0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Codes, Cryptology and Curves with Computer Algebra (Hardcover): Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius Codes, Cryptology and Curves with Computer Algebra (Hardcover)
Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius
R4,518 Discovery Miles 45 180 Ships in 12 - 17 working days

This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined. This book is designed for Masters-level students studying mathematics, computer science, electrical engineering or physics.

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Paperback, Softcover reprint of... Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Paperback, Softcover reprint of the original 1st ed. 2018)
Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018): Muhammad... Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018)
Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.

Codes, Cryptology and Curves with Computer Algebra (Paperback): Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius Codes, Cryptology and Curves with Computer Algebra (Paperback)
Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius
R1,813 Discovery Miles 18 130 Ships in 12 - 17 working days

This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined. This book is designed for Masters-level students studying mathematics, computer science, electrical engineering or physics.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Birds Of Greater Southern Africa
Keith Barnes, Terry Stevenson, … Paperback  (4)
R450 R299 Discovery Miles 2 990
Bestway Beach Ball (51cm)
 (2)
R26 Discovery Miles 260
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Bait - To Catch A Killer
Janine Lazarus Paperback R320 R275 Discovery Miles 2 750
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
Alcolin Super Glue 3 X 3G
R64 Discovery Miles 640
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Efekto 77300-B Nitrile Gloves (L)(Black)
R63 Discovery Miles 630
Moon Bag [Black]
R57 Discovery Miles 570

 

Partners