|
Showing 1 - 22 of
22 matches in All Departments
Now the most used texbook for introductory cryptography courses in
both mathematics and computer science, the Third Edition builds
upon previous editions by offering several new sections, topics,
and exercises. The authors present the core principles of modern
cryptography, with emphasis on formal definitions, rigorous proofs
of security.
The Other Classical Musics offers challenging new perspectives on
classical music by presenting the history of fifteen parallel
traditions. Winner of the Royal Philharmonic Society Music Award
for Creative Communication 2015 There is a treasure trove of
underappreciated music out there; this book will convince many to
explore it. The Economist Whatis classical music? This book answers
the question in a manner never before attempted, by presenting the
history of fifteen parallel traditions, of which Western classical
music is just one. Each music is analysed in terms of itsmodes,
scales, and theory; its instruments, forms, and aesthetic goals;
its historical development, golden age, and condition today; and
the conventions governing its performance. The writers are leading
ethnomusicologists, and their approach is based on the belief that
music is best understood in the context of the culture which gave
rise to it. By including Mande and Uzbek-Tajik music - plus North
American jazz - in addition to the better-knownstyles of the Middle
East, the Indian sub-continent, the Far East, and South-East Asia,
this book offers challenging new perspectives on the word
'classical'. It shows the extent to which most classical traditions
are underpinnedby improvisation, and reveals the cognate origins of
seemingly unrelated musics; it reflects the multifarious ways in
which colonialism, migration, and new technology have affected
musical development, and continue to do today. With specialist
language kept to a minimum, it's designed to help both students and
general readers to appreciate musical traditions which may be
unfamiliar to them, and to encounter the reality which lies behind
that lazy adjective'exotic'. MICHAEL CHURCH has spent much of his
career in newspapers as a literary and arts editor; since 2010 he
has been the music and opera critic of The Independent. From 1992
to 2005 he reported on traditional musics all over the world for
the BBC World Service; in 2004, Topic Records released a CD of his
Kazakh field recordings and, in 2007, two further CDs of his
recordings in Georgia and Chechnya. Contributors: Michael Church,
Scott DeVeaux, Ivan Hewett, David W. Hughes, Jonathan Katz, Roderic
Knight, Frank Kouwenhoven, Robert Labaree, Scott Marcus, Terry E.
Miller, Dwight F. Reynolds, Neil Sorrell, Will Sumits, Richard
Widdess, Ameneh Youssefzadeh
As a beginning graduate student, I recall being frustrated by a
general lack of acces sible sources from which I could learn about
(theoretical) cryptography. I remember wondering: why aren't there
more books presenting the basics of cryptography at an introductory
level? Jumping ahead almost a decade later, as a faculty member my
graduate students now ask me: what is the best resource for
learning about (various topics in) cryptography? This monograph is
intended to serve as an answer to these 1 questions - at least with
regard to digital signature schemes. Given the above motivation,
this book has been written with a beginninggraduate student in
mind: a student who is potentially interested in doing research in
the ?eld of cryptography, and who has taken an introductory course
on the subject, but is not sure where to turn next. Though intended
primarily for that audience, I hope that advanced graduate students
and researchers will ?nd the book useful as well. In addition to
covering various constructions of digital signature schemes in a
uni?ed framework, this text also serves as a compendium of various
"folklore" results that are, perhaps, not as well known as they
should be. This book could also serve as a textbook for a graduate
seminar on advanced cryptography; in such a class, I expect the
entire book could be covered at a leisurely pace in one semester
with perhaps some time left over for excursions into related
topics.
This book constitutes the refereed proceedings of the 5th
International Conference on Applied Cryptography and Network
Security, ACNS 2007, held in Zhuhai, China, June 2007. The 31
revised full papers cover signature schemes, computer and network
security, cryptanalysis, group-oriented security, cryptographic
protocols, anonymous authentication, identity-based cryptography,
and security in wireless, ad-hoc, and peer-to-peer networks.
|
Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings (Paperback, 1st ed. 2022)
Shlomi Dolev, Jonathan Katz, Amnon Meisels
|
R2,622
Discovery Miles 26 220
|
Ships in 12 - 17 working days
|
This book constitutes the refereed proceedings of the 6th
International Symposium on Cyber Security Cryptography and Machine
Learning, CSCML 2022, held in Be'er Sheva, Israel, in June - July
2022. The 24 full and 11 short papers presented together with a
keynote paper in this volume were carefully reviewed and selected
from 53 submissions. They deal with the theory, design, analysis,
implementation, or application of cyber security, cryptography and
machine learning systems and networks, and conceptually innovative
topics in these research areas.
