0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (1)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Communication System Security (Hardcover): Lidong Chen, Guang Gong Communication System Security (Hardcover)
Lidong Chen, Guang Gong
R5,739 Discovery Miles 57 390 Ships in 12 - 17 working days

Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design.

Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms.

The second part covers security infrastructure support and the main subroutine designs for establishing protected communications. The authors illustrate design principles through network security protocols, including transport layer security (TLS), Internet security protocols (IPsec), the secure shell (SSH), and cellular solutions.

Taking an evolutionary approach to security in today s telecommunication networks, the third part discusses general access authentication protocols, the protocols used for UMTS/LTE, the protocols specified in IETF, and the wireless-specific protection mechanisms for the air link of UMTS/LTE and IEEE 802.11. It also covers key establishment and authentication in broadcast and multicast scenarios.

Moving on to system security, the last part introduces the principles and practice of a trusted platform for communication devices. The authors detail physical-layer security as well as spread-spectrum techniques for anti-jamming attacks.

With much of the material used by the authors in their courses and drawn from their industry experiences, this book is appropriate for a wide audience, from engineering, computer science, and mathematics students to engineers, designers, and computer scientists. Illustrating security principles with existing protocols, the text helps readers understand the principles and practice of security analysis.

Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised... Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers (Paperback, Edition.)
Alex Biryukov, Guang Gong, Douglas R. Stinson
R1,579 Discovery Miles 15 790 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 17th Annual International Workshop on Selected Areas in Cryptography, SAC 2010, held in Waterloo, Ontario, Canada in August 2010. The 24 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on hash functions, stream ciphers, efficient implementations, coding and combinatorics, block ciphers, side channel attacks, and mathematical aspects.

Sequences, Subsequences, and Consequences - International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007,... Sequences, Subsequences, and Consequences - International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers (Paperback, 2007 ed.)
Solomon W. Golomb, Guang Gong, Tor Helleseth, Hong-Yeop Song
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the International Workshop of Sequences, Subsequences and Consequences, SSC 2007, held in Los Angeles, CA, USA, in May/June 2007.

The 16 revised invited full papers and 1 revised contributed paper presented together with 3 keynote lectures were carefully reviewed and selected for presentation in the book. The theory of sequences from discrete symbol alphabets has found practical applications in many areas of coded communications and in cryptography, including: signal patterns for use in radar and sonar; spectral spreading sequences for CDMA wireless telephony; key streams for direct sequence stream-cipher cryptography; and a variety of forward-error-correcting codes. The workshop permits leading researchers on sequences from around the world to present their latest results and recent developments in this important field.

Sequences and Their Applications - SETA 2006 - 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings... Sequences and Their Applications - SETA 2006 - 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings (Paperback, 2006 ed.)
Guang Gong, Tor Helleseth, Hong-Yeop Song, Kyeongcheol Yang
R2,264 R1,366 Discovery Miles 13 660 Save R898 (40%) Ships in 12 - 17 working days

This book constitutes the refereed proceedings of the 4th International Conference on Sequences and Their Applications, SETA 2006. The book presents 32 revised full papers together with 4 invited lectures. The papers are organized in topical sections on linear complexity of sequences, correlation of sequences, stream ciphers and transforms, topics in complexities of sequences, multi-sequence synthesis, sequences and combinatorics, FCSR sequences, aperiodic correlation and applications, and boolean functions, and more.

Foundations and Practice of Security - 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised... Foundations and Practice of Security - 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro
R1,578 Discovery Miles 15 780 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the 12th International Symposium on Foundations and Practice of Security, FPS 2019, held in Toulouse, France, in November 2019.The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 50 submissions. They cover a range of topics such as machine learning approaches; attack prevention and trustworthiness; and access control models and cryptography.

Signal Design for Good Correlation - For Wireless Communication, Cryptography, and Radar (Hardcover, New): Solomon W. Golomb,... Signal Design for Good Correlation - For Wireless Communication, Cryptography, and Radar (Hardcover, New)
Solomon W. Golomb, Guang Gong
R3,082 Discovery Miles 30 820 Ships in 12 - 17 working days

This book provides a comprehensive description of the methodologies and the application areas, throughout the range of digital communication, in which individual signals and sets of signals with favorable correlation properties play a central role. The necessary mathematical background is presented to explain how these signals are generated, and to show how they satisfy the appropriate correlation constraints. All the known methods to obtain balanced binary sequences with two-valued autocorrelation, many of them only recently discovered, are presented in depth. The authors treat important application areas including: Code Division Multiple Access (CDMA) signals, such as those already in widespread use for cell-phone communication, and planned for universal adoption in the various approaches to 'third-generation'(3G) cell-phone use; systems for coded radar and sonar signals; communication signals to minimize mutual interference ('cross-talk') in multi-user environments; and pseudo-random sequence generation for secure authentication and for stream cipher cryptology.

Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December... Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings (Paperback, Edition.)
Guang Gong, Kishan Chand Gupta
R1,565 Discovery Miles 15 650 Ships in 10 - 15 working days

Strong Pseudorandompermutations or SPRPs,which were introduced byLuby andRacko? [4], formalize the well established cryptographic notion ofblock ciphers.They provided a construction of SPRP, well known as LRconstruction, which was motivated by the structure of DES[6].The basicbuildingblock is the so called 2n-bit Feistel permutation (or LR round permutation) LR based F K on an n-bitpseudorandomfunction (PRF) F : K n LR (x ,x)=(F (x )?x ,x ),x ,x?{0,1} . F 1 2 K 1 2 1 1 2 K Theirconstruction consists (see Fig 1) offour rounds of Feistel permutations (or three rounds, for PRP), each round involves an application ofanindependent PRF(i.e.with independentrandomkeys K ,K ,K , and K ). More precisely, 1 2 3 4 LR and LR are PRP and SPRP respectively where K ,K ,K K ,K ,K ,K 1 2 3 1 2 3 4 LR := LR := LR (...(LR (*))...). K ,...,K F ,...,F F F 1 r K K K K r r 1 1 After this work, many results are known improvingperformance (reducingthe number of invocations of F )[5] and reducingthekey-sizes (i.e. reusingthe K roundkeys [7,8,10,12,11] orgenerate more keysfromsinglekey by usinga PRF[2]). However there are some limitations.Forexample,wecannotuseas few as single-keyLR (unless wetweak the roundpermutation) orasfew as two-roundsince they are not secure. Distinguishing attacks forsome other LR constructionsarealso known [8]. We list some oftheknow related results (see Table 1). Here all keys K ,K ,...are independently chosen.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Marco Prestige Laptop Bag (Black)
R676 Discovery Miles 6 760
Ultimate Cookies & Cupcakes For Kids
Hinkler Pty Ltd Kit R299 R234 Discovery Miles 2 340
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Mellerware Swiss - Plastic Floor Fan…
R349 Discovery Miles 3 490
Little Black Book
Brittany Murphy, Ron Livingston, … DVD  (2)
R33 Discovery Miles 330
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Create Your Own Candles
Hinkler Pty Ltd Kit R199 R156 Discovery Miles 1 560

 

Partners