0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (6)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25-... Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings (Paperback, 2013 ed.)
Ed Dawson
R1,505 Discovery Miles 15 050 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.

Information Security Practice and Experience - Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007,... Information Security Practice and Experience - Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings (Paperback, 2007 ed.)
Ed Dawson, Duncan S. Wong
R1,495 Discovery Miles 14 950 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Information Security Practice and Experience Conference, ISPEC 2007, held in Hong Kong, China in May 2007.

The 24 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on cryptanalysis, signatures, network security and security management, privacy and applications, cryptographic algorithms and implementations, authentication and key management, as well as cryptosystems.

Progress in Cryptology - Mycrypt 2005 - First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia,... Progress in Cryptology - Mycrypt 2005 - First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings (Paperback, 2005 ed.)
Ed Dawson, Serge Vaudenay
R1,485 Discovery Miles 14 850 Ships in 10 - 15 working days

Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized by the Information Security - search Lab at Swinburne University of Technology (Sarawak Campus), NISER (National ICT Security and Emergency Response Centre) and INSPEM (Ins- tute for MathematicalResearch)at UPM (UniversityPutra Malaysia).Mycrypt 2005 was held in Kuala Lumpur, Malaysia during September 28-30 2005, in conjunction with the e-Secure Malaysia 2005 convention. Therewere90paper submissionsfrom23 countriescoveringall areasof cr- tologic research, from which 19 were accepted. We would like to extend our thanks to all authors who submitted papers to Mycrypt 2005. Each paper was sentanonymouslytoatleast3membersoftheInternationalProgramCommittee for reviews and comments. The review comments were then followed by disc- sions among the Program Committee. A recipient of the Best Paper Award was also selected after voting among Program Committee members. The winning paper was "Distinguishing Attacks on T-functions" by Simon Kunzli ] (FH A- gau, Swizerland), Pascal Junod (Nagravision SA, Switzerland) and Willi Meier (FH Aargau, Swizerland). These proceedings contain revised versions of all the accepted papers. The conference program included three keynote papers: Hideki Imai (Tokyo University)presenteda paper entitled "TrendsandChallenges forSecurer Cr- tography in Practice." Moti Yung (Columbia University) presented a paper entitled "E?cient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers." Colin Boyd (QUT) presented a paper entitled "Security of Two-Party Identity-Based Key Agreement." We are extremely grateful for the time and e?ort of all the members of the Program Committee in the review process. Their names may be found overleaf."

Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings... Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings (Paperback)
Ed Dawson, Andrew Clark, Colin Boyd
R1,683 Discovery Miles 16 830 Ships in 10 - 15 working days

ACISP 2000, the Fifth Australasian Conference on Information Security and Privacy, was held in Brisbane, Australia, 10-12 July, 2000. The conference was sponsored by the Information Security Research Centre at Queensland Univ- sity of Technology, the Australian Computer Society, Telstra, Boeing Australia Limited, SecureGate Limited, and RSA Security Pty Ltd. We are grateful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors, and users of information security systems. The aim of the conference is to have a series of technical refereed and invited papers to discuss all di?erent aspects of information security. The program committee invited seven distinguished sp- kers: Mike Burmester, G. R. Blakley, Bob Blakley, Brian Denehy, Roger Lyle, John Snare, and Alan Underwood. Mike Burmester from Royal Holloway C- lege, UniversityofLondonpresentedapaperentitled"ASurveyofKeyDistri- tion"; G. R. Blakley from Texas A&M University and Bob Blakley from the IBM Tivoli Security Business Unit presented a paper entitled "All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce"; Brian Denehy from SecureGate Limited presented a paper entitled "Secure Networks or Network Security - Approaches toBoth";RogerLylefromStandardsAustraliaandJohnSnarefromTelstrap- sented a paper entitled "Perspectives on Australia's New Information Security Management Standard"; and Alan Underwood from the Australian Computer Societypresentedapaperentitled"ProfessionalEthicsinaSecurityandPrivacy Context - The Perspective of a National Computing Society." There were 81 technical papers submitted to the conference from an int- national authorship. These papers were refereed by the program committee and 37 papers were accepted for the conference.

Information Security and Privacy - Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998,... Information Security and Privacy - Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings (Paperback)
Colin Boyd, Ed Dawson
R1,649 Discovery Miles 16 490 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submissions; also included are two invited contributions. The book is divided in sections on network security, block ciphers, stream ciphers, authorization codes and Boolean functions, software security and electronic commerce, public key cryptography, hardware, access control, protocols, secret sharing, and digital signatures.

Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings... Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Josef Pieprzyk, Hossein Ghodosi, Ed Dawson
R1,528 Discovery Miles 15 280 Ships in 10 - 15 working days

Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security.

The Good Soldier; a Selection of Soldiers' Letters, 1914-1918 (Paperback): N P Ed Dawson The Good Soldier; a Selection of Soldiers' Letters, 1914-1918 (Paperback)
N P Ed Dawson
R556 Discovery Miles 5 560 Ships in 10 - 15 working days
La Petite Ville (French, Paperback): L. -B (Louis-Benoit) 1769-1828 Picard, John C Ed Dawson La Petite Ville (French, Paperback)
L. -B (Louis-Benoit) 1769-1828 Picard, John C Ed Dawson
R614 R516 Discovery Miles 5 160 Save R98 (16%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ambulance
Jake Gyllenhaal, Yahya Abdul-Mateen II, … DVD  (1)
R93 Discovery Miles 930
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Peptine Pro Equine Hydrolysed Collagen…
R699 R499 Discovery Miles 4 990
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Mixtape Hand Held Car Vacuum Cleaner
R320 R198 Discovery Miles 1 980
Zap! Air Dry Pottery Kit
Kit R250 R119 Discovery Miles 1 190
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Angelcare Nappy Bin Refills
R165 R145 Discovery Miles 1 450
Sustainably Sourced Sanitary Disposal…
R450 R420 Discovery Miles 4 200
Baby Dove Soap Bar Rich Moisture 75g
R20 Discovery Miles 200

 

Partners