0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I (1st ed. 2023)
Alexandra Boldyreva, Vladimir Kolesnikov
R6,559 Discovery Miles 65 590 Ships in 10 - 15 working days

The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA.The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.

Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (1st ed. 2023)
Alexandra Boldyreva, Vladimir Kolesnikov
R4,567 Discovery Miles 45 670 Ships in 10 - 15 working days

The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA.The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.

Cyber Security Cryptography and Machine Learning - Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July... Cyber Security Cryptography and Machine Learning - Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings (Paperback, 1st ed. 2020)
Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020.The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020,... Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020, Proceedings (Paperback, 1st ed. 2020)
Clemente Galdi, Vladimir Kolesnikov
R3,051 Discovery Miles 30 510 Ships in 10 - 15 working days

This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.The 33 papers presented in this volume were carefully reviewed and selected from 87 submissions. They are organized in topical sections on blockchain; multiparty computation; oblivious RAM; primitives and constructions; signatures, encryption, and algebraic constructions; symmetric crypto; theory and lower bounds ; zero-knowledge. *The conference was held virtually due to the COVID-19 pandemic.

Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015,... Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
R1,666 Discovery Miles 16 660 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

A Pragmatic Introduction to Secure Multi-Party Computation (Paperback): David Evans, Vladimir Kolesnikov, Mike Rosulek A Pragmatic Introduction to Secure Multi-Party Computation (Paperback)
David Evans, Vladimir Kolesnikov, Mike Rosulek
R2,336 Discovery Miles 23 360 Ships in 10 - 15 working days

Since its introduction by Andrew Yao in the 1980s, multi-party computation has developed from a theoretical curiosity to an important tool for building large-scale privacy-preserving applications. Secure multi-party computation (MPC) enables a group to jointly perform a computation without disclosing any participant's private inputs. The participants agree on a function to compute, and then can use an MPC protocol to jointly compute the output of that function on their secret inputs without revealing them. This monograph provides an introduction to multi-party computation for practitioners interested in building privacy-preserving applications and researchers who want to work in the area. The authors introduce the foundations of MPC and describe the current state of the art. The goal is to enable readers to understand what is possible today, and what may be possible in the future. It provides a starting point for building applications using MPC and for developing MPC protocols, implementations, tools, and applications. Those seeking a concise, accessible introduction to the topic which quickly enables them to build practical systems or conduct further research will find this essential reading.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cadac Cooker Jet & Seal Kit
R59 R45 Discovery Miles 450
I Will Not Be Silenced
Karyn Maughan Paperback R350 R199 Discovery Miles 1 990
Croxley Create Super Jumbo Wood Free…
R35 R30 Discovery Miles 300
Golf Groove Sharpener (Black)
R249 Discovery Miles 2 490
BSwish Bwild Classic Marine Vibrator…
R779 R649 Discovery Miles 6 490
Philips TAUE101 Wired In-Ear Headphones…
R199 R129 Discovery Miles 1 290
Fast & Furious: 8-Film Collection
Vin Diesel, Paul Walker, … Blu-ray disc R336 R257 Discovery Miles 2 570
Kaufmann Fountain Pump (50W 230V…
R1,490 Discovery Miles 14 900
Lucky Plastic 3-in-1 Nose Ear Trimmer…
R289 Discovery Miles 2 890
Samsung EO-IA500BBEGWW Wired In-ear…
R299 R199 Discovery Miles 1 990

 

Partners