0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Information Security and Cryptoloy - ICISC 2008 - 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised... Information Security and Cryptoloy - ICISC 2008 - 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers (Paperback, 2009 ed.)
Pil Joong Lee, Jung Hee Cheon
R1,514 Discovery Miles 15 140 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008.

The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.

Advances in Cryptology - ASIACRYPT 2004 - 10th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2004 - 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings (Paperback, 2004 ed.)
Pil Joong Lee
R1,635 Discovery Miles 16 350 Ships in 10 - 15 working days

The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5-9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Research center for Information Security) at ICU (Information and Communi- tionsUniversity), andwas?nanciallysupportedbyMIC(MinistryofInformation and Communication) in Korea. The conference received, from 30 countries, 208 submissions that represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. Each paper, without the authors' information, was reviewed by at least three members of the program committee, and the papers (co-)authored by members of the program committee were reviewed by at least six members. We also blinded the reviewers' names among the reviewers until the ?nal decision, by using pseudonyms. The reviews were then followed by deep discussions on the papers, which greatly contributed to the quality of the ?nal selection. In most cases, extensive comments were sent to the authors. Among 208 submissions, the program committee selected 36 papers. Two submissions were merged into a single paper, yielding the total of 35 papers acceptedforpresentationinthetechnicalprogramoftheconference.Manyhi- quality works could not be accepted because of the competitive nature of the conference and the challenging task of selecting a program. These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers.

Information Security and Cryptology - ICISC 2002 - 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised... Information Security and Cryptology - ICISC 2002 - 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers (Paperback, Revised edition)
Pil Joong Lee, Chae Hoon Lim
R1,714 Discovery Miles 17 140 Ships in 10 - 15 working days

 This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Playseat Evolution Racing Chair (Black)
 (3)
R8,999 Discovery Miles 89 990
Hoe Ek Dit Onthou
Francois Van Coke, Annie Klopper Paperback R300 R219 Discovery Miles 2 190
The Twisted Series - Love / Games / Hate…
Ana Huang Paperback R999 R887 Discovery Miles 8 870
Efekto Cypermethrin - Emulsifiable…
R109 Discovery Miles 1 090
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950
HP 330 Wireless Keyboard and Mouse Combo
R800 R400 Discovery Miles 4 000
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Lucifer - Season 5
Tom Ellis DVD  (1)
R174 Discovery Miles 1 740
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100

 

Partners