0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (1)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Communication System Security (Hardcover): Lidong Chen, Guang Gong Communication System Security (Hardcover)
Lidong Chen, Guang Gong
R5,685 Discovery Miles 56 850 Ships in 12 - 17 working days

Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design.

Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms.

The second part covers security infrastructure support and the main subroutine designs for establishing protected communications. The authors illustrate design principles through network security protocols, including transport layer security (TLS), Internet security protocols (IPsec), the secure shell (SSH), and cellular solutions.

Taking an evolutionary approach to security in today s telecommunication networks, the third part discusses general access authentication protocols, the protocols used for UMTS/LTE, the protocols specified in IETF, and the wireless-specific protection mechanisms for the air link of UMTS/LTE and IEEE 802.11. It also covers key establishment and authentication in broadcast and multicast scenarios.

Moving on to system security, the last part introduces the principles and practice of a trusted platform for communication devices. The authors detail physical-layer security as well as spread-spectrum techniques for anti-jamming attacks.

With much of the material used by the authors in their courses and drawn from their industry experiences, this book is appropriate for a wide audience, from engineering, computer science, and mathematics students to engineers, designers, and computer scientists. Illustrating security principles with existing protocols, the text helps readers understand the principles and practice of security analysis.

Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised... Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers (Paperback, Edition.)
Alex Biryukov, Guang Gong, Douglas R. Stinson
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 17th Annual International Workshop on Selected Areas in Cryptography, SAC 2010, held in Waterloo, Ontario, Canada in August 2010. The 24 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on hash functions, stream ciphers, efficient implementations, coding and combinatorics, block ciphers, side channel attacks, and mathematical aspects.

Sequences, Subsequences, and Consequences - International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007,... Sequences, Subsequences, and Consequences - International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers (Paperback, 2007 ed.)
Solomon W. Golomb, Guang Gong, Tor Helleseth, Hong-Yeop Song
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the International Workshop of Sequences, Subsequences and Consequences, SSC 2007, held in Los Angeles, CA, USA, in May/June 2007.

The 16 revised invited full papers and 1 revised contributed paper presented together with 3 keynote lectures were carefully reviewed and selected for presentation in the book. The theory of sequences from discrete symbol alphabets has found practical applications in many areas of coded communications and in cryptography, including: signal patterns for use in radar and sonar; spectral spreading sequences for CDMA wireless telephony; key streams for direct sequence stream-cipher cryptography; and a variety of forward-error-correcting codes. The workshop permits leading researchers on sequences from around the world to present their latest results and recent developments in this important field.

Sequences and Their Applications - SETA 2006 - 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings... Sequences and Their Applications - SETA 2006 - 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings (Paperback, 2006 ed.)
Guang Gong, Tor Helleseth, Hong-Yeop Song, Kyeongcheol Yang
R2,357 R1,399 Discovery Miles 13 990 Save R958 (41%) Ships in 12 - 17 working days

This book constitutes the refereed proceedings of the 4th International Conference on Sequences and Their Applications, SETA 2006. The book presents 32 revised full papers together with 4 invited lectures. The papers are organized in topical sections on linear complexity of sequences, correlation of sequences, stream ciphers and transforms, topics in complexities of sequences, multi-sequence synthesis, sequences and combinatorics, FCSR sequences, aperiodic correlation and applications, and boolean functions, and more.

Foundations and Practice of Security - 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised... Foundations and Practice of Security - 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro
R1,598 Discovery Miles 15 980 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the 12th International Symposium on Foundations and Practice of Security, FPS 2019, held in Toulouse, France, in November 2019.The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 50 submissions. They cover a range of topics such as machine learning approaches; attack prevention and trustworthiness; and access control models and cryptography.

Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December... Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings (Paperback, Edition.)
Guang Gong, Kishan Chand Gupta
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

Strong Pseudorandompermutations or SPRPs,which were introduced byLuby andRacko? [4], formalize the well established cryptographic notion ofblock ciphers.They provided a construction of SPRP, well known as LRconstruction, which was motivated by the structure of DES[6].The basicbuildingblock is the so called 2n-bit Feistel permutation (or LR round permutation) LR based F K on an n-bitpseudorandomfunction (PRF) F : K n LR (x ,x)=(F (x )?x ,x ),x ,x?{0,1} . F 1 2 K 1 2 1 1 2 K Theirconstruction consists (see Fig 1) offour rounds of Feistel permutations (or three rounds, for PRP), each round involves an application ofanindependent PRF(i.e.with independentrandomkeys K ,K ,K , and K ). More precisely, 1 2 3 4 LR and LR are PRP and SPRP respectively where K ,K ,K K ,K ,K ,K 1 2 3 1 2 3 4 LR := LR := LR (...(LR (*))...). K ,...,K F ,...,F F F 1 r K K K K r r 1 1 After this work, many results are known improvingperformance (reducingthe number of invocations of F )[5] and reducingthekey-sizes (i.e. reusingthe K roundkeys [7,8,10,12,11] orgenerate more keysfromsinglekey by usinga PRF[2]). However there are some limitations.Forexample,wecannotuseas few as single-keyLR (unless wetweak the roundpermutation) orasfew as two-roundsince they are not secure. Distinguishing attacks forsome other LR constructionsarealso known [8]. We list some oftheknow related results (see Table 1). Here all keys K ,K ,...are independently chosen.

Signal Design for Good Correlation - For Wireless Communication, Cryptography, and Radar (Hardcover, New): Solomon W. Golomb,... Signal Design for Good Correlation - For Wireless Communication, Cryptography, and Radar (Hardcover, New)
Solomon W. Golomb, Guang Gong
R3,206 Discovery Miles 32 060 Ships in 9 - 15 working days

This book provides a comprehensive description of the methodologies and the application areas, throughout the range of digital communication, in which individual signals and sets of signals with favorable correlation properties play a central role. The necessary mathematical background is presented to explain how these signals are generated, and to show how they satisfy the appropriate correlation constraints. All the known methods to obtain balanced binary sequences with two-valued autocorrelation, many of them only recently discovered, are presented in depth. The authors treat important application areas including: Code Division Multiple Access (CDMA) signals, such as those already in widespread use for cell-phone communication, and planned for universal adoption in the various approaches to 'third-generation'(3G) cell-phone use; systems for coded radar and sonar signals; communication signals to minimize mutual interference ('cross-talk') in multi-user environments; and pseudo-random sequence generation for secure authentication and for stream cipher cryptology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Samsung EO-IA500BBEGWW Wired In-ear…
R299 R199 Discovery Miles 1 990
Spider-Man: 5-Movie Collection…
Tobey Maguire, Kirsten Dunst, … Blu-ray disc  (1)
R466 Discovery Miles 4 660
Womens 2-Piece Fitness Gym Gloves…
R129 Discovery Miles 1 290
Hoover 35L Wet & Dry Drum Vacuum
R1,599 R1,399 Discovery Miles 13 990
Goldfinger
Honor Blackman, Lois Maxwell, … Blu-ray disc R53 Discovery Miles 530
Jumbo Puzzle Mates Puzzle & Roll Storage…
 (4)
R699 R419 Discovery Miles 4 190
Mountain Backgammon - The Classic Game…
Lily Dyu R575 R460 Discovery Miles 4 600
Cellphone Ring & Stand [Black]
R22 Discovery Miles 220
Snookums Baby Honey Dummies (6 Months)
R75 R63 Discovery Miles 630
Rotatrim A4 Paper Ream (80gsm)(500…
R97 Discovery Miles 970

 

Partners