0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (8)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 12 of 12 matches in All Departments

Understanding Cryptography - A Textbook for Students and Practitioners (Paperback, 2010 ed.): Bart Preneel Understanding Cryptography - A Textbook for Students and Practitioners (Paperback, 2010 ed.)
Bart Preneel; Christof Paar, Jan Pelzl
R978 Discovery Miles 9 780 Ships in 9 - 15 working days

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Embedded Security in Cars - Securing Current and Future Automotive IT Applications (Paperback, Softcover reprint of hardcover... Embedded Security in Cars - Securing Current and Future Automotive IT Applications (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Kerstin Lemke, Christof Paar, Marko Wolf
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive IT systems against manipulation or intrusion has only recently started to emerge.

Lemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive applications. After an introductory chapter written by the editors themselves, the contributions from experienced experts of different disciplines are structured into three parts. "Security in the Automotive Domain" describes applications for which IT security is crucial, like immobilizers, tachographs, and software updates. "Embedded Security Technologies" details security technologies relevant for automotive applications, e.g., symmetric and asymmetric cryptography, and wireless security. "Business Aspects of IT Systems in Cars" shows the need for embedded security in novel applications like location-based navigation systems and personalization.

The first book in this area of fast-growing economic and scientific importance, it is indispensable for both researchers in software or embedded security and professionals in the automotive industry.

Security in Ad-hoc and Sensor Networks - First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised... Security in Ad-hoc and Sensor Networks - First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers (Paperback, 2005 ed.)
Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff
R1,624 Discovery Miles 16 240 Ships in 10 - 15 working days

Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, intelligent homes, environmental monitoring or inter-vehicle communications: there is almost nothing left that is not going to be smart and networked. While a great amount of research has been devoted to the pure networking aspects, ad hoc and sensor networks will not be successfully deployed if security, dependability, and privacy issues are not addressed adequately.

As the first book devoted to the topic, this volume constitutes the thoroughly refereed post-proceedings of the First European Workshop on Security in Ad-hoc and Sensor Networks, ESAS, 2004, held in Heidelberg, Germany in August 2004. The 17 revised full papers were carefully reviewed and selected from 55 submissions. Among the key topics addressed are key distribution and management, authentication, energy-aware cryptographic primitives, anonymity and pseudonymity, secure diffusion, secure peer-to-peer overlays, and RFIDs.

Cryptographic Hardware and Embedded Systems -- CHES 2003 - 5th International Workshop, Cologne, Germany, September 8-10, 2003,... Cryptographic Hardware and Embedded Systems -- CHES 2003 - 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings (Paperback, 2003 ed.)
Colin D. Walter, Cetin K. Koc, Christof Paar
R1,760 Discovery Miles 17 600 Ships in 10 - 15 working days

These are the proceedings of CHES 2003, the ?fth workshop on Cryptographic HardwareandEmbeddedSystems, heldinCologneonSeptember8-10,2003.As with every previous workshop, there was a record number of submissions despite themuchearlierdeadlineinthisyear'scallforpapers.Thisisaclearindication of the growing international importance of the scope of the conference and the relevance of the subject material to both industry and academia. The increasing competition for presenting at the conference has led to many excellent papers and a higher standard overall. From the 111 submissions, time constraintsmeantthatonly32couldbeaccepted.Theprogramcommitteewo- ed very hard to select the best. However, at the end of the review process there were a number of good papers - which it would like to have included but for which, sadly, there was insu?cient space. In addition to the accepted papers appearing in this volume, there were three invited presentations from Hans D- bertin (Ruhr-Universit] at Bochum, Germany), Adi Shamir (Weizmann Institute, Israel), and Frank Stajano (University of Cambridge, UK), and a panel d- cussion on the e?ectiveness of current hardware and software countermeasures against side channel leakage in embedded cryptosystems."

Cryptographic Hardware and Embedded Systems - CHES 2002 - 4th International Workshop, Redwood Shores, CA, USA, August 13-15,... Cryptographic Hardware and Embedded Systems - CHES 2002 - 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers (Paperback, 2003 ed.)
Burton S. Jr. Kaliski, Cetin K. Koc, Christof Paar
R1,870 Discovery Miles 18 700 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2002, held in Redwood Shores, California, USA in August 2002. The 41 revised full papers presented together with two invited contributions were carefully selected from 101 submissions during two rounds of reviewing and revision. The papers are organized in topical sections on attack strategies, finite field and modular arithmetic, elliptic curve cryptography, AES and AES candidates, tamper resistance, RSA implementation, random number generation, new primitives, hardware for cryptanalysis.

Cryptographic Hardware and Embedded Systems - CHES 2001 - Third International Workshop, Paris, France, May 14-16, 2001... Cryptographic Hardware and Embedded Systems - CHES 2001 - Third International Workshop, Paris, France, May 14-16, 2001 Proceedings (Paperback, 2001 ed.)
Cetin K. Koc, David Nacchae, Christof Paar
R1,743 Discovery Miles 17 430 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Cryptoanalysis Hardware and Embedded Systems, CHES 2001, held in Paris, France in Mai 2001. The 31 revised full papers presented were carefully reviewed and selected from 66 submissions. The papers are organized in topical sections on side channel attacks, Rijndael hardware implementation, random number generators, elliptic curve algorithms, arithmetic architectures, cryptanalysis, embedded implementations of ciphers, and side channel attacks on elliptic curve cryptosystems.

