0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (6)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25-... Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings (Paperback, 2013 ed.)
Ed Dawson
R1,558 Discovery Miles 15 580 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.

Information Security Practice and Experience - Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007,... Information Security Practice and Experience - Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings (Paperback, 2007 ed.)
Ed Dawson, Duncan S. Wong
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Information Security Practice and Experience Conference, ISPEC 2007, held in Hong Kong, China in May 2007.

The 24 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on cryptanalysis, signatures, network security and security management, privacy and applications, cryptographic algorithms and implementations, authentication and key management, as well as cryptosystems.

Progress in Cryptology - Mycrypt 2005 - First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia,... Progress in Cryptology - Mycrypt 2005 - First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings (Paperback, 2005 ed.)
Ed Dawson, Serge Vaudenay
R1,537 Discovery Miles 15 370 Ships in 10 - 15 working days

Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized by the Information Security - search Lab at Swinburne University of Technology (Sarawak Campus), NISER (National ICT Security and Emergency Response Centre) and INSPEM (Ins- tute for MathematicalResearch)at UPM (UniversityPutra Malaysia).Mycrypt 2005 was held in Kuala Lumpur, Malaysia during September 28-30 2005, in conjunction with the e-Secure Malaysia 2005 convention. Therewere90paper submissionsfrom23 countriescoveringall areasof cr- tologic research, from which 19 were accepted. We would like to extend our thanks to all authors who submitted papers to Mycrypt 2005. Each paper was sentanonymouslytoatleast3membersoftheInternationalProgramCommittee for reviews and comments. The review comments were then followed by disc- sions among the Program Committee. A recipient of the Best Paper Award was also selected after voting among Program Committee members. The winning paper was "Distinguishing Attacks on T-functions" by Simon Kunzli ] (FH A- gau, Swizerland), Pascal Junod (Nagravision SA, Switzerland) and Willi Meier (FH Aargau, Swizerland). These proceedings contain revised versions of all the accepted papers. The conference program included three keynote papers: Hideki Imai (Tokyo University)presenteda paper entitled "TrendsandChallenges forSecurer Cr- tography in Practice." Moti Yung (Columbia University) presented a paper entitled "E?cient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers." Colin Boyd (QUT) presented a paper entitled "Security of Two-Party Identity-Based Key Agreement." We are extremely grateful for the time and e?ort of all the members of the Program Committee in the review process. Their names may be found overleaf."

Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings... Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings (Paperback)
Ed Dawson, Andrew Clark, Colin Boyd
R1,735 Discovery Miles 17 350 Ships in 10 - 15 working days

ACISP 2000, the Fifth Australasian Conference on Information Security and Privacy, was held in Brisbane, Australia, 10-12 July, 2000. The conference was sponsored by the Information Security Research Centre at Queensland Univ- sity of Technology, the Australian Computer Society, Telstra, Boeing Australia Limited, SecureGate Limited, and RSA Security Pty Ltd. We are grateful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors, and users of information security systems. The aim of the conference is to have a series of technical refereed and invited papers to discuss all di?erent aspects of information security. The program committee invited seven distinguished sp- kers: Mike Burmester, G. R. Blakley, Bob Blakley, Brian Denehy, Roger Lyle, John Snare, and Alan Underwood. Mike Burmester from Royal Holloway C- lege, UniversityofLondonpresentedapaperentitled"ASurveyofKeyDistri- tion"; G. R. Blakley from Texas A&M University and Bob Blakley from the IBM Tivoli Security Business Unit presented a paper entitled "All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce"; Brian Denehy from SecureGate Limited presented a paper entitled "Secure Networks or Network Security - Approaches toBoth";RogerLylefromStandardsAustraliaandJohnSnarefromTelstrap- sented a paper entitled "Perspectives on Australia's New Information Security Management Standard"; and Alan Underwood from the Australian Computer Societypresentedapaperentitled"ProfessionalEthicsinaSecurityandPrivacy Context - The Perspective of a National Computing Society." There were 81 technical papers submitted to the conference from an int- national authorship. These papers were refereed by the program committee and 37 papers were accepted for the conference.

Information Security and Privacy - Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998,... Information Security and Privacy - Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings (Paperback)
Colin Boyd, Ed Dawson
R1,702 Discovery Miles 17 020 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submissions; also included are two invited contributions. The book is divided in sections on network security, block ciphers, stream ciphers, authorization codes and Boolean functions, software security and electronic commerce, public key cryptography, hardware, access control, protocols, secret sharing, and digital signatures.

Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings... Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Josef Pieprzyk, Hossein Ghodosi, Ed Dawson
R1,580 Discovery Miles 15 800 Ships in 10 - 15 working days

Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security.

The Good Soldier; a Selection of Soldiers' Letters, 1914-1918 (Paperback): N P Ed Dawson The Good Soldier; a Selection of Soldiers' Letters, 1914-1918 (Paperback)
N P Ed Dawson
R597 Discovery Miles 5 970 Ships in 10 - 15 working days
La Petite Ville (French, Paperback): L. -B (Louis-Benoit) 1769-1828 Picard, John C Ed Dawson La Petite Ville (French, Paperback)
L. -B (Louis-Benoit) 1769-1828 Picard, John C Ed Dawson
R614 R559 Discovery Miles 5 590 Save R55 (9%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Working with Words and Images - New…
Nancy Allen Hardcover R2,800 Discovery Miles 28 000
The Oxford Handbook of Indian Foreign…
David M. Malone, C.Raja Mohan, … Hardcover R4,827 Discovery Miles 48 270
Eight Days In July - Inside The Zuma…
Qaanitah Hunter, Kaveel Singh, … Paperback  (1)
R360 R337 Discovery Miles 3 370
The Globalization Myth - Why Regions…
Shannon K O'Neil Paperback R480 R428 Discovery Miles 4 280
Winged Messenger - Running Your First…
Bruce Fordyce Paperback  (1)
R331 Discovery Miles 3 310
I Have This Nifty Idea - ...Now What Do…
Mike Resnick Hardcover R920 Discovery Miles 9 200
The Archaeology of the Cold War
Todd A Hanson Hardcover R2,005 Discovery Miles 20 050
Creating a Transnational Space in the…
W. Ordeman Hardcover R1,321 Discovery Miles 13 210
The Bomb - South Africa's Nuclear…
Nic Von Wielligh, Wielligh-Steyn von Paperback R679 Discovery Miles 6 790
Essays & Term Papers
Shelley Evans-Marshall Fold-out book or chart R244 Discovery Miles 2 440

 

Partners