles 17 430 Ships in 10 - 15 working days

It is our pleasure to present in this volume the proceedings of the 7th Inter- tional Workshopon InformationHiding (IH 2005), held in Barcelona, Catalonia, Spain, during June 6-8, 2005. The workshop was organized by the Department of Computer Science and Multimedia, Universitat Oberta de Catalunya (UOC). Continuing the tradition of previous workshops, we sought a balanced p- gram, containing talks on various aspects of data hiding, anonymous commu- cation, steganalysis, and watermarking.Although the protection of digital int- lectual property has up to now motivated most of our research, there are many other upcoming ?elds of application. We were delighted to see that this year's workshop presented numerous new and unconventional approaches to infor- tion hiding. The selection of the program was a very challenging task. In total, we - ceived 90 submissions from 21 countries. At this point we want to thank all authors who submitted their latest work to IH 2005-and thus assured that the Information Hiding Workshop continues to be the top forum of our community.

Communications and Multimedia Security - 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September... Communications and Multimedia Security - 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings (Paperback, 2005 ed.)
Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl
R1,709 Discovery Miles 17 090 Ships in 10 - 15 working days

It is our great pleasure to present the proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), which washeld in Salzburg on September 19-21,2005.Continuing the tradition of p- vious CMS conferences, we sought a balanced program containing presentations on various aspects of secure communication and multimedia systems. Special emphasis was laid on papers with direct practical relevance for the construction of secure communication systems. The selection of the program was a challenging task. In total, we received 143 submissions, from which 28 were selected for presentation as full papers. In addition to these regular presentations, the CMS conference featured for the ?rst time a "work in progress track" that enabled authors to report preliminary results and ongoing work. These papers were presented in the form of a poster sessionduringtheconference;anextendedabstractofthepostersappearsinthis proceedings volume. From all papers submitted to the CMS conference, the p- gramcommitteechose13 submissionsfor inclusionin theworkinprogresstrack. In addition to regular presentations, CMS 2005 featured a special session on XMLsecurity, containingbothcontributedandinvitedtalks.Thisspecialsession was jointly organized by Rudig ] er Grimm (TU Ilmenau, Germany) and J] org Schwenk (Ruhr-Universit] at Bochum, Germany). Their assistance in organizing CMS 2005 was greatly appreciated."

Recent Advances in RSA Cryptography (Hardcover, 2001 ed.): Stefan Katzenbeisser Recent Advances in RSA Cryptography (Hardcover, 2001 ed.)
Stefan Katzenbeisser
R3,050 Discovery Miles 30 500 Ships in 10 - 15 working days

Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against low-exponent RSA, Hastad's broadcast attack, and Franklin-Reiter attacks). Finally, the last chapter reviews the use of the RSA function in signature schemes. Recent Advances in RSA Cryptography is of interest to graduate level students and researchers who will gain an insight into current research topics in the field and an overview of recent results in a unified way. Recent Advances in RSA Cryptography is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.

Information Hiding Techniques for Steganography and Digital Watermarking (Hardcover): Stefan Katzenbeisser, Fabien Peticolas Information Hiding Techniques for Steganography and Digital Watermarking (Hardcover)
Stefan Katzenbeisser, Fabien Peticolas; Fabien Petitcolas, Stefan Katzenbeisser; Edited by F. Petticolas
R3,058 Discovery Miles 30 580 Ships in 10 - 15 working days

Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This is a comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. It helps the reader to understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, and a description of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis", methods which can be used to break stenographic communication. This resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities to and differences from steganography. The reader should gain a working knowledge of watermarking's pros and cons, and learn the legal implications of watermarking and copyright issues on the Internet.

Schutz genetischer, medizinischer und sozialer Daten als multidisziplinare Aufgabe (German, Hardcover, 2013 ed.): Heribert M... Schutz genetischer, medizinischer und sozialer Daten als multidisziplinare Aufgabe (German, Hardcover, 2013 ed.)
Heribert M Anzinger, Kay Hamacher, Stefan Katzenbeisser
R1,960 Discovery Miles 19 600 Ships in 10 - 15 working days

Fortschritte in der Medizin, in der Genomforschung und in der Informationstechnik stellen den Datenschutz vor ein Dilemma: Forschung und die Anwendung neuer Methoden setzen haufig voraus, dass personenbezogene Daten in grossem Umfang zentral verfugbar, verteilbar und verknupfbar sind. Gleichzeitig bergen zentrale Datensammlungen und die unubersehbare Weitergabe und Verknupfung sensitiver Daten die Gefahr, dass der Einzelne auf ein Datenraster reduziert wird und Selbstbestimmungsmoeglichkeiten verliert. Den Wertungskonflikten und der Schutzbedurftigkeit und Schutzfahigkeit personenbezogener genetischer, medizinischer und sozialer Daten widmete sich eine multidisziplinare Veranstaltungsreihe des Center for Advanced Security Research Darmstadt, der Darmstadter Juristischen Gesellschaft und der Fakultat fur Rechts- und Wirtschaftswissenschaften der Technischen Universitat Darmstadt. Der vorliegende Band fasst die dabei entwickelten Gedanken verschiedener Wissenschaftsdisziplinen zusammen.

