0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 22 of 22 matches in All Departments

Dante Beyond Borders - Contexts and Reception (Hardcover): Nick Havely, Jonathan Katz, Richard Cooper Dante Beyond Borders - Contexts and Reception (Hardcover)
Nick Havely, Jonathan Katz, Richard Cooper
R2,811 Discovery Miles 28 110 Ships in 10 - 15 working days
Digital Signatures (Hardcover, 1st ed. 2010): Jonathan Katz Digital Signatures (Hardcover, 1st ed. 2010)
Jonathan Katz
R3,045 Discovery Miles 30 450 Ships in 10 - 15 working days

As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren't there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my graduate students now ask me: what is the best resource for learning about (various topics in) cryptography? This monograph is intended to serve as an answer to these 1 questions - at least with regard to digital signature schemes. Given the above motivation, this book has been written with a beginninggraduate student in mind: a student who is potentially interested in doing research in the ?eld of cryptography, and who has taken an introductory course on the subject, but is not sure where to turn next. Though intended primarily for that audience, I hope that advanced graduate students and researchers will ?nd the book useful as well. In addition to covering various constructions of digital signature schemes in a uni?ed framework, this text also serves as a compendium of various "folklore" results that are, perhaps, not as well known as they should be. This book could also serve as a textbook for a graduate seminar on advanced cryptography; in such a class, I expect the entire book could be covered at a leisurely pace in one semester with perhaps some time left over for excursions into related topics.

Digital Signatures (Paperback, 2010 ed.): Jonathan Katz Digital Signatures (Paperback, 2010 ed.)
Jonathan Katz
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren't there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my graduate students now ask me: what is the best resource for learning about (various topics in) cryptography? This monograph is intended to serve as an answer to these 1 questions - at least with regard to digital signature schemes. Given the above motivation, this book has been written with a beginninggraduate student in mind: a student who is potentially interested in doing research in the ?eld of cryptography, and who has taken an introductory course on the subject, but is not sure where to turn next. Though intended primarily for that audience, I hope that advanced graduate students and researchers will ?nd the book useful as well. In addition to covering various constructions of digital signature schemes in a uni?ed framework, this text also serves as a compendium of various "folklore" results that are, perhaps, not as well known as they should be. This book could also serve as a textbook for a graduate seminar on advanced cryptography; in such a class, I expect the entire book could be covered at a leisurely pace in one semester with perhaps some time left over for excursions into related topics.

Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings... Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings (Paperback, 2007 ed.)
Jonathan Katz, Moti Yung
R1,769 Discovery Miles 17 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, June 2007. The 31 revised full papers cover signature schemes, computer and network security, cryptanalysis, group-oriented security, cryptographic protocols, anonymous authentication, identity-based cryptography, and security in wireless, ad-hoc, and peer-to-peer networks.

A Descriptive Catalogue of the Sanskrit and other Indian Manuscripts of the Chandra Shum Shere Collection in the Bodleian... A Descriptive Catalogue of the Sanskrit and other Indian Manuscripts of the Chandra Shum Shere Collection in the Bodleian Library: Part III. Stotras (Paperback)
K. Parameswara Aithal; Edited by (general) Jonathan Katz
R6,487 Discovery Miles 64 870 Ships in 12 - 17 working days

This third volume of the catalogue contains descriptive entries for over five hundred manuscripts of Sanskrit hymnic and devotional poems, running to nearly seven hundred separate compositions in manuscripts running from the sixteenth to the nineteenth century. This important genre of classical Indian literature is valuable not only for its intrinsic poetic and aesthetic merits but also as a vital source of information for the history of Indian religion and its numerous traditions and affiliations. The collection includes works of famous devotional poets and philosophers as well as nearly two hundred compositions whose authors are unknown including some for which there are no other known available manuscripts in any other libraries. Professor Aithal is an internationally renowned expert in the field, and his descriptions include details of scribal and palaeographic features; his useful introduction outlines the literary genre and the principles of its classification.

