0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland,... Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers (Paperback, 2012)
Tuomas Aura, Kimmo Jarvinen, Kaisa Nyberg
R1,470 Discovery Miles 14 700 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. The 13 full papers and 3 short papers presented were carefully reviewed and selected from 37 submissions. The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The contributions cover the following topics: network security; monitoring and reputation; privacy; policy enforcement; cryptography and protocols.

Fast Software Encryption - 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected... Fast Software Encryption - 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers (Paperback, 2008 ed.)
Kaisa Nyberg
R1,530 Discovery Miles 15 300 Ships in 10 - 15 working days

FastSoftwareEncryption(FSE)isthe15thinaseriesofworkshopsonsymmetric cryptography. It is sponsored by the International Association for Cryptologic Research(IACR), andpreviousFSEworkshopshavebeenheldaroundtheworld: 1993 Cambridge, UK 1994 Leuven, Belgium 1996 Cambridge, UK 1997 Haifa, Israel 1998 Paris, France 1999 Rome, Italy 2000 New York, USA 2001 Yokohama, Japan 2002 Leuven, Belgium 2003 Lund, Sweden 2004 New Delhi, India 2005 Paris, France 2006 Graz, Austria 2007 Luxembourg, Luxembourg The FSE workshop is devoted to the foreground research on fast and secure primitivesforsymmetriccryptography, includingthedesignandanalysisofblock ciphers, stream ciphers, encryption schemes, analysis and evaluation tools, hash functions, and message authentication codes. This year 72 papers were submitted to FSE including a large number of hi- quality and focused submissions, from which 26 papers for regular presentation and 4 papers for short presentation were selected. I wish to thank the authors of all submissions for their scienti?c contribution to the workshop. The workshop also featured an invited talk by Lars R. Knudsen with the title "Hash functions and SHA-3." The traditional rump session with short informal presentations on current topics was organized and chaired by Daniel J. Bernstein. EachsubmissionwasreviewedbyatleastthreeProgramCommitteemembers. Each submission originating from the Program Committee received at least ?ve reviews.The?nalselectionwasmadeafterathoroughdiscussion.Iwishtothank all ProgramCommittee members and referees for their generouswork.I am also gratefulto ThomasBaign eresformaintainingandcustomizingthe iChair review management software, which o?ered an excellent support for the demanding reviewing task. I would also like to thank him for setting up a beautiful and informative website and for compiling the pre-proceedings.

Selected Areas in Cryptography - 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August... Selected Areas in Cryptography - 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers (Paperback, 2003 ed.)
Kaisa Nyberg, Howard Heys
R1,637 Discovery Miles 16 370 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 9th Annual International Workshop on Selected Areas in Cryptology, SAC 2002, held in St. John's, Newfoundland, Canada, in August 2002. The 25 revised full papers presented were carefully selected from 90 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on elliptic curve enhancements, SNOW, encryption schemes, differential attacks, Boolean functions and stream ciphers, block cipher security, signatures and secret sharing, MAC and hash constructions, and RSA and XTR enhancements.

Advances in Cryptology - EUROCRYPT '98 - International Conference on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '98 - International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceedings (Paperback, 1998 ed.)
Kaisa Nyberg
R1,753 Discovery Miles 17 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 1998 International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '98, held in Espoo, Finland, in May/June 1998.
The book presents 44 revised full papers selected from a total of 161 submissions. The papers are organized in sections on distributed cryptography, complexity, cryptanalysis of block ciphers, computational algorithms, paradigms for symmetric systems, public key cryptosystems, multi-party computation, digital signatures, Boolean functions, combinatorial design and analysis, elliptic curve systems, and electronic commerce and payment.

Topics in Cryptology -- CT-RSA 2015 - The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April... Topics in Cryptology -- CT-RSA 2015 - The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (Paperback, 2015 ed.)
Kaisa Nyberg
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based encryption, membership, secure and efficient implementation of AES based Cryptosystems, chosen ciphertext attacks in theory and practice, algorithms for solving hard problems, constructions of hash functions and message authentication codes, secure multiparty computation, authenticated encryption, detecting and tracing malicious activities, implentation attacks on exponentiation algorithms and homomorphic encryption and its applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Imploding The Mirage
The Killers CD R437 Discovery Miles 4 370
Microsoft Xbox Series X Console (1TB…
R14,999 Discovery Miles 149 990
Blinde Mol Of Wyse Uil? - Hoe Om Met…
Susan Coetzer Paperback R270 R232 Discovery Miles 2 320
Wagworld Leafy Mat - Fleece…
 (1)
R549 R279 Discovery Miles 2 790
Cable Guy Ikon "Light Up" PlayStation…
R543 Discovery Miles 5 430
UGreen CAT6-50177 CAT6 UTP Ethernet LAN…
R109 Discovery Miles 1 090
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Samsung A04e 32GB SM-A042F/DS (Black…
R2,099 R1,955 Discovery Miles 19 550
ZA Cute Butterfly Earrings and Necklace…
R712 R499 Discovery Miles 4 990
Breaking Bread - A Memoir
Jonathan Jansen Paperback R330 R220 Discovery Miles 2 200

 

Partners