0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Advances in Cryptology -- CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012,... Advances in Cryptology -- CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings (Paperback, 2012 ed.)
Reihaneh Safavi-Naini, Ran Canetti
R1,571 Discovery Miles 15 710 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functional encryption, proofs systems, protocols, hash functions, composable security, privacy, leakage and side-channels, signatures, implementation analysis, black-box separation, cryptanalysis, quantum cryptography, and key encapsulation and one-way functions.

Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013.... Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings (Paperback, 2013 ed.)
Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini
R1,487 Discovery Miles 14 870 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.

Information Theoretic Security - Third International Conference, ICITS 2008, Calgary, Canada,  August 10-13, 2008, Proceedings... Information Theoretic Security - Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings (Paperback, 2008 ed.)
Reihaneh Safavi-Naini
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

ICITS 2008, the Third InternationalConference on Information Theoretic Se- rity, was held in Calgary, Alberta, Canada, during August 10-13, 2008, at the Universityof Calgary.This seriesof conferences wasstarted with the 2005IEEE InformationTheoryWorkshoponTheoryandPracticein Information-Theoretic Security (ITW 2005, Japan), held on Awaji Island, Japan, October 16-19,2005. The conference series aims at bringing focus to security research when there is no unproven computational assumption on the adversary. This is the fra- work proposed by Claude Shannon in his seminal paper formalizing modern unclassi?ed research on cryptography. Over the last few decades, Shannon's approach to formalizing security has been used in various other areas including authentication, secure communication, key exchange, multiparty computation and information hiding to name a few. Coding theory has also proven to be a powerful tool in the construction of security systems with information theoretic security. Therewere43submitted papers ofwhich14wereaccepted.Eachcontributed paper was reviewed by three members of the Program Committee. In the case of co-authorship by a Program Committee member the paper was reviewed by ?ve members of the committee (no committee member reviewed their own s- mission). In addition to the accepted papers, the conference also included nine invited speakers, whose contributions were not refereed. These proceedings c- tain the acceptedpapers with anyrevisionsrequiredbythe ProgramCommittee as well as the contributions by invited speakers.

Digital Rights Management - Technologies, Issues, Challenges and Systems (Paperback, 2006 ed.): Reihaneh Safavi-Naini, Moti Yung Digital Rights Management - Technologies, Issues, Challenges and Systems (Paperback, 2006 ed.)
Reihaneh Safavi-Naini, Moti Yung
R1,535 Discovery Miles 15 350 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems, DRMTICS 2005, held in Sydney, Australia, in October/November 2005. Presents 26 carefully reviewed full papers organized in topical sections on assurance and authentication issues, legal and related issues, expressing rights and management, watermarking, software issues, fingerprinting and image authentication, supporting cryptographic technology, P2P issues, implementations and architectures.

Information Security and Privacy - 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings... Information Security and Privacy - 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (Paperback, 2006 ed.)
Lynn Batten, Reihaneh Safavi-Naini
R1,584 Discovery Miles 15 840 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical sections on stream ciphers, symmetric key ciphers, network security, cryptographic applications, secure implementation, signatures, theory, security applications, provable security, protocols, as well as hashing and message authentication.

Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014,... Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Nicolas Christin, Reihaneh Safavi-Naini
R2,735 Discovery Miles 27 350 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile system security, incentives, game theory and risk, and bitcoin anonymity.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Perception of Pixelated Images
Talis Bachmann Paperback R1,123 Discovery Miles 11 230
Being There - Backstories From The…
Tony Leon Paperback R350 R312 Discovery Miles 3 120
The Land Is Ours - Black Lawyers And The…
Tembeka Ngcukaitobi Paperback  (11)
R400 R369 Discovery Miles 3 690
The Tea Ladies Of St Jude's Hospital
Joanna Nell Paperback R437 R399 Discovery Miles 3 990
Hallowed Ground
Hope Anika Paperback R517 Discovery Miles 5 170
Collections of the New York Historical…
New York Historical Society Paperback R641 Discovery Miles 6 410
Calculus for Cognitive Scientists…
James K. Peterson Hardcover R4,167 Discovery Miles 41 670
Sabotage - Eskom Under Siege
Kyle Cowan Paperback  (2)
R340 R314 Discovery Miles 3 140
Social Emotions in Nature and Artifact
Jonathan Gratch, Stacy Marsella Hardcover R3,466 Discovery Miles 34 660
Dinosaurs, Diamonds And Democracy - A…
Francis Wilson Paperback  (2)
R248 Discovery Miles 2 480

 

Partners