0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (8)
  • R2,500 - R5,000 (8)
  • -
Status
Brand

Showing 1 - 16 of 16 matches in All Departments

Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013,... Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Dongdai Lin, Shouhuai Xu, Moti Yung
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013. The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system security.

Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3,... Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers (Paperback, 2012 ed.)
Chuankun Wu, Moti Yung, Dongdai Lin
R1,501 Discovery Miles 15 010 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.

Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings... Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings (Paperback)
Dongdai Lin, Gene Tsudik, Xiaoyun Wang
R1,479 Discovery Miles 14 790 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.

Information Security and Cryptology - 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008,... Information Security and Cryptology - 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers (Paperback, 2009 ed.)
Moti Yung, Peng Liu, Dongdai Lin
R1,516 Discovery Miles 15 160 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008.

The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.

Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings... Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Dengguo Feng, Dongdai Lin, Moti Yung
R1,645 Discovery Miles 16 450 Ships in 10 - 15 working days

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware, theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions."

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R3,370 Discovery Miles 33 700 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R3,127 Discovery Miles 31 270 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R2,865 Discovery Miles 28 650 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R2,872 Discovery Miles 28 720 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I (Paperback, 1st ed. 2019)
Dongdai Lin, Kazue Sako
R2,407 Discovery Miles 24 070 Ships in 10 - 15 working days

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.

Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II (Paperback, 1st ed. 2019)
Dongdai Lin, Kazue Sako
R2,667 Discovery Miles 26 670 Ships in 10 - 15 working days

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.

Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017,... Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Xiaofeng Chen, Dongdai Lin, Moti Yung
R1,544 Discovery Miles 15 440 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.

Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised... Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Kefei Chen, Dongdai Lin, Moti Yung
R3,025 Discovery Miles 30 250 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.

Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised... Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Dongdai Lin, Xiaofeng Wang, Moti Yung
R2,864 Discovery Miles 28 640 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.

Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007,... Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Paperback, 2008 ed.)
Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

The Third SKLOIS Conference on Information Security and Cryptology (- scrypt2007)wasorganizedbytheStateKeyLaboratoryofInformationSecurity of the Chinese Academy of Sciences in cooperation with Qinhai University for Nationalities. This international conference was held in Xining, Qinhai Province of China, and was sponsored by the Institute of Software, the Chinese Academy of Sciences, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. By now, Inscrypt (the International SKLOIS Conference on Information - curity and Cryptology) has become a tradition, and it is, in fact, a leading event in this area, which takes place annually in China. We are pleased with the continuous support by authors, committee members, reviewers, sponsors and organizers. Indeed, the research areas covered by Inscrypt are important, since modern computing (including communication infrastructures and applications) requires increased security, trust, safety and reliability. This need has motivated the research community worldwide to produce important fundamental, exp- imental and applied work in the wide areas of cryptography and information securityresearchin recent years.Accordingly, the programof Inscrypt 2007c- ered numerous ?elds of research within these general areas

Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014,... Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Dongdai Lin, Moti Yung, Jianying Zhou
R3,036 Discovery Miles 30 360 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
My Favourite Mistake
Marian Keyes Paperback  (1)
R385 R295 Discovery Miles 2 950
The Collected Regrets Of Clover
Mikki Brammer Paperback R305 R238 Discovery Miles 2 380
The Other End Of The Telescope - How To…
Ian Russell Paperback R250 R200 Discovery Miles 2 000
Build - An Unorthodox Guide To Making…
Tony Fadell Paperback  (2)
R380 R297 Discovery Miles 2 970
A History Of Burning
Janika Oza Paperback R355 R277 Discovery Miles 2 770
The English Patient
Michael Ondaatje Paperback  (1)
R305 R244 Discovery Miles 2 440
The Tea Merchant
Jackie Phamotse Paperback R300 R215 Discovery Miles 2 150
Heks
Dibi Breytenbach Paperback R320 R235 Discovery Miles 2 350
Life Lessons - How To Fail And Win
Alan Knott-Craig Paperback R320 R235 Discovery Miles 2 350
The Party
Elizabeth Day Paperback  (1)
R311 R226 Discovery Miles 2 260

 

Partners