0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Algebraic Curves in Cryptography (Paperback): San Ling, Huaxiong Wang, Chaoping Xing Algebraic Curves in Cryptography (Paperback)
San Ling, Huaxiong Wang, Chaoping Xing
R1,991 Discovery Miles 19 910 Ships in 12 - 19 working days

The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption. Suitable for researchers and graduate students in mathematics and computer science, this self-contained book is one of the first to focus on many topics in cryptography involving algebraic curves. After supplying the necessary background on algebraic curves, the authors discuss error-correcting codes, including algebraic geometry codes, and provide an introduction to elliptic curves. Each chapter in the remainder of the book deals with a selected topic in cryptography (other than elliptic curve cryptography). The topics covered include secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. Chapters begin with introductory material before featuring the application of algebraic curves.

Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings (Paperback,... Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings (Paperback, Edition.)
Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, …
R1,524 Discovery Miles 15 240 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. The 19 revised full technical papers are contributed by the invited speakers of the workshop. The papers were carefully reviewed and cover a broad range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.

Coding and Cryptology - Second International Workshop, IWCC 2009 (Paperback, 2009 ed.): Yeow Meng Chee, Chao Li, San Ling,... Coding and Cryptology - Second International Workshop, IWCC 2009 (Paperback, 2009 ed.)
Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

The biennial International Workshop on Coding and Cryptology (IWCC) aims to bring together many of the world's greatest minds in coding and crypt- ogy to share ideas and exchange knowledge related to advancements in c- ing and cryptology, amidst an informal setting conducive for interaction and collaboration. It is well known that fascinating connections exist between coding and cr- tology. Therefore this workshop series was organized to facilitate a fruitful - teraction and stimulating discourse among experts from these two areas. The inaugural IWCC was held at Wuyi Mountain, Fujian Province, China, during June 11-15, 2007 and attracted over 80 participants. Following this s- cess, the second IWCC was held June 1-5, 2009 at Zhangjiajie, Hunan Province, China. Zhangjiajie is one of the most scenic areas in China. The proceedings of this workshop consist of 21 technical papers, covering a wide range of topics in coding and cryptology, as well as related ?elds such as combinatorics. All papers, except one, are contributed by the invited speakers of the workshop and each paper has been carefully reviewed. We are grateful to the external reviewers for their help, which has greatly strengthened the quality of the proceedings. IWCC 2009 was co-organizedby the National University of Defense Techn- ogy (NUDT), China and Nanyang Technological University (NTU), Singapore. We acknowledge with gratitude the ?nancial support from NUDT. We wouldliketo expressourthanks to Springer formaking it possible forthe proceedings to be published in the Lecture Notes in Computer Science series.

Cryptology and Network Security - 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings... Cryptology and Network Security - 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings (Paperback, 2007 ed.)
Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing
R1,524 Discovery Miles 15 240 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007.

The 17 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.

Coding Theory - A First Course (Hardcover): San Ling, Chaoping Xing Coding Theory - A First Course (Hardcover)
San Ling, Chaoping Xing
R3,686 Discovery Miles 36 860 Ships in 12 - 19 working days

Concerned with successfully transmitting data through a noisy channel, coding theory can be applied to electronic engineering and communications. Based on the authors' extensive teaching experience, this text provides a completely modern and accessible course on the subject. It includes sections on linear programming and decoding methods essential for contemporary mathematics. Numerous examples and exercises make the volume ideal for students and instructors.

Coding Theory - A First Course (Paperback): San Ling, Chaoping Xing Coding Theory - A First Course (Paperback)
San Ling, Chaoping Xing
R1,691 Discovery Miles 16 910 Ships in 12 - 19 working days

Concerned with successfully transmitting data through a noisy channel, coding theory can be applied to electronic engineering and communications. Based on the authors' extensive teaching experience, this text provides a completely modern and accessible course on the subject. It includes sections on linear programming and decoding methods essential for contemporary mathematics. Numerous examples and exercises make the volume ideal for students and instructors.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Second Temple Songs of Zion - A Literary…
Ruth Henderson Hardcover R4,231 Discovery Miles 42 310
A Noise Downstairs
Linwood Barclay Paperback  (1)
R337 R306 Discovery Miles 3 060
The Evolutionary Emergence of Language…
Rudolf Botha, Martin Everaert Hardcover R3,840 Discovery Miles 38 400
The Lion Conspiracy
Peter Hain Paperback R390 R348 Discovery Miles 3 480
The SABC 8
Foeta Krige Paperback R358 Discovery Miles 3 580
Being There - Backstories From The…
Tony Leon Paperback R350 R312 Discovery Miles 3 120
Expensive Poverty - Why Aid Fails And…
Greg Mills Paperback R360 R326 Discovery Miles 3 260
Purposeful Pain - The Bioarchaeology of…
Susan Guise Sheridan, Lesley A Gregoricka Hardcover R3,395 Discovery Miles 33 950
The Darkest Evening
Ann Cleeves Paperback  (1)
R483 Discovery Miles 4 830
The Little Book Of Safari Animal Sounds
Caz Buckingham, Andrea Pinnington Board book  (1)
R320 R286 Discovery Miles 2 860

 

Partners