0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I (1st ed. 2023)
Alexandra Boldyreva, Vladimir Kolesnikov
R6,733 Discovery Miles 67 330 Ships in 10 - 15 working days

The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA.The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.

Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (1st ed. 2023)
Alexandra Boldyreva, Vladimir Kolesnikov
R4,690 Discovery Miles 46 900 Ships in 10 - 15 working days

The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA.The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.

Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020,... Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020, Proceedings (Paperback, 1st ed. 2020)
Clemente Galdi, Vladimir Kolesnikov
R3,134 Discovery Miles 31 340 Ships in 10 - 15 working days

This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.The 33 papers presented in this volume were carefully reviewed and selected from 87 submissions. They are organized in topical sections on blockchain; multiparty computation; oblivious RAM; primitives and constructions; signatures, encryption, and algebraic constructions; symmetric crypto; theory and lower bounds ; zero-knowledge. *The conference was held virtually due to the COVID-19 pandemic.

Cyber Security Cryptography and Machine Learning - Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July... Cyber Security Cryptography and Machine Learning - Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings (Paperback, 1st ed. 2020)
Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss
R1,580 Discovery Miles 15 800 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020.The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015,... Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
R1,713 Discovery Miles 17 130 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

A Pragmatic Introduction to Secure Multi-Party Computation (Paperback): David Evans, Vladimir Kolesnikov, Mike Rosulek A Pragmatic Introduction to Secure Multi-Party Computation (Paperback)
David Evans, Vladimir Kolesnikov, Mike Rosulek
R2,397 Discovery Miles 23 970 Ships in 10 - 15 working days

Since its introduction by Andrew Yao in the 1980s, multi-party computation has developed from a theoretical curiosity to an important tool for building large-scale privacy-preserving applications. Secure multi-party computation (MPC) enables a group to jointly perform a computation without disclosing any participant's private inputs. The participants agree on a function to compute, and then can use an MPC protocol to jointly compute the output of that function on their secret inputs without revealing them. This monograph provides an introduction to multi-party computation for practitioners interested in building privacy-preserving applications and researchers who want to work in the area. The authors introduce the foundations of MPC and describe the current state of the art. The goal is to enable readers to understand what is possible today, and what may be possible in the future. It provides a starting point for building applications using MPC and for developing MPC protocols, implementations, tools, and applications. Those seeking a concise, accessible introduction to the topic which quickly enables them to build practical systems or conduct further research will find this essential reading.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mexico In Mzansi
Aiden Pienaar Paperback R360 R281 Discovery Miles 2 810
Efekto 77300-G Nitrile Gloves (M)(Green)
R63 Discovery Miles 630
Microsoft Xbox Series X Console (1TB)
 (21)
R14,999 Discovery Miles 149 990
The Walking Dead - Season 1 / 2 / 3 / 4
Andrew Lincoln Blu-ray disc  (1)
R288 Discovery Miles 2 880
Sylvanian Families Country Tree School
 (7)
R2,759 Discovery Miles 27 590
Cable Guy Ikon "Light Up" Marvel…
R543 Discovery Miles 5 430
Seagull Clear Storage Box (29lt)
R241 Discovery Miles 2 410
Dig & Discover: Ancient Egypt - Excavate…
Hinkler Pty Ltd Kit R263 Discovery Miles 2 630
Bestway Spider-Man Beach Ball (51cm)
R50 R45 Discovery Miles 450
Bostik Clear (50ml)
R57 Discovery Miles 570

 

Partners