0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Cryptographic Protocol - Security Analysis Based on Trusted Freshness (Hardcover, 2011): Ling Dong, Kefei Chen Cryptographic Protocol - Security Analysis Based on Trusted Freshness (Hardcover, 2011)
Ling Dong, Kefei Chen
R4,599 Discovery Miles 45 990 Ships in 12 - 17 working days

"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is in fact correct, or identify the absence of the security properties, which leads the structure to construct attacks directly. Furthermore, based on the freshness principle, a belief multiset formalism is presented. This formalism s efficiency, rigorousness, and the possibility of its automation are also presented.
The book is intended for researchers, engineers, and graduate students in the fields of communication, computer science and cryptography, and will be especially useful for engineers who need to analyze cryptographic protocols in the real world.
Dr. Ling Dong is a senior engineer in the network construction and information security field. Dr. Kefei Chen is a Professor at the Department of Computer Science and Engineering, Shanghai Jiao Tong University.

Progress on Cryptography - 25 Years of Cryptography in China (Hardcover, 2004 ed.): Kefei Chen Progress on Cryptography - 25 Years of Cryptography in China (Hardcover, 2004 ed.)
Kefei Chen
R2,939 Discovery Miles 29 390 Ships in 10 - 15 working days

Cryptography in Chinese consists of two characters meaning "secret coded." Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding." China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students.

Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students.

Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.

Progress on Cryptography - 25 Years of Cryptography in China (Paperback, Softcover reprint of the original 1st ed. 2004): Kefei... Progress on Cryptography - 25 Years of Cryptography in China (Paperback, Softcover reprint of the original 1st ed. 2004)
Kefei Chen
R2,781 Discovery Miles 27 810 Ships in 10 - 15 working days

Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students. Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.

Provable Security - Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings... Provable Security - Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings (Paperback, 2008 ed.)
Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai
R1,493 Discovery Miles 14 930 Ships in 10 - 15 working days

Thesecondinternationalconferenceonprovablesecurity, ProvSec2008, washeld in Shanghai, China, during October 30th - November 1st, 2008. The conference wassponsoredbyShanghaiJiaoTongUniversity(SJTU)incooperationwiththe Chinese Association for Cryptologic Research (CACR) and the Natural Science Foundation of China (NSFC). The aim of ProvSec is to provide a platform for researchers, scholars, and practitionerstoexchangeideasandextendknowledgeonprovablesecurity, which is an important research area in cryptography. The ?rst ProvSec was held in Wollongong, Australia, in 2007. This year, the conference received 79 papers and the program committee selected 25 papers during eight weeks' thorough reviewing process. The authors ofthe selected papersarefrom12 di?erentcountries: Australia, Belgium, China, Estonia, France, Germany, India, Japan, Norway, Singapore, the UK, and the USA. We are grateful to the members of the program committee for their many hours of valuable time and hard work. In addition to the regular conference program, the conference hosted two invited talks: - Kenny Paterson (University of London, Royal Holloway): Non-interactive Key Distribution and Identity-Based Encryption: A Historical Perspective - PhillipRogaway(University ofCalifornia, Davis): BlockcipherModes of- eration: Culture and Counter-Culture in Modern Cryptography. The conference was also one of the special events for the 50th anniversary of the Department of Computer Science at SJTU. We extend our gratitude to all the people involved in organizing ProvSec from the Department of Computer Science and Engineering and the Lab for InformationSecurityofShanghaiJiaoTongUniversity, inparticulartoYuLong, Yanfei Zheng, Meiju Chen, Zhihua Su, and Bo Zhu for their great e?orts in making the conference run smoot

Cryptology and Network Security - 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings... Cryptology and Network Security - 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings (Paperback)
David Pointcheval, Yi Mu, Kefei Chen
R1,500 Discovery Miles 15 000 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China in December 2006.

The 26 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on encryption, key exchange, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, as well as disponibility and reliability.

Advances in Cryptology -- ASIACRYPT 2006 - 12th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2006 - 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings (Paperback, 2006 ed.)
Xuejia Lai, Kefei Chen
R1,675 Discovery Miles 16 750 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The 30 revised full papers cover attacks on hash functions, stream ciphers, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures.

Information Security Practice and Experience - Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006,... Information Security Practice and Experience - Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Paperback, 2006 ed.)
Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou
R1,630 Discovery Miles 16 300 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.

Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised... Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Kefei Chen, Dongdai Lin, Moti Yung
R3,025 Discovery Miles 30 250 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Huntlea Koletto - Bolster Pet Bed (Kale…
R695 R279 Discovery Miles 2 790
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Deadpool 2 - Super Duper Cut
Ryan Reynolds Blu-ray disc R52 Discovery Miles 520
GM Bowling Machine Ball (Red)
R110 R96 Discovery Miles 960
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950
Samsung EO-IA500BBEGWW Wired In-ear…
R299 R249 Discovery Miles 2 490
Baby Dove Soap Bar Rich Moisture 75g
R20 Discovery Miles 200
Dig & Discover: Dinosaurs - Excavate 2…
Hinkler Pty Ltd Kit R256 R222 Discovery Miles 2 220
Fly Repellent ShooAway (White)
 (3)
R349 R299 Discovery Miles 2 990
Fleshlight Quickshot Vantage Male…
R1,049 R799 Discovery Miles 7 990

 

Partners