|
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
|
R3,095
Discovery Miles 30 950
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403,
constitutes the refereed proceedings of the 37th Annual
International Cryptology Conference, CRYPTO 2017, held in Santa
Barbara, CA, USA, in August 2017. The 72 revised full papers
presented were carefully reviewed and selected from 311
submissions. The papers are organized in the following topical
sections: functional encryption; foundations; two-party
computation; bitcoin; multiparty computation; award papers;
obfuscation; conditional disclosure of secrets; OT and ORAM;
quantum; hash functions; lattices; signatures; block ciphers;
authenticated encryption; public-key encryption, stream ciphers,
lattice crypto; leakage and subversion; symmetric-key crypto, and
real-world crypto.
|
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
|
R3,120
Discovery Miles 31 200
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403,
constitutes the refereed proceedings of the 37th Annual
International Cryptology Conference, CRYPTO 2017, held in Santa
Barbara, CA, USA, in August 2017. The 72 revised full papers
presented were carefully reviewed and selected from 311
submissions. The papers are organized in the following topical
sections: functional encryption; foundations; two-party
computation; bitcoin; multiparty computation; award papers;
obfuscation; conditional disclosure of secrets; OT and ORAM;
quantum; hash functions; lattices; signatures; block ciphers;
authenticated encryption; public-key encryption, stream ciphers,
lattice crypto; leakage and subversion; symmetric-key crypto, and
real-world crypto.
|
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
|
R3,101
Discovery Miles 31 010
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403,
constitutes the refereed proceedings of the 37th Annual
International Cryptology Conference, CRYPTO 2017, held in Santa
Barbara, CA, USA, in August 2017. The 72 revised full papers
presented were carefully reviewed and selected from 311
submissions. The papers are organized in the following topical
sections: functional encryption; foundations; two-party
computation; bitcoin; multiparty computation; award papers;
obfuscation; conditional disclosure of secrets; OT and ORAM;
quantum; hash functions; lattices; signatures; block ciphers;
authenticated encryption; public-key encryption, stream ciphers,
lattice crypto; leakage and subversion; symmetric-key crypto, and
real-world crypto.
|
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
|
R3,570
Discovery Miles 35 700
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816,
constitutes the refereed proceedings of the 36th Annual
International Cryptology Conference, CRYPTO 2016, held in Santa
Barbara, CA, USA, in August 2016. The 70 revised full papers
presented were carefully reviewed and selected from 274
submissions. The papers are organized in the following topical
sections: provable security for symmetric cryptography; asymmetric
cryptography and cryptanalysis; cryptography in theory and
practice; compromised systems; symmetric cryptanalysis; algorithmic
number theory; symmetric primitives; asymmetric cryptography;
symmetric cryptography; cryptanalytic tools; hardware-oriented
cryptography; secure computation and protocols; obfuscation;
quantum techniques; spooky encryption; IBE, ABE, and functional
encryption; automated tools and synthesis; zero knowledge; theory.
|
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
|
R1,691
Discovery Miles 16 910
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816,
constitutes the refereed proceedings of the 36th Annual
International Cryptology Conference, CRYPTO 2016, held in Santa
Barbara, CA, USA, in August 2016. The 70 revised full papers
presented were carefully reviewed and selected from 274
submissions. The papers are organized in the following topical
sections: provable security for symmetric cryptography; asymmetric
cryptography and cryptanalysis; cryptography in theory and
practice; compromised systems; symmetric cryptanalysis; algorithmic
number theory; symmetric primitives; asymmetric cryptography;
symmetric cryptography; cryptanalytic tools; hardware-oriented
cryptography; secure computation and protocols; obfuscation;
quantum techniques; spooky encryption; IBE, ABE, and functional
encryption; automated tools and synthesis; zero knowledge; theory.
|
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
|
R1,685
Discovery Miles 16 850
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816,
constitutes the refereed proceedings of the 36th Annual
International Cryptology Conference, CRYPTO 2016, held in Santa
Barbara, CA, USA, in August 2016. The 70 revised full papers
presented were carefully reviewed and selected from 274
submissions. The papers are organized in the following topical
sections: provable security for symmetric cryptography; asymmetric
cryptography and cryptanalysis; cryptography in theory and
practice; compromised systems; symmetric cryptanalysis; algorithmic
number theory; symmetric primitives; asymmetric cryptography;
symmetric cryptography; cryptanalytic tools; hardware-oriented
cryptography; secure computation and protocols; obfuscation;
quantum techniques; spooky encryption; IBE, ABE, and functional
encryption; automated tools and synthesis; zero knowledge; theory.
