0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I (1st ed. 2023)
Alexandra Boldyreva, Vladimir Kolesnikov
R6,627 Discovery Miles 66 270 Ships in 10 - 15 working days

The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA.The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.

Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (1st ed. 2023)
Alexandra Boldyreva, Vladimir Kolesnikov
R4,618 Discovery Miles 46 180 Ships in 10 - 15 working days

The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA.The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.

Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020,... Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020, Proceedings (Paperback, 1st ed. 2020)
Clemente Galdi, Vladimir Kolesnikov
R3,088 Discovery Miles 30 880 Ships in 10 - 15 working days

This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.The 33 papers presented in this volume were carefully reviewed and selected from 87 submissions. They are organized in topical sections on blockchain; multiparty computation; oblivious RAM; primitives and constructions; signatures, encryption, and algebraic constructions; symmetric crypto; theory and lower bounds ; zero-knowledge. *The conference was held virtually due to the COVID-19 pandemic.

Cyber Security Cryptography and Machine Learning - Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July... Cyber Security Cryptography and Machine Learning - Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings (Paperback, 1st ed. 2020)
Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020.The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015,... Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
R1,690 Discovery Miles 16 900 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

A Pragmatic Introduction to Secure Multi-Party Computation (Paperback): David Evans, Vladimir Kolesnikov, Mike Rosulek A Pragmatic Introduction to Secure Multi-Party Computation (Paperback)
David Evans, Vladimir Kolesnikov, Mike Rosulek
R2,359 Discovery Miles 23 590 Ships in 10 - 15 working days

Since its introduction by Andrew Yao in the 1980s, multi-party computation has developed from a theoretical curiosity to an important tool for building large-scale privacy-preserving applications. Secure multi-party computation (MPC) enables a group to jointly perform a computation without disclosing any participant's private inputs. The participants agree on a function to compute, and then can use an MPC protocol to jointly compute the output of that function on their secret inputs without revealing them. This monograph provides an introduction to multi-party computation for practitioners interested in building privacy-preserving applications and researchers who want to work in the area. The authors introduce the foundations of MPC and describe the current state of the art. The goal is to enable readers to understand what is possible today, and what may be possible in the future. It provides a starting point for building applications using MPC and for developing MPC protocols, implementations, tools, and applications. Those seeking a concise, accessible introduction to the topic which quickly enables them to build practical systems or conduct further research will find this essential reading.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Jurassic Park Trilogy Collection
Sam Neill, Laura Dern, … Blu-ray disc  (1)
R311 Discovery Miles 3 110
Frozen - Blu-Ray + DVD
Blu-ray disc R344 Discovery Miles 3 440
Jeronimo Walkie Talkie Game
 (2)
R360 R328 Discovery Miles 3 280
Cable Guy Ikon "Light Up" PlayStation…
R543 Discovery Miles 5 430
Alcolin Wallpaper Paste (200ml)
R84 Discovery Miles 840
Dig & Discover: Dinosaurs - Excavate 2…
Hinkler Pty Ltd Kit R304 R267 Discovery Miles 2 670
The End, So Far
Slipknot CD R498 Discovery Miles 4 980
Webcam Cover (Black)
 (1)
R9 Discovery Miles 90
Wild About You - A 60-Day Devotional For…
John Eldredge, Stasi Eldredge Hardcover R332 R49 Discovery Miles 490
Too Hard To Forget
Tessa Bailey Paperback R280 R224 Discovery Miles 2 240

 

Partners