Cryptographic Hardware and Embedded Systems - CHES 2000 - Second International Workshop Worcester, MA, USA, August 17-18, 2000... Cryptographic Hardware and Embedded Systems - CHES 2000 - Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings (Paperback, 2000 ed.)
Cetin K. Koc, Christof Paar
R1,705 Discovery Miles 17 050 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2000, held in Worcester, MA, USA in August 2000. The 25 revised full papers presented together with two invited contributions were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on implementation of elliptic curve cryptosystems, power and timing analysis attacks, hardware implementation of block ciphers, hardware architectures, power analysis attacks, arithmetic architectures, physical security and cryptanalysis, and new schemes and algorithms.

Cryptographic Hardware and Embedded Systems - First International Workshop, CHES'99 Worcester, MA, USA, August 12-13, 1999... Cryptographic Hardware and Embedded Systems - First International Workshop, CHES'99 Worcester, MA, USA, August 12-13, 1999 Proceedings (Paperback, 1999 ed.)
Cetin K. Koc, Christof Paar
R1,705 Discovery Miles 17 050 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, CHES'99, held in Worcester, MA, USA in August 1999. The 27 revised papers presented together with three invited contributions were carefully reviewed and selected from 42 submissions. The papers are organized in sections on cryptographic hardware, hardware architectures, smartcards and embedded systems, arithmetic algorithms, power attacks, true random numbers, cryptographic algorithms on FPGAs, elliptic curve implementations, new cryptographic schemes and modes of operation.

Understanding Cryptography - A Textbook for Students and Practitioners (Hardcover, 1st ed. 2010): Bart Preneel Understanding Cryptography - A Textbook for Students and Practitioners (Hardcover, 1st ed. 2010)
Bart Preneel; Christof Paar, Jan Pelzl
R988 Discovery Miles 9 880 Ships in 9 - 15 working days

Cryptography is now ubiquitous moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography.

After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.

The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book s website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers."

Embedded Security in Cars - Securing Current and Future Automotive IT Applications (Hardcover, 2006 ed.): Kerstin Lemke,... Embedded Security in Cars - Securing Current and Future Automotive IT Applications (Hardcover, 2006 ed.)
Kerstin Lemke, Christof Paar, Marko Wolf
R3,130 Discovery Miles 31 300 Ships in 10 - 15 working days

Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive IT systems against manipulation or intrusion has only recently started to emerge.

Lemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive applications. After an introductory chapter written by the editors themselves, the contributions from experienced experts of different disciplines are structured into three parts. "Security in the Automotive Domain" describes applications for which IT security is crucial, like immobilizers, tachographs, and software updates. "Embedded Security Technologies" details security technologies relevant for automotive applications, e.g., symmetric and asymmetric cryptography, and wireless security. "Business Aspects of IT Systems in Cars" shows the need for embedded security in novel applications like location-based navigation systems and personalization.

The first book in this area of fast-growing economic and scientific importance, it is indispensable for both researchers in software or embedded security and professionals in the automotive industry.

RFID  Security and Privacy - 7th International Workshop, RFIDsec 2011, Amherst,  MA, USA, June 26-28, 2011, Revised Selected... RFID Security and Privacy - 7th International Workshop, RFIDsec 2011, Amherst, MA, USA, June 26-28, 2011, Revised Selected Papers (Paperback, 2012)
Ari Juels, Christof Paar
R1,532 Discovery Miles 15 320 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-worksop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2011, held in Amherst, Massachusetts, USA, in June 2011. The 12 revised full papers presented were carefully reviewed and selected from 21 initial submissions for inclusion in the book. The papers focus on minimalism in cryptography, on-tag cryptography, securing RFID with physics, and protocol-level security in RFID.

Kryptografie verstandlich - Ein Lehrbuch fur Studierende und Anwender (German, Paperback, 1. Aufl. 2016): Christof Paar, Jan... Kryptografie verstandlich - Ein Lehrbuch fur Studierende und Anwender (German, Paperback, 1. Aufl. 2016)
Christof Paar, Jan Pelzl
R1,236 Discovery Miles 12 360 Ships in 10 - 15 working days

Das Buch gibt eine umfassende Einfuhrung in moderne angewandte Kryptografie. Es behandelt nahezu alle kryptografischen Verfahren mit praktischer Relevanz. Es werden symmetrische Verfahren (DES, AES, PRESENT, Stromchiffren), asymmetrische Verfahren (RSA, Diffie-Hellmann, elliptische Kurven) sowie digitale Signaturen, Hash-Funktionen, Message Authentication Codes sowie Schlusselaustauschprotokolle vorgestellt. Fur alle Krypto-Verfahren werden aktuelle Sicherheitseinschatzungen und Implementierungseigenschaften beschrieben.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Johnny English
Rowan Atkinson, John Malkovich, … DVD  (1)
R53 R31 Discovery Miles 310
Call The Midwife - Season 10
Jenny Agutter, Linda Bassett, … DVD R209 Discovery Miles 2 090
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
JCB Soft Toe Slip On Safety Boot (Desert…
R1,439 Discovery Miles 14 390
Elecstor 18W In-Line UPS (Black)
R999 R869 Discovery Miles 8 690
Kingston Technology DataTraveler Exodia…
 (1)
R106 Discovery Miles 1 060
Merry Christmas
Mariah Carey, Walter Afanasieff, … CD R122 R112 Discovery Miles 1 120
Elastoplus Elastic Adhesive Bandage…
R70 Discovery Miles 700
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300

 

Partners