0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (5)
  • -
Status
Brand

Showing 1 - 10 of 10 matches in All Departments

Identity-Based Encryption (Hardcover, 2011 ed.): Sanjit Chatterjee, Palash Sarkar Identity-Based Encryption (Hardcover, 2011 ed.)
Sanjit Chatterjee, Palash Sarkar
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I (Paperback, 2014 ed.)
Palash Sarkar, Tetsu Iwata
R3,181 Discovery Miles 31 810 Ships in 10 - 15 working days

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II (Paperback, 2014 ed.)
Palash Sarkar, Tetsu Iwata
R3,054 Discovery Miles 30 540 Ships in 10 - 15 working days

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Identity-Based Encryption (Paperback, 2011 ed.): Sanjit Chatterjee, Palash Sarkar Identity-Based Encryption (Paperback, 2011 ed.)
Sanjit Chatterjee, Palash Sarkar
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I (Paperback, 2013 ed.)
Kazue Sako, Palash Sarkar
R1,602 Discovery Miles 16 020 Ships in 10 - 15 working days

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Advances in Cryptology -- ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (Paperback, 2013 ed.)
Kazue Sako, Palash Sarkar
R1,601 Discovery Miles 16 010 Ships in 10 - 15 working days

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Progress in Cryptology - INDOCRYPT 2002 - Third International Conference on Cryptology in India Hyderabad, India, December... Progress in Cryptology - INDOCRYPT 2002 - Third International Conference on Cryptology in India Hyderabad, India, December 16-18, 2002 (Paperback, 2002 ed.)
Alfred Menezes, Palash Sarkar
R1,709 Discovery Miles 17 090 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002.The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new public-key schemes, foundations, public-key infrastructures, fingerprinting and watermarking, public-key protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer.  

An Introduction to Algorithmic Finance, Algorithmic Trading and Blockchain (Abridged, Hardcover, Abridged edition): Satya... An Introduction to Algorithmic Finance, Algorithmic Trading and Blockchain (Abridged, Hardcover, Abridged edition)
Satya Chakravarty, Palash Sarkar
R3,317 R2,960 Discovery Miles 29 600 Save R357 (11%) Ships in 12 - 19 working days

The purpose of An Introduction to Algorithmic Finance is to provide a broad-based accessible introduction to three of the presently most important areas of computational finance, namely, option pricing, algorithmic trading and blockchain. This will provide a basic understanding required for a career in the finance industry and for doing more specialized courses in finance.An Introduction to Algorithmic Finance breaks down into three parts. The first part provides the necessary theoretical background to Derivatives, Options and Stochastic Dominance. The second part covers various algorithmic issues of finance, discussing specific algorithms, their applications and consequences. The third part of the book is devoted to blockchain and cryptocurrency which complements the first two parts.An Introduction to Algorithmic Finance is an interesting, important read for anyone interested in or invested in the finance industry & it highlights and explains current phenomena in algorithmic finance in an articulate manner.

A Course on Cooperative Game Theory (Paperback): Satya R. Chakravarty, Manipushpak Mitra, Palash Sarkar A Course on Cooperative Game Theory (Paperback)
Satya R. Chakravarty, Manipushpak Mitra, Palash Sarkar
R967 Discovery Miles 9 670 Ships in 12 - 19 working days

Cooperative game theory deals with situations where objectives of participants of the game are partially cooperative and partially conflicting. It is in the interest of participants to cooperate in the sense of making binding agreements to achieve the maximum possible benefit. When it comes to distribution of benefit/payoffs, participants have conflicting interests. Such situations are usually modelled as cooperative games. While the book mainly discusses transferable utility games, there is also a brief analysis of non-transferable utility games. Alternative solution concepts to cooperative game theoretic problems are presented in chapters 1-9 and the next four chapters present issues related to computations of solutions discussed in the earlier chapters. The proofs of all results presented in the book are quite explicit. Additionally the mathematical techniques employed in demonstrating the results will be helpful to those who wish to learn application of mathematics for solving problems in game theory.

A Course on Cooperative Game Theory (Hardcover): Satya R. Chakravarty, Manipushpak Mitra, Palash Sarkar A Course on Cooperative Game Theory (Hardcover)
Satya R. Chakravarty, Manipushpak Mitra, Palash Sarkar
R2,402 Discovery Miles 24 020 Ships in 12 - 19 working days

Cooperative game theory deals with situations where objectives of participants of the game are partially cooperative and partially conflicting. It is in the interest of participants to cooperate in the sense of making binding agreements to achieve the maximum possible benefit. When it comes to distribution of benefit/payoffs, participants have conflicting interests. Such situations are usually modelled as cooperative games. While the book mainly discusses transferable utility games, there is also a brief analysis of non-transferable utility games. Alternative solution concepts to cooperative game theoretic problems are presented in chapters 1-9 and the next four chapters present issues related to computations of solutions discussed in the earlier chapters. The proofs of all results presented in the book are quite explicit. Additionally the mathematical techniques employed in demonstrating the results will be helpful to those who wish to learn application of mathematics for solving problems in game theory.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Statistics in Clinical and Observational…
Jozef Nauta Hardcover R2,868 Discovery Miles 28 680
Pastoral Leadership Skills for the…
F Lee Jones Hardcover R797 Discovery Miles 7 970
100 Mandela Moments
Kate Sidley Paperback R260 R232 Discovery Miles 2 320
The Argonaut; v. 48 (Jan.-June 1901)
Anonymous Hardcover R1,040 Discovery Miles 10 400
The Clever Guts Diet - How to…
Michael Mosley Paperback  (1)
R334 R303 Discovery Miles 3 030
Equitable Compensation and Disgorgement…
Simone Degeling, Jason NE Varuhas Hardcover R4,252 Discovery Miles 42 520
The Dore-Britton Gallery - The Biblical…
William Britton Hardcover R1,773 Discovery Miles 17 730
Asia-Pacific Trusts Law, Volume 1…
Ying Khai Liew, Matthew Harding Hardcover R4,601 Discovery Miles 46 010
Transforming Gender and Family Relations…
Asa Lundqvist Hardcover R2,997 Discovery Miles 29 970
The Death Of Democracy - Hitler's Rise…
Benjamin Carter Hett Paperback  (1)
R333 R302 Discovery Miles 3 020

 

Partners