0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Homomorphic Encryption and Applications (Paperback, 2014 ed.): Xun Yi, Russell Paulet, Elisa Bertino Homomorphic Encryption and Applications (Paperback, 2014 ed.)
Xun Yi, Russell Paulet, Elisa Bertino
R2,625 Discovery Miles 26 250 Ships in 10 - 15 working days

This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.

Private Information Retrieval (Paperback): Xun Yi, Russell Paulet, Elisa Bertino Private Information Retrieval (Paperback)
Xun Yi, Russell Paulet, Elisa Bertino
R1,078 Discovery Miles 10 780 Ships in 10 - 15 working days

This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single-database PIR techniques, this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Cacharel Anais Anais L'original Eau De…
 (1)
R2,317 R992 Discovery Miles 9 920
Tommee Tippee - Explora Feeding Bowl…
R155 R139 Discovery Miles 1 390
Medalist Mini American Football (Pink)
R122 Discovery Miles 1 220
Treeline Tennis Balls (Pack of 3)
R59 R49 Discovery Miles 490
Ab Wheel
R209 R149 Discovery Miles 1 490
Birds Of Greater Southern Africa
Keith Barnes, Terry Stevenson, … Paperback  (4)
R450 R299 Discovery Miles 2 990
Cacharel Noa Eau De Toilette Spray…
R2,328 R1,154 Discovery Miles 11 540
Tommy Hilfiger - Tommy Cologne Spray…
R1,218 R694 Discovery Miles 6 940
JBL T110 In-Ear Headphones (Black)
 (13)
R229 R201 Discovery Miles 2 010

 

Partners