0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (8)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Cryptology and Network Security - 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings... Cryptology and Network Security - 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings (Paperback, 2007 ed.)
Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing
R1,472 Discovery Miles 14 720 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007.

The 17 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.

Pairing-Based Cryptography - Pairing 2007 - First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007,... Pairing-Based Cryptography - Pairing 2007 - First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

This book represents the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in July 2007.

The 18 revised full papers presented together with 2 abstracts and 3 full papers of invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topcial sections on applications, certificateless public key encryption, hyperelliptic curves, implementation, cryptographic protocols, cryptanalysis, and cryptographic algorithms.

Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing,... Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings (Paperback, 2007 ed.)
Tatsuaki Okamoto, Xiaoyun Wang
R1,688 Discovery Miles 16 880 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, held in Beijing, China in April 2007.

The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure.

Topics in Cryptology -- CT-RSA 2004 - The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA,... Topics in Cryptology -- CT-RSA 2004 - The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings (Paperback, 2004 ed.)
Tatsuaki Okamoto
R1,626 Discovery Miles 16 260 Ships in 10 - 15 working days

The Cryptographers' Track (CT-RSA) is a research conference within the RSA conference, the largest, regularly staged computer security event. CT-RSA 2004 was the fourth year of the Cryptographers' Track, and it is now an established venue for presenting practical research results related to cryptography and data security. The conference received 77 submissions, and the program committee sel- ted 28 of these for presentation. The program committee worked very hard to evaluate the papers with respect to quality, originality, and relevance to cryp- graphy. Each paper was reviewed by at least three program committee members. Extended abstracts of the revised versions of these papers are in these proc- dings. The program also included two invited lectures by Dan Boneh and Silvio Micali. I am extremely grateful to the program committee members for their en- mous investment of time and e?ort in the di?cult and delicate process of review and selection. Many of them attended the program committee meeting during the Crypto 2003 conference at the University of California, Santa Barbara.

Information and Communications Security - Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001.... Information and Communications Security - Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings (Paperback, 2001 ed.)
Tatsuaki Okamoto, Jianying Zhou
R1,694 Discovery Miles 16 940 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Information and Communications Security, ICICS 2001, held in Xian, China in November 2001.The 56 revised full papers presented were carefully reviewed and selected from a total of 134 submissions. The complete spectrum of information and communications security is covered including theoretical foundations, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, digital signatures, block ciphers and public-key systems, information hiding, security protocols, and cryptanalysis.

Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000 Proceedings (Paperback, 2000 ed.)
Tatsuaki Okamoto
R1,671 Discovery Miles 16 710 Ships in 10 - 15 working days

ASIACRYPT 2000 was the sixth annual ASIACRYPT conference. It was sp- sored by the International Association for Cryptologic Research (IACR) in - operation with the Institute of Electronics, Information, and Communication Engineers (IEICE). The ?rst conference with the name ASIACRYPT took place in 1991, and the series of ASIACRYPT conferences were held in 1994, 1996, 1998, and 1999, in cooperation with IACR. ASIACRYPT 2000 was the ?rst conference in the series to be sponsored by IACR. The conference received 140 submissions (1 submission was withdrawn by the authors later), and the program committee selected 45 of these for presen- tion. Extended abstracts of the revised versions of these papers are included in these proceedings. The program also included two invited lectures by Thomas Berson (Cryptography Everywhere: IACR Distinguished Lecture) and Hideki Imai (CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government). Abstracts of these talks are included in these proce- ings. The conference program also included its traditional "rump session" of short, informal or impromptu presentations, kindly chaired by Moti Yung. Those p- sentations are not re?ected in these proceedings. The selection of the program was a challenging task as many high quality submissions were received. The program committee worked very hard to evaluate the papers with respect to quality, originality, and relevance to cryptography. I am extremely grateful to the program committee members for their en- mous investment of time and e?ort in the di?cult and delicate process of review and selection.

Information and Communications Security - First International Conference, ICIS'97, Beijing, China, November 11-14, 1997,... Information and Communications Security - First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, Proceedings (Paperback, 1997 ed.)
Yongfei Han, Tatsuaki Okamoto, Sihan Quing
R1,681 Discovery Miles 16 810 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997.
The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.

Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings... Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings (Paperback, 1st ed. 2017)
Tatsuaki Okamoto, Yong Yu, Man-Ho Au, Yannan Li
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols.

Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015,... Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Rainer Boehme, Tatsuaki Okamoto
R3,105 Discovery Miles 31 050 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechannels; cryptography in the cloud; payment and fraud detection; authentication and access control; cryptographic primitives; mobile security; privacy and incentives; applications and attacks; authenticated data structures.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Walking Dead - Season 7
Andrew Lincoln, Norman Reedus, … DVD R135 Discovery Miles 1 350
Create Your Own Candles
Hinkler Pty Ltd Kit R199 R95 Discovery Miles 950
Dunlop Pro Padel Balls (Green)(Pack of…
R199 R165 Discovery Miles 1 650
Pure Pleasure Electric Heating Pad (30 x…
 (2)
R599 R529 Discovery Miles 5 290
Harry Potter Wizard Wand - In…
 (3)
R800 Discovery Miles 8 000
Vital BabyŽ HYDRATE™ Incredibly Cool…
R189 Discovery Miles 1 890
Fly Repellent ShooAway (Black)(4 Pack)
R1,396 R1,076 Discovery Miles 10 760
Mixtape Automatic Folding Washing…
R890 R544 Discovery Miles 5 440
Batman v Superman - Dawn Of Justice…
Ben Affleck, Henry Cavill, … Blu-ray disc  (16)
R172 R120 Discovery Miles 1 200
Golf Groove Sharpener (Black)
R249 Discovery Miles 2 490

 

Partners