0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (8)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Cryptology and Network Security - 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings... Cryptology and Network Security - 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings (Paperback, 2007 ed.)
Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing
R1,560 Discovery Miles 15 600 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007.

The 17 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.

Pairing-Based Cryptography - Pairing 2007 - First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007,... Pairing-Based Cryptography - Pairing 2007 - First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto
R1,598 Discovery Miles 15 980 Ships in 10 - 15 working days

This book represents the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in July 2007.

The 18 revised full papers presented together with 2 abstracts and 3 full papers of invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topcial sections on applications, certificateless public key encryption, hyperelliptic curves, implementation, cryptographic protocols, cryptanalysis, and cryptographic algorithms.

Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing,... Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings (Paperback, 2007 ed.)
Tatsuaki Okamoto, Xiaoyun Wang
R1,794 Discovery Miles 17 940 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, held in Beijing, China in April 2007.

The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure.

Topics in Cryptology -- CT-RSA 2004 - The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA,... Topics in Cryptology -- CT-RSA 2004 - The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings (Paperback, 2004 ed.)
Tatsuaki Okamoto
R1,726 Discovery Miles 17 260 Ships in 10 - 15 working days

The Cryptographers' Track (CT-RSA) is a research conference within the RSA conference, the largest, regularly staged computer security event. CT-RSA 2004 was the fourth year of the Cryptographers' Track, and it is now an established venue for presenting practical research results related to cryptography and data security. The conference received 77 submissions, and the program committee sel- ted 28 of these for presentation. The program committee worked very hard to evaluate the papers with respect to quality, originality, and relevance to cryp- graphy. Each paper was reviewed by at least three program committee members. Extended abstracts of the revised versions of these papers are in these proc- dings. The program also included two invited lectures by Dan Boneh and Silvio Micali. I am extremely grateful to the program committee members for their en- mous investment of time and e?ort in the di?cult and delicate process of review and selection. Many of them attended the program committee meeting during the Crypto 2003 conference at the University of California, Santa Barbara.

Information and Communications Security - Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001.... Information and Communications Security - Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings (Paperback, 2001 ed.)
Tatsuaki Okamoto, Jianying Zhou
R1,800 Discovery Miles 18 000 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Information and Communications Security, ICICS 2001, held in Xian, China in November 2001.The 56 revised full papers presented were carefully reviewed and selected from a total of 134 submissions. The complete spectrum of information and communications security is covered including theoretical foundations, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, digital signatures, block ciphers and public-key systems, information hiding, security protocols, and cryptanalysis.

Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000 Proceedings (Paperback, 2000 ed.)
Tatsuaki Okamoto
R1,775 Discovery Miles 17 750 Ships in 10 - 15 working days

ASIACRYPT 2000 was the sixth annual ASIACRYPT conference. It was sp- sored by the International Association for Cryptologic Research (IACR) in - operation with the Institute of Electronics, Information, and Communication Engineers (IEICE). The ?rst conference with the name ASIACRYPT took place in 1991, and the series of ASIACRYPT conferences were held in 1994, 1996, 1998, and 1999, in cooperation with IACR. ASIACRYPT 2000 was the ?rst conference in the series to be sponsored by IACR. The conference received 140 submissions (1 submission was withdrawn by the authors later), and the program committee selected 45 of these for presen- tion. Extended abstracts of the revised versions of these papers are included in these proceedings. The program also included two invited lectures by Thomas Berson (Cryptography Everywhere: IACR Distinguished Lecture) and Hideki Imai (CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government). Abstracts of these talks are included in these proce- ings. The conference program also included its traditional "rump session" of short, informal or impromptu presentations, kindly chaired by Moti Yung. Those p- sentations are not re?ected in these proceedings. The selection of the program was a challenging task as many high quality submissions were received. The program committee worked very hard to evaluate the papers with respect to quality, originality, and relevance to cryptography. I am extremely grateful to the program committee members for their en- mous investment of time and e?ort in the di?cult and delicate process of review and selection.

Information and Communications Security - First International Conference, ICIS'97, Beijing, China, November 11-14, 1997,... Information and Communications Security - First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, Proceedings (Paperback, 1997 ed.)
Yongfei Han, Tatsuaki Okamoto, Sihan Quing
R1,785 Discovery Miles 17 850 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997.
The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.

Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings... Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings (Paperback, 1st ed. 2017)
Tatsuaki Okamoto, Yong Yu, Man-Ho Au, Yannan Li
R1,629 Discovery Miles 16 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols.

Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015,... Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Rainer Boehme, Tatsuaki Okamoto
R3,322 Discovery Miles 33 220 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechannels; cryptography in the cloud; payment and fraud detection; authentication and access control; cryptographic primitives; mobile security; privacy and incentives; applications and attacks; authenticated data structures.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
GM Bowling Machine Ball (Red)
R110 R96 Discovery Miles 960
Brother LX27NT Portable Free Arm Sewing…
R3,999 R2,999 Discovery Miles 29 990
Deadpool 2 - Super Duper Cut
Ryan Reynolds Blu-ray disc R54 Discovery Miles 540
Dig & Discover: Ancient Egypt - Excavate…
Hinkler Pty Ltd Kit R263 Discovery Miles 2 630
Mellerware Plastic Oscilating Floor Fan…
R549 R459 Discovery Miles 4 590
Silicone Cellphone Card Holder [White]
R10 Discovery Miles 100
Bantex @School 13cm Kids Blunt Nose…
R16 Discovery Miles 160
World Be Gone
Erasure CD R185 R112 Discovery Miles 1 120
Tower Gift Labels - Birthday String Tags…
R56 R35 Discovery Miles 350
The Lion King - Blu-Ray + DVD
Blu-ray disc R344 Discovery Miles 3 440

 

Partners