0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (3)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Functional Encryption (Paperback, 1st ed. 2021): Khairol Amali Bin Ahmad, Khaleel Ahmad, Uma N. Dulhare Functional Encryption (Paperback, 1st ed. 2021)
Khairol Amali Bin Ahmad, Khaleel Ahmad, Uma N. Dulhare
R2,965 Discovery Miles 29 650 Ships in 10 - 15 working days

This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature, and digital watermarking. This book is organized into fifteen chapters; topics include foundations of functional encryption, impact of group theory in cryptosystems, elliptic curve cryptography, XTR algorithm, pairing based cryptography, NTRU algorithms, ring units, cocks IBE schemes, Boneh-Franklin IBE, Sakai-Kasahara IBE, hierarchical identity based encryption, attribute based Encryption, extensions of IBE and related primitives, and digital signatures. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.

Functional Encryption (Hardcover, 1st ed. 2021): Khairol Amali Bin Ahmad, Khaleel Ahmad, Uma N. Dulhare Functional Encryption (Hardcover, 1st ed. 2021)
Khairol Amali Bin Ahmad, Khaleel Ahmad, Uma N. Dulhare
R2,998 Discovery Miles 29 980 Ships in 10 - 15 working days

This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature, and digital watermarking. This book is organized into fifteen chapters; topics include foundations of functional encryption, impact of group theory in cryptosystems, elliptic curve cryptography, XTR algorithm, pairing based cryptography, NTRU algorithms, ring units, cocks IBE schemes, Boneh-Franklin IBE, Sakai-Kasahara IBE, hierarchical identity based encryption, attribute based Encryption, extensions of IBE and related primitives, and digital signatures. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.

Emerging Security Algorithms and Techniques (Hardcover): Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh Emerging Security Algorithms and Techniques (Hardcover)
Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh
R4,009 Discovery Miles 40 090 Ships in 12 - 17 working days

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission. Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich-Goldwasser-Halevi, Identity Based Encryption, and Attribute Based Encryption. There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc. The book offers comprehensive coverage of the most essential topics, including: Modular Arithmetic, Finite Fields Prime Number, DLP, Integer Factorization Problem Symmetric Cryptography Asymmetric Cryptography Post-Quantum Cryptography Identity Based Encryption Attribute Based Encryption Key Management Entity Authentication, Message Authentication Digital Signatures Hands-On "SageMath" This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

Opportunistic Networks - Mobility Models, Protocols, Security, and Privacy (Hardcover): Khaleel Ahmad, Nur Izura Udzir, Ganesh... Opportunistic Networks - Mobility Models, Protocols, Security, and Privacy (Hardcover)
Khaleel Ahmad, Nur Izura Udzir, Ganesh Chandra Deka
R5,206 Discovery Miles 52 060 Ships in 12 - 17 working days

Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Expendables 2
Sylvester Stallone, Jason Statham, … Blu-ray disc  (1)
R54 Discovery Miles 540
Trustfall
Pink CD R240 Discovery Miles 2 400
Sony PlayStation 5 Slim Console (Glacier…
R15,299 Discovery Miles 152 990
The Walking Dead - Season 1 / 2 / 3 / 4
Andrew Lincoln Blu-ray disc  (1)
R288 Discovery Miles 2 880
Sylvanian Families Country Tree School
 (7)
R2,759 Discovery Miles 27 590
Cable Guys Controller and Smartphone…
R399 R359 Discovery Miles 3 590
Kingston Technology DataTraveler Exodia…
 (1)
R106 Discovery Miles 1 060
Large 1680D Boys & Girls Backpack…
R507 Discovery Miles 5 070
Comfort Food From Your Slow Cooker - 100…
Sarah Flower Paperback R550 R455 Discovery Miles 4 550
Sterile Wound Dressing
R5 Discovery Miles 50

 

Partners