A Descriptive Catalogue of the Sanskrit and other Indian Manuscripts of the Chandra Shum Shere Collection in the Bodleian... A Descriptive Catalogue of the Sanskrit and other Indian Manuscripts of the Chandra Shum Shere Collection in the Bodleian Library: Part II. Epics and Puranas (Paperback)
John Brockington; Edited by (general) Jonathan Katz
R2,831 Discovery Miles 28 310 Ships in 12 - 17 working days

The arrival in 1909 of the library of manuscripts now known as the Chandra Shum Shere collection increased by well over six thousand the already substantial holdings of the Bodleian and Indian Institute libraries, and made Oxford the repository of the largest known collection of Sanskrit manuscripts outside the Indian subcontinent. It is a huge and uniquely valuable collection of paper and palm leaf manuscripts, purchased for Oxford University by Sir Chandra Shum Shere, the then Prime Minister of Nepal. The General Editor of the catalogue of the collection is Dr Jonathan Katz, Consultant to the Oriental Department of the Bodleian Library, formerly Librarian of the Indian Institute, and present Master of the Queen's Scholars at Westminster School.

A Descriptive Catalogue of the Sanskrit and other Indian Manuscripts of the Chandra Shum Shere Collection in the Bodleian... A Descriptive Catalogue of the Sanskrit and other Indian Manuscripts of the Chandra Shum Shere Collection in the Bodleian Library: Part I: Jyotihsastra (Paperback)
David Pingree; Edited by (general) Jonathan Katz
R2,045 Discovery Miles 20 450 Ships in 12 - 17 working days
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24,... Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
R3,064 Discovery Miles 30 640 Ships in 10 - 15 working days

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24,... Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
R3,082 Discovery Miles 30 820 Ships in 10 - 15 working days

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24,... Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
R3,058 Discovery Miles 30 580 Ships in 10 - 15 working days

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18,... Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
R1,667 Discovery Miles 16 670 Ships in 10 - 15 working days

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18,... Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
R3,454 Discovery Miles 34 540 Ships in 10 - 15 working days

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18,... Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
R1,661 Discovery Miles 16 610 Ships in 10 - 15 working days

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 -... Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings (Paperback, 1st ed. 2022)
Shlomi Dolev, Jonathan Katz, Amnon Meisels
R2,580 Discovery Miles 25 800 Ships in 12 - 17 working days

This book constitutes the refereed proceedings of the 6th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2022, held in Be'er Sheva, Israel, in June - July 2022. The 24 full and 11 short papers presented together with a keynote paper in this volume were carefully reviewed and selected from 53 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Public-Key Cryptography -- PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography,... Public-Key Cryptography -- PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (Paperback, 2015 ed.)
Jonathan Katz
R1,703 Discovery Miles 17 030 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.

A Catalogue of the Chandra Shum Shere Collection in the Bodleian Library - Part IV: Veda. By K. Parameswara Aithal (Paperback):... A Catalogue of the Chandra Shum Shere Collection in the Bodleian Library - Part IV: Veda. By K. Parameswara Aithal (Paperback)
Parameswara Aithal; Edited by Jonathan Katz
R3,122 R2,653 Discovery Miles 26 530 Save R469 (15%) Ships in 12 - 17 working days

The Chandra Shum Shere Collection, which arrived in Oxford from Varanasi over a century ago, is one of the largest Indian manuscript libraries in the world outside the Subcontinent. Part IV of this descriptive catalogue adds much to our knowledge of the collection as a whole and gives details of nearly 900 manuscripts in the field of Vedic literature, a fine and varied corpus of Sanskrit primary texts and commentaries. There are some indications that the original owner of this collection was a ritualist with interests both in sacrificial practice and in traditional Vedic scholarship. This element of the collection brings the published catalogue records near to the half-way point, and other subject volumes are present in preparation. Catalogue entries give full information of the coverage of the nature and extent of the texts, materials, scripts, scribes, dates and places of writing, and former owners of the manuscripts.

Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA,... Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings (Paperback, 2011 ed.)
John S. Baras, Jonathan Katz, Eitan Altman
R1,910 Discovery Miles 19 100 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The 16 revised full papers and 2 plenary keynotes presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor networks, network games, security insurance, security and trust in social networks and security investments.

Cloud Computing Security - Foundations and Research Directions (Paperback): Anrin Chakraborti, Reza Curtmola, Jonathan Katz,... Cloud Computing Security - Foundations and Research Directions (Paperback)
Anrin Chakraborti, Reza Curtmola, Jonathan Katz, Jason Nieh, Ahmad-Reza Sadeghi, …
R2,005 Discovery Miles 20 050 Ships in 10 - 15 working days

Cloud services have revolutionized computing in the modern world. In an increasingly networked ecosystem, it is commonplace for enterprises and private parties alike to leverage cloud services for storage and compute. The most obvious benefits include scalability, increased availability, and the potential for reduced costs when compared to lower-scale on premise infrastructures. In addition, cloud-hosted data (and compute) is accessible across platforms and is not limited by geographical constraints making collaboration attractively viable. However, the benefits of outsourcing data and computation come with security and privacy concerns. This monograph explores the advances in cloud security research across both industry and academia, with a special focus on secure infrastructure, services and storage. Besides overviewing the state of the art, the monograph highlights open problems, and possible future research directions. Cloud security is a broad topic encompassing concepts from a large cross section of domains. To make this monograph concise and meaningful, several topics and challenges that are almost entirely specific to clouds are covered. For this reason, general computing security topics such as intrusion detection, software protection, phishing etc. are excluded. While these are important building blocks that need to be considered in an end-to-end cloud-centric design, they have been extensively addressed elsewhere. The publication is divided into three parts based on a broad clustering into hardware, computation, and storage. The monograph should appeal to researchers, students and professionals who work on Cloud Computing in general, and Cloud Security specifically.

Lottery Of Intimacies (Paperback): Jonathan Katz Lottery Of Intimacies (Paperback)
Jonathan Katz
R531 Discovery Miles 5 310 Ships in 10 - 15 working days
Objects in Motion (Paperback): Jonathan Katz Objects in Motion (Paperback)
Jonathan Katz
R527 Discovery Miles 5 270 Ships in 10 - 15 working days
Matchmaking in the Archive - 19 Conversations with the Dead and 3 Encounters with Ghosts (Hardcover): E.G. Crichton, Chris... Matchmaking in the Archive - 19 Conversations with the Dead and 3 Encounters with Ghosts (Hardcover)
E.G. Crichton, Chris Vargas, Jonathan Katz, Michelle Tea
R1,919 R1,795 Discovery Miles 17 950 Save R124 (6%) Ships in 12 - 17 working days
Introduction to Modern Cryptography (Hardcover, 3rd edition): Jonathan Katz, Yehuda Lindell Introduction to Modern Cryptography (Hardcover, 3rd edition)
Jonathan Katz, Yehuda Lindell
R3,283 Discovery Miles 32 830 Ships in 12 - 17 working days

Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Heart Of A Strong Woman - From Daveyton…
Xoliswa Nduneni-Ngema, Fred Khumalo Paperback R350 R301 Discovery Miles 3 010
Stabilo Boss Original Highlighters…
R144 R108 Discovery Miles 1 080
Bestway E-Z-Broom Pole (360cm x 30mm)
R326 Discovery Miles 3 260
Multi Colour Animal Print Neckerchief
R119 Discovery Miles 1 190
Bait - To Catch A Killer
Janine Lazarus Paperback R320 R275 Discovery Miles 2 750
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
The Car
Arctic Monkeys CD R383 Discovery Miles 3 830
Microsoft Xbox Series X Console (1TB)
 (21)
R14,999 Discovery Miles 149 990
LG 20MK400H 19.5" WXGA LED Monitor…
R2,199 R1,699 Discovery Miles 16 990
Home Classix Double Wall Tumbler (360ml…
R89 R73 Discovery Miles 730

 

Partners