0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (5)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Identity-Based Encryption (Hardcover, 2011 ed.): Sanjit Chatterjee, Palash Sarkar Identity-Based Encryption (Hardcover, 2011 ed.)
Sanjit Chatterjee, Palash Sarkar
R2,788 Discovery Miles 27 880 Ships in 10 - 15 working days

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I (Paperback, 2014 ed.)
Palash Sarkar, Tetsu Iwata
R3,128 Discovery Miles 31 280 Ships in 10 - 15 working days

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II (Paperback, 2014 ed.)
Palash Sarkar, Tetsu Iwata
R3,002 Discovery Miles 30 020 Ships in 10 - 15 working days

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Identity-Based Encryption (Paperback, 2011 ed.): Sanjit Chatterjee, Palash Sarkar Identity-Based Encryption (Paperback, 2011 ed.)
Sanjit Chatterjee, Palash Sarkar
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I (Paperback, 2013 ed.)
Kazue Sako, Palash Sarkar
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Advances in Cryptology -- ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (Paperback, 2013 ed.)
Kazue Sako, Palash Sarkar
R1,549 Discovery Miles 15 490 Ships in 10 - 15 working days

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Progress in Cryptology - INDOCRYPT 2002 - Third International Conference on Cryptology in India Hyderabad, India, December... Progress in Cryptology - INDOCRYPT 2002 - Third International Conference on Cryptology in India Hyderabad, India, December 16-18, 2002 (Paperback, 2002 ed.)
Alfred Menezes, Palash Sarkar
R1,657 Discovery Miles 16 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002.The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new public-key schemes, foundations, public-key infrastructures, fingerprinting and watermarking, public-key protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer.  

An Introduction to Algorithmic Finance, Algorithmic Trading and Blockchain (Abridged, Hardcover, Abridged edition): Satya... An Introduction to Algorithmic Finance, Algorithmic Trading and Blockchain (Abridged, Hardcover, Abridged edition)
Satya Chakravarty, Palash Sarkar
R2,817 Discovery Miles 28 170 Ships in 12 - 17 working days

The purpose of An Introduction to Algorithmic Finance is to provide a broad-based accessible introduction to three of the presently most important areas of computational finance, namely, option pricing, algorithmic trading and blockchain. This will provide a basic understanding required for a career in the finance industry and for doing more specialized courses in finance.An Introduction to Algorithmic Finance breaks down into three parts. The first part provides the necessary theoretical background to Derivatives, Options and Stochastic Dominance. The second part covers various algorithmic issues of finance, discussing specific algorithms, their applications and consequences. The third part of the book is devoted to blockchain and cryptocurrency which complements the first two parts.An Introduction to Algorithmic Finance is an interesting, important read for anyone interested in or invested in the finance industry & it highlights and explains current phenomena in algorithmic finance in an articulate manner.

A Course on Cooperative Game Theory (Hardcover): Satya R. Chakravarty, Manipushpak Mitra, Palash Sarkar A Course on Cooperative Game Theory (Hardcover)
Satya R. Chakravarty, Manipushpak Mitra, Palash Sarkar
R2,198 Discovery Miles 21 980 Ships in 12 - 17 working days

Cooperative game theory deals with situations where objectives of participants of the game are partially cooperative and partially conflicting. It is in the interest of participants to cooperate in the sense of making binding agreements to achieve the maximum possible benefit. When it comes to distribution of benefit/payoffs, participants have conflicting interests. Such situations are usually modelled as cooperative games. While the book mainly discusses transferable utility games, there is also a brief analysis of non-transferable utility games. Alternative solution concepts to cooperative game theoretic problems are presented in chapters 1-9 and the next four chapters present issues related to computations of solutions discussed in the earlier chapters. The proofs of all results presented in the book are quite explicit. Additionally the mathematical techniques employed in demonstrating the results will be helpful to those who wish to learn application of mathematics for solving problems in game theory.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Droomjagter
Leon van Nierop Paperback R340 R266 Discovery Miles 2 660
Introduction To Business Management
Paperback R599 R554 Discovery Miles 5 540
'n Lyf Onthou
Riette Rust Paperback R72 Discovery Miles 720
The Garden - an Illustrated Weekly…
Anonymous Hardcover R1,118 Discovery Miles 11 180
Microeconomics - South African Edition
Gregory Mankiw, Mark Taylor, … Hardcover R564 R531 Discovery Miles 5 310
The Garden Magazine; v.10
Anonymous Hardcover R883 Discovery Miles 8 830
Competition Law And Economic Regulation…
Jonathan Klaaren Paperback R420 R328 Discovery Miles 3 280
Bloodshed
Molly Doyle Hardcover R822 R694 Discovery Miles 6 940
Crops
Robert Scott Burn Hardcover R920 Discovery Miles 9 200
Legacy - Love, Intrigue and Redemption…
Hannah Fielding Paperback  (1)
R269 R246 Discovery Miles 2 460

 

Partners