0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised... Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Kenneth G. Paterson, Douglas Stebila
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019. The 26 full papers presented in this volume were carefully reviewed and selected from 74 submissions. They cover the following research areas: Design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, cryptography for the Internet of Things.

Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015,... Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings (Paperback, 2015 ed.)
Ernest Foo, Douglas Stebila
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
We Were Perfect Parents Until We Had…
Vanessa Raphaely, Karin Schimke Paperback R330 R220 Discovery Miles 2 200
Breaking A Rainbow, Building A Nation…
Rekgotsofetse Chikane Paperback R290 R227 Discovery Miles 2 270
Eight Days In July - Inside The Zuma…
Qaanitah Hunter, Kaveel Singh, … Paperback  (1)
R340 R292 Discovery Miles 2 920
Women In Solitary - Inside The Female…
Shanthini Naidoo Paperback  (1)
R355 R305 Discovery Miles 3 050
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, … Paperback R320 R250 Discovery Miles 2 500
To The Wolves - How Traitor Cops Crafted…
Caryn Dolley Paperback  (2)
R282 Discovery Miles 2 820
Blood Brothers - To Battleground…
Deon Lamprecht Paperback R290 R195 Discovery Miles 1 950
Hiking Beyond Cape Town - 40 Inspiring…
Nina du Plessis, Willie Olivier Paperback R320 R250 Discovery Miles 2 500
Jump - A Memoir
Lenerd Louw Paperback R248 Discovery Miles 2 480
Inside The Belly Of The Beast - The Real…
Angelo Agrizzi Paperback  (1)
R277 Discovery Miles 2 770

 

Partners