MATLAB 6.5 - Eine Einfuhrung (German, Paperback): Christoph UEberhuber, Stefan Katzenbeisser MATLAB 6.5 - Eine Einfuhrung (German, Paperback)
Christoph UEberhuber, Stefan Katzenbeisser
R1,948 Discovery Miles 19 480 Ships in 10 - 15 working days

Simulation ist neben Theorie und Experiment die dritte Saule wissenschaftlicher Forschung und technischer Entwicklung. Computer-Berechnungen sind zu einer wesentlichen Antriebskraft im Bereich der Technik und der Naturwissenschaften geworden. Speziell fur diese Anwendungsbereiche wurde MATLAB entwickelt. MATLAB ist ein auf mathematisch/numerischen Methoden beruhendes Problemloesungswerkzeug, das sowohl bequeme Benutzeroberflachen bietet, als auch die individuelle Programmierung gestattet. MATLAB hat sich durch seine Erweiterungsmoeglichkeit in Form von "Toolboxen" zu einem universell einsetzbaren Werkzeug auf den verschiedensten Gebieten (Simulation, Signalverarbeitung, Regelungstechnik, Fuzzy Logic etc.) entwickelt. Dieses Buch ist auf die neueste MATLAB-Version 6.5 abgestimmt und behandelt unter anderem detailliert die Loesung numerischer Problemstellungen mit Hilfe von MATLAB.

MATLAB 6 - Eine Einfuhrung (German, Paperback): Christoph UEberhuber, Stefan Katzenbeisser MATLAB 6 - Eine Einfuhrung (German, Paperback)
Christoph UEberhuber, Stefan Katzenbeisser
R1,677 Discovery Miles 16 770 Ships in 10 - 15 working days

Simulation ist neben Theorie und Experiment die dritte Saule wissenschaftlicher Forschung und technischer Entwicklung. Computer-Berechnungen sind zu einer wesentlichen Antriebskraft im Bereich der Technik und der Naturwissenschaften geworden. Speziell fur diese Anwendungsbereiche wurde MATLAB entwickelt. MATLAB ist ein auf mathematisch/numerischen Methoden beruhendes Problemloesungswerkzeug, das sowohl bequeme Benutzeroberflachen bietet, als auch die individuelle Programmierung gestattet. MATLAB hat sich durch seine Erweiterungsmoeglichkeit in Form von "Toolboxen" zu einem universell einsetzbaren Werkzeug auf den verschiedensten Gebieten (Simulation, Signalverarbeitung, Regelungstechnik, Fuzzy Logic, etc.) entwickelt.

Von Der Idee Zum Dokument - Einfuhrung in Tex Und Latex (German, Hardcover, 2nd 2., Stark Erweiterte Auflage ed.): Stefan... Von Der Idee Zum Dokument - Einfuhrung in Tex Und Latex (German, Hardcover, 2nd 2., Stark Erweiterte Auflage ed.)
Stefan Katzenbeisser
R3,115 R2,336 Discovery Miles 23 360 Save R779 (25%) Ships in 10 - 15 working days

Angeraten fur alle, deren Texte auch optisch herausragen sollen. Aus dem Inhalt: Einfuhrung. Textsatz. Formelsatz. Tabellensatz. Makros. Anderung der Ausgabeform. Das TEX der AMS. Anhange: Losungen zu den Ubungsaufgaben. Befehlsverzeichnis. Fonttabellen."

Information Hiding - 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers... Information Hiding - 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Stefan Katzenbeisser, Ahmad-Reza Sadeghi
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009.

The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Double Sided Wallet
R91 Discovery Miles 910
Johnson's Baby Oil (125ml)
R40 Discovery Miles 400
Sharp EL-W506T Scientific Calculator…
R599 R449 Discovery Miles 4 490
Conforming Bandage
R5 Discovery Miles 50
Too Much And Never Enough - How My…
Mary L. Trump Hardcover R499 R199 Discovery Miles 1 990
Comfort Food From Your Slow Cooker - 100…
Sarah Flower Paperback R550 R455 Discovery Miles 4 550
Pet Mall Mattress Style Pet Bed…
R2,339 Discovery Miles 23 390
Efekto Rosecare 3 Ready to Use…
R239 R145 Discovery Miles 1 450
Tommee Tippee - Closer to Nature Soother…
R150 R137 Discovery Miles 1 370
Jurassic Park Trilogy Collection
Sam Neill, Laura Dern, … Blu-ray disc  (1)
R311 Discovery Miles 3 110

 

Partners