This book constitutes the refereed proceedings of the 18th
International Conference on Practice and Theory in Public-Key
Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in
March/April 2015. The 36 papers presented in this volume were
carefully reviewed and selected from 118 submissions. They are
organized in topical sections named: public-key encryption; e-cash;
cryptanalysis; digital signatures; password-based authentication;
pairint-based cryptography; efficient constructions; cryptography
with imperfect keys; interactive proofs; lattice-based
cryptography; and identity-based, predicate, and functional
encryption.
As a beginning graduate student, I recall being frustrated by a
general lack of acces sible sources from which I could learn about
(theoretical) cryptography. I remember wondering: why aren't there
more books presenting the basics of cryptography at an introductory
level? Jumping ahead almost a decade later, as a faculty member my
graduate students now ask me: what is the best resource for
learning about (various topics in) cryptography? This monograph is
intended to serve as an answer to these 1 questions - at least with
regard to digital signature schemes. Given the above motivation,
this book has been written with a beginninggraduate student in
mind: a student who is potentially interested in doing research in
the ?eld of cryptography, and who has taken an introductory course
on the subject, but is not sure where to turn next. Though intended
primarily for that audience, I hope that advanced graduate students
and researchers will ?nd the book useful as well. In addition to
covering various constructions of digital signature schemes in a
uni?ed framework, this text also serves as a compendium of various
"folklore" results that are, perhaps, not as well known as they
should be. This book could also serve as a textbook for a graduate
seminar on advanced cryptography; in such a class, I expect the
entire book could be covered at a leisurely pace in one semester
with perhaps some time left over for excursions into related
topics.
|
Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings (Paperback, 2011 ed.)
John S. Baras, Jonathan Katz, Eitan Altman
|
R1,931
Discovery Miles 19 310
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Second
International Conference on Decision and Game Theory for Security,
GameSec 2011, held in College Park, Maryland, USA, in November
2011. The 16 revised full papers and 2 plenary keynotes presented
were carefully reviewed and selected from numerous submissions. The
papers are organized in topical sections on attacks, adversaries,
and game theory, wireless adhoc and sensor networks, network games,
security insurance, security and trust in social networks and
security investments.
Cloud services have revolutionized computing in the modern world.
In an increasingly networked ecosystem, it is commonplace for
enterprises and private parties alike to leverage cloud services
for storage and compute. The most obvious benefits include
scalability, increased availability, and the potential for reduced
costs when compared to lower-scale on premise infrastructures. In
addition, cloud-hosted data (and compute) is accessible across
platforms and is not limited by geographical constraints making
collaboration attractively viable. However, the benefits of
outsourcing data and computation come with security and privacy
concerns. This monograph explores the advances in cloud security
research across both industry and academia, with a special focus on
secure infrastructure, services and storage. Besides overviewing
the state of the art, the monograph highlights open problems, and
possible future research directions. Cloud security is a broad
topic encompassing concepts from a large cross section of domains.
To make this monograph concise and meaningful, several topics and
challenges that are almost entirely specific to clouds are covered.
For this reason, general computing security topics such as
intrusion detection, software protection, phishing etc. are
excluded. While these are important building blocks that need to be
considered in an end-to-end cloud-centric design, they have been
extensively addressed elsewhere. The publication is divided into
three parts based on a broad clustering into hardware, computation,
and storage. The monograph should appeal to researchers, students
and professionals who work on Cloud Computing in general, and Cloud
Security specifically.
This third volume of the catalogue contains descriptive entries for over five hundred manuscripts of Sanskrit hymnic and devotional poems, running to nearly seven hundred separate compositions in manuscripts running from the sixteenth to the nineteenth century. This important genre of classical Indian literature is valuable not only for its intrinsic poetic and aesthetic merits but also as a vital source of information for the history of Indian religion and its numerous traditions and affiliations. The collection includes works of famous devotional poets and philosophers as well as nearly two hundred compositions whose authors are unknown including some for which there are no other known available manuscripts in any other libraries. Professor Aithal is an internationally renowned expert in the field, and his descriptions include details of scribal and palaeographic features; his useful introduction outlines the literary genre and the principles of its classification.
Before, During, and After Stonewall: 100 Years of Heroes and
History The Right Side of History tells the 100-year history of
queer activism in a series of revealing close-ups, first-person
accounts, and intimate snapshots of LGBT pioneers and radicals.
This diverse cast stretches from the Edwardian period to today,
including first-person accounts of the key protest that is at the
heart of the 2015 movie Stonewall. The book shows how LGBT folk
have always been in the forefront of progressive social evolution
in the United States. It references heroes like Abraham Lincoln,
Eleanor Roosevelt, Bayard Rustin, Harvey Milk, and Edie Windsor.
Equally, the book honors names that aren't in history books, from
participants in the Names Project, a national phenomenon
memorializing 94,000 AIDS victims, to underground artists and
writers.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|