0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (6)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

5G+ - How 5G Change the Society (Hardcover, 1st ed. 2021): Zhengmao Li, Xiaoyun Wang, Tongxu Zhang 5G+ - How 5G Change the Society (Hardcover, 1st ed. 2021)
Zhengmao Li, Xiaoyun Wang, Tongxu Zhang
R4,905 Discovery Miles 49 050 Ships in 12 - 17 working days

This book takes China Mobile's "5G +" plan as the mainline, introduces three major scenarios, nine indicators, system architecture and basic principles of 5G, and systematically explains the essence of China Mobile's "5G +" for the first time. A lot of industry use cases and solutions are introduced for 5G to bring new changes to life, industries, and social governance. This book can benefit all readers who are interested in 5G. It also can be a reference for vertical industry partners to fully understand the possible applications of 5G. Most of all, it will help to promote all industries with new developments based on 5G's new kinetic energy.

Mathematical Foundations of Public Key Cryptography (Paperback): Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng Mathematical Foundations of Public Key Cryptography (Paperback)
Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng
R1,299 Discovery Miles 12 990 Ships in 12 - 17 working days

In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography. Rather than simply combining number theory and modern algebra, this textbook features the interdisciplinary characteristics of cryptography-revealing the integrations of mathematical theories and public-key cryptographic applications. Incorporating the complexity theory of algorithms throughout, it introduces the basic number theoretic and algebraic algorithms and their complexities to provide a preliminary understanding of the applications of mathematical theories in cryptographic algorithms. Supplying a seamless integration of cryptography and mathematics, the book includes coverage of elementary number theory; algebraic structure and attributes of group, ring, and field; cryptography-related computing complexity and basic algorithms, as well as lattice and fundamental methods of lattice cryptanalysis. The text consists of 11 chapters. Basic theory and tools of elementary number theory, such as congruences, primitive roots, residue classes, and continued fractions, are covered in Chapters 1-6. The basic concepts of abstract algebra are introduced in Chapters 7-9, where three basic algebraic structures of groups, rings, and fields and their properties are explained. Chapter 10 is about computational complexities of several related mathematical algorithms, and hard problems such as integer factorization and discrete logarithm. Chapter 11 presents the basics of lattice theory and the lattice basis reduction algorithm-the LLL algorithm and its application in the cryptanalysis of the RSA algorithm. Containing a number of exercises on key algorithms, the book is suitable for use as a textbook for undergraduate students and first-year graduate students in information security programs. It is also an ideal reference book for cryptography professionals looking to master public-key cryptography.

Mathematical Foundations of Public Key Cryptography (Hardcover): Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng Mathematical Foundations of Public Key Cryptography (Hardcover)
Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng
R2,198 Discovery Miles 21 980 Ships in 12 - 17 working days

In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography. Rather than simply combining number theory and modern algebra, this textbook features the interdisciplinary characteristics of cryptography-revealing the integrations of mathematical theories and public-key cryptographic applications. Incorporating the complexity theory of algorithms throughout, it introduces the basic number theoretic and algebraic algorithms and their complexities to provide a preliminary understanding of the applications of mathematical theories in cryptographic algorithms. Supplying a seamless integration of cryptography and mathematics, the book includes coverage of elementary number theory; algebraic structure and attributes of group, ring, and field; cryptography-related computing complexity and basic algorithms, as well as lattice and fundamental methods of lattice cryptanalysis. The text consists of 11 chapters. Basic theory and tools of elementary number theory, such as congruences, primitive roots, residue classes, and continued fractions, are covered in Chapters 1-6. The basic concepts of abstract algebra are introduced in Chapters 7-9, where three basic algebraic structures of groups, rings, and fields and their properties are explained. Chapter 10 is about computational complexities of several related mathematical algorithms, and hard problems such as integer factorization and discrete logarithm. Chapter 11 presents the basics of lattice theory and the lattice basis reduction algorithm-the LLL algorithm and its application in the cryptanalysis of the RSA algorithm. Containing a number of exercises on key algorithms, the book is suitable for use as a textbook for undergraduate students and first-year graduate students in information security programs. It is also an ideal reference book for cryptography professionals looking to master public-key cryptography.

5G+ - How 5G Change the Society (Paperback, 1st ed. 2021): Zhengmao Li, Xiaoyun Wang, Tongxu Zhang 5G+ - How 5G Change the Society (Paperback, 1st ed. 2021)
Zhengmao Li, Xiaoyun Wang, Tongxu Zhang
R3,498 Discovery Miles 34 980 Ships in 10 - 15 working days

This book takes China Mobile's "5G +" plan as the mainline, introduces three major scenarios, nine indicators, system architecture and basic principles of 5G, and systematically explains the essence of China Mobile's "5G +" for the first time. A lot of industry use cases and solutions are introduced for 5G to bring new changes to life, industries, and social governance. This book can benefit all readers who are interested in 5G. It also can be a reference for vertical industry partners to fully understand the possible applications of 5G. Most of all, it will help to promote all industries with new developments based on 5G's new kinetic energy.

Advances in Cryptology -- ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012, Proceedings (Paperback, 2012 ed.)
Xiaoyun Wang, Kazue Sako
R1,615 Discovery Miles 16 150 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.

Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings... Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings (Paperback)
Dongdai Lin, Gene Tsudik, Xiaoyun Wang
R1,479 Discovery Miles 14 790 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.

Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing,... Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings (Paperback, 2007 ed.)
Tatsuaki Okamoto, Xiaoyun Wang
R1,688 Discovery Miles 16 880 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, held in Beijing, China in April 2007.

The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure.

Advances in Cryptology -- ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011, Proceedings (Paperback, 2011 ed.)
Dong Hoon Lee, Xiaoyun Wang
R1,610 Discovery Miles 16 100 Ships in 10 - 15 working days

This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sudocrem Skin & Baby Care Barrier Cream…
R128 Discovery Miles 1 280
Seagull Metal Gym Rings
R159 Discovery Miles 1 590
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Cellphone Ring & Stand [Black]
R22 Discovery Miles 220
Mother's Choice Baby Mink Blanket Bear
R899 R699 Discovery Miles 6 990
Mission Impossible 6: Fallout
Tom Cruise, Henry Cavill, … Blu-ray disc  (1)
R131 R91 Discovery Miles 910
Stabilo Arty Creative Set - Brush Pens…
R669 Discovery Miles 6 690
Russell Hobbs Toaster (4 Slice) (Matt…
R1,167 Discovery Miles 11 670
Operation Joktan
Amir Tsarfati, Steve Yohn Paperback  (1)
R250 R185 Discovery Miles 1 850
Proline 11.6" Celeron Notebook - Intel…
R3,849 Discovery Miles 38 490

 

Partners