0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland,... Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers (Paperback, 2012)
Tuomas Aura, Kimmo Jarvinen, Kaisa Nyberg
R1,470 Discovery Miles 14 700 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. The 13 full papers and 3 short papers presented were carefully reviewed and selected from 37 submissions. The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The contributions cover the following topics: network security; monitoring and reputation; privacy; policy enforcement; cryptography and protocols.

Fast Software Encryption - 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected... Fast Software Encryption - 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers (Paperback, 2008 ed.)
Kaisa Nyberg
R1,530 Discovery Miles 15 300 Ships in 10 - 15 working days

FastSoftwareEncryption(FSE)isthe15thinaseriesofworkshopsonsymmetric cryptography. It is sponsored by the International Association for Cryptologic Research(IACR), andpreviousFSEworkshopshavebeenheldaroundtheworld: 1993 Cambridge, UK 1994 Leuven, Belgium 1996 Cambridge, UK 1997 Haifa, Israel 1998 Paris, France 1999 Rome, Italy 2000 New York, USA 2001 Yokohama, Japan 2002 Leuven, Belgium 2003 Lund, Sweden 2004 New Delhi, India 2005 Paris, France 2006 Graz, Austria 2007 Luxembourg, Luxembourg The FSE workshop is devoted to the foreground research on fast and secure primitivesforsymmetriccryptography, includingthedesignandanalysisofblock ciphers, stream ciphers, encryption schemes, analysis and evaluation tools, hash functions, and message authentication codes. This year 72 papers were submitted to FSE including a large number of hi- quality and focused submissions, from which 26 papers for regular presentation and 4 papers for short presentation were selected. I wish to thank the authors of all submissions for their scienti?c contribution to the workshop. The workshop also featured an invited talk by Lars R. Knudsen with the title "Hash functions and SHA-3." The traditional rump session with short informal presentations on current topics was organized and chaired by Daniel J. Bernstein. EachsubmissionwasreviewedbyatleastthreeProgramCommitteemembers. Each submission originating from the Program Committee received at least ?ve reviews.The?nalselectionwasmadeafterathoroughdiscussion.Iwishtothank all ProgramCommittee members and referees for their generouswork.I am also gratefulto ThomasBaign eresformaintainingandcustomizingthe iChair review management software, which o?ered an excellent support for the demanding reviewing task. I would also like to thank him for setting up a beautiful and informative website and for compiling the pre-proceedings.

Selected Areas in Cryptography - 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August... Selected Areas in Cryptography - 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers (Paperback, 2003 ed.)
Kaisa Nyberg, Howard Heys
R1,637 Discovery Miles 16 370 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 9th Annual International Workshop on Selected Areas in Cryptology, SAC 2002, held in St. John's, Newfoundland, Canada, in August 2002. The 25 revised full papers presented were carefully selected from 90 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on elliptic curve enhancements, SNOW, encryption schemes, differential attacks, Boolean functions and stream ciphers, block cipher security, signatures and secret sharing, MAC and hash constructions, and RSA and XTR enhancements.

Advances in Cryptology - EUROCRYPT '98 - International Conference on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '98 - International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceedings (Paperback, 1998 ed.)
Kaisa Nyberg
R1,753 Discovery Miles 17 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 1998 International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '98, held in Espoo, Finland, in May/June 1998.
The book presents 44 revised full papers selected from a total of 161 submissions. The papers are organized in sections on distributed cryptography, complexity, cryptanalysis of block ciphers, computational algorithms, paradigms for symmetric systems, public key cryptosystems, multi-party computation, digital signatures, Boolean functions, combinatorial design and analysis, elliptic curve systems, and electronic commerce and payment.

Topics in Cryptology -- CT-RSA 2015 - The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April... Topics in Cryptology -- CT-RSA 2015 - The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (Paperback, 2015 ed.)
Kaisa Nyberg
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based encryption, membership, secure and efficient implementation of AES based Cryptosystems, chosen ciphertext attacks in theory and practice, algorithms for solving hard problems, constructions of hash functions and message authentication codes, secure multiparty computation, authenticated encryption, detecting and tracing malicious activities, implentation attacks on exponentiation algorithms and homomorphic encryption and its applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bostik Super Clear Tape Value Pack (12mm…
R44 R34 Discovery Miles 340
Higher
Michael Buble CD  (1)
R459 Discovery Miles 4 590
Sony NEW Playstation Dualshock 4 v2…
 (22)
R1,428 Discovery Miles 14 280
Bostik Clear Gel (25ml)
R40 R23 Discovery Miles 230
Johanne 14 - Real South African Food
Hope Malau Paperback  (5)
R275 R208 Discovery Miles 2 080
First Dutch Brands Leaf Design Hanging…
R145 Discovery Miles 1 450
Bostik Clear on Blister Card (25ml)
R38 Discovery Miles 380
Bostik Crystal Clear Tape
R43 Discovery Miles 430
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Nintendo Joy-Con Neon Controller Pair…
R1,899 R1,489 Discovery Miles 14 890

 

Partners