0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (5)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Identity-Based Encryption (Hardcover, 2011 ed.): Sanjit Chatterjee, Palash Sarkar Identity-Based Encryption (Hardcover, 2011 ed.)
Sanjit Chatterjee, Palash Sarkar
R2,788 Discovery Miles 27 880 Ships in 10 - 15 working days

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I (Paperback, 2014 ed.)
Palash Sarkar, Tetsu Iwata
R3,128 Discovery Miles 31 280 Ships in 10 - 15 working days

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II (Paperback, 2014 ed.)
Palash Sarkar, Tetsu Iwata
R3,002 Discovery Miles 30 020 Ships in 10 - 15 working days

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Identity-Based Encryption (Paperback, 2011 ed.): Sanjit Chatterjee, Palash Sarkar Identity-Based Encryption (Paperback, 2011 ed.)
Sanjit Chatterjee, Palash Sarkar
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I (Paperback, 2013 ed.)
Kazue Sako, Palash Sarkar
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Advances in Cryptology -- ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (Paperback, 2013 ed.)
Kazue Sako, Palash Sarkar
R1,549 Discovery Miles 15 490 Ships in 10 - 15 working days

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Progress in Cryptology - INDOCRYPT 2002 - Third International Conference on Cryptology in India Hyderabad, India, December... Progress in Cryptology - INDOCRYPT 2002 - Third International Conference on Cryptology in India Hyderabad, India, December 16-18, 2002 (Paperback, 2002 ed.)
Alfred Menezes, Palash Sarkar
R1,657 Discovery Miles 16 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002.The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new public-key schemes, foundations, public-key infrastructures, fingerprinting and watermarking, public-key protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer.  

An Introduction to Algorithmic Finance, Algorithmic Trading and Blockchain (Abridged, Hardcover, Abridged edition): Satya... An Introduction to Algorithmic Finance, Algorithmic Trading and Blockchain (Abridged, Hardcover, Abridged edition)
Satya Chakravarty, Palash Sarkar
R2,750 Discovery Miles 27 500 Ships in 12 - 17 working days

The purpose of An Introduction to Algorithmic Finance is to provide a broad-based accessible introduction to three of the presently most important areas of computational finance, namely, option pricing, algorithmic trading and blockchain. This will provide a basic understanding required for a career in the finance industry and for doing more specialized courses in finance.An Introduction to Algorithmic Finance breaks down into three parts. The first part provides the necessary theoretical background to Derivatives, Options and Stochastic Dominance. The second part covers various algorithmic issues of finance, discussing specific algorithms, their applications and consequences. The third part of the book is devoted to blockchain and cryptocurrency which complements the first two parts.An Introduction to Algorithmic Finance is an interesting, important read for anyone interested in or invested in the finance industry & it highlights and explains current phenomena in algorithmic finance in an articulate manner.

A Course on Cooperative Game Theory (Hardcover): Satya R. Chakravarty, Manipushpak Mitra, Palash Sarkar A Course on Cooperative Game Theory (Hardcover)
Satya R. Chakravarty, Manipushpak Mitra, Palash Sarkar
R2,146 Discovery Miles 21 460 Ships in 12 - 17 working days

Cooperative game theory deals with situations where objectives of participants of the game are partially cooperative and partially conflicting. It is in the interest of participants to cooperate in the sense of making binding agreements to achieve the maximum possible benefit. When it comes to distribution of benefit/payoffs, participants have conflicting interests. Such situations are usually modelled as cooperative games. While the book mainly discusses transferable utility games, there is also a brief analysis of non-transferable utility games. Alternative solution concepts to cooperative game theoretic problems are presented in chapters 1-9 and the next four chapters present issues related to computations of solutions discussed in the earlier chapters. The proofs of all results presented in the book are quite explicit. Additionally the mathematical techniques employed in demonstrating the results will be helpful to those who wish to learn application of mathematics for solving problems in game theory.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ultra Link UL-TMN3978 Tilting Wall…
R239 R224 Discovery Miles 2 240
OMC! Gemstone Jewellery Kit
Kit R280 R129 Discovery Miles 1 290
Wagworld Pet Blankie (Blue) - X Large…
R309 R159 Discovery Miles 1 590
Switched High Surge 12-Way Multiplug…
R499 R427 Discovery Miles 4 270
Mission Impossible 6: Fallout
Tom Cruise, Henry Cavill, … Blu-ray disc  (1)
R131 R91 Discovery Miles 910
Red Elephant Horizon Backpack…
R486 Discovery Miles 4 860
Conwood Juliet Vanity Case (Black)
R606 Discovery Miles 6 060
Understanding the Purpose and Power of…
Myles Munroe Paperback R280 R210 Discovery Miles 2 100
Robert - A Queer And Crooked Memoir For…
Robert Hamblin Paperback  (1)
R335 R288 Discovery Miles 2 880
Bostik Glue Stick - Loose (25g)
R42 R22 Discovery Miles 220

 

Partners