0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (12)
  • -
Status
Brand

Showing 1 - 15 of 15 matches in All Departments

International Joint Ventures in China - Ownership, Control and Performance (Hardcover): Y. Yan International Joint Ventures in China - Ownership, Control and Performance (Hardcover)
Y. Yan
R4,364 Discovery Miles 43 640 Ships in 10 - 15 working days

Corporate governance, namely the relationship between the ownership and control of firms, takes on new dimensions in the case of international joint ventures operating in the special context of China. The present study contributes a new examination of this relationship, firstly through its conceptual refinement, and secondly through original empirical research. It develops the concept of ownership as suited to joint ventures, in which account is taken of non-capital resourcing by foreign and Chinese partners.

Cybercryptography: Applicable Cryptography for Cyberspace Security (Hardcover, 1st ed. 2019): Song Y. Yan Cybercryptography: Applicable Cryptography for Cyberspace Security (Hardcover, 1st ed. 2019)
Song Y. Yan
R3,440 Discovery Miles 34 400 Ships in 10 - 15 working days

This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.

Number Theory for Computing (Hardcover, 2nd ed. 2002): M. E. Hellmann Number Theory for Computing (Hardcover, 2nd ed. 2002)
M. E. Hellmann; Song Y. Yan
R2,623 Discovery Miles 26 230 Ships in 12 - 19 working days

There are many surprising connections between the theory of numbers, which is one of the oldest branches of mathematics, and computing and information theory. Number theory has important applications in computer organization and security, coding and cryptography, random number generation, hash functions, and graphics. Conversely, number theorists use computers in factoring large integers, determining primes, testing conjectures, and solving other problems. This book takes the reader from elementary number theory, via algorithmic number theory, to applied number theory in computer science. It introduces basic concepts, results, and methods, and discusses their applications in the design of hardware and software, cryptography, and security. It is aimed at undergraduates in computing and information technology, but will also be valuable to mathematics students interested in applications. In this 2nd edition full proofs of many theorems are added and some corrections are made.

Foreign Investment and Corporate Governance in China (Hardcover, 2005 ed.): Y. Yan Foreign Investment and Corporate Governance in China (Hardcover, 2005 ed.)
Y. Yan
R1,532 Discovery Miles 15 320 Ships in 10 - 15 working days

This book reports on foreign investments in transitional economies and the corporate governance of international strategic alliances in China. It throws new light on the relationship between ownership, corporate governance, international technology transfer, organizational learning and the performance of such alliances. The book reviews the problems encountered by these international strategic alliances, provides significant empirical evidence of foreign investment decisions and profiles corporate governance and organizational learning in strategic alliances. Based on research into 1000 firms in China, it draws important conclusions for theory and practice.

Cryptanalytic Attacks on RSA (Hardcover, 2008 ed.): Song Y. Yan Cryptanalytic Attacks on RSA (Hardcover, 2008 ed.)
Song Y. Yan
R2,899 Discovery Miles 28 990 Ships in 10 - 15 working days

RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number theory, background information on complexity theory and number theory is presented first, followed by an account of the RSA cryptographic system and its variants.

This book is also suitable as a secondary text for advanced-level students in computer science and mathematics.

Quantum Computational Number Theory (Hardcover, 1st ed. 2015): Song Y. Yan Quantum Computational Number Theory (Hardcover, 1st ed. 2015)
Song Y. Yan
R3,854 R3,572 Discovery Miles 35 720 Save R282 (7%) Ships in 12 - 19 working days

This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorization, discrete logarithms, elliptic curve arithmetic, conjecture and numerical verification. The author discusses quantum algorithms for solving the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP), and the Elliptic Curve Discrete Logarithm Problem (ECDLP) and for attacking IFP, DLP and ECDLP based cryptographic systems. Chapters also cover various other quantum algorithms for Pell's equation, principal ideal, unit group, class group, Gauss sums, prime counting function, Riemann's hypothesis and the BSD conjecture. Quantum Computational Number Theory is self-contained and intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the related fields. Number theorists, cryptographers and professionals working in quantum computing, cryptography and network security will find this book a valuable asset.

Quantum Attacks on Public-Key Cryptosystems (Hardcover, 2013 ed.): Song Y. Yan Quantum Attacks on Public-Key Cryptosystems (Hardcover, 2013 ed.)
Song Y. Yan
R3,799 R3,517 Discovery Miles 35 170 Save R282 (7%) Ships in 12 - 19 working days

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.

"Quantum Attacks on Public-Key Cryptosystems" presemts almost allknown quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.

This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.

Primality Testing and Integer Factorization in Public-Key Cryptography (Hardcover, 2nd ed. 2009): Song Y. Yan Primality Testing and Integer Factorization in Public-Key Cryptography (Hardcover, 2nd ed. 2009)
Song Y. Yan
R4,407 Discovery Miles 44 070 Ships in 10 - 15 working days

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP. Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer factorization, with implications to factoring based public key cryptography. Notable new features are the comparison of Rabin-Miller probabilistic test in RP, Atkin-Morain elliptic curve test in ZPP and AKS deterministic test. This volume is designed for advanced level students in computer science and mathematics, and as a secondary text or reference book; suitable for practitioners and researchers in industry. First edition was very positively reviewed by Prof Samuel Wagstaff at Purdue University in AMS Mathematical Reviews (See MR2028480 2004j: 11148), and by Professor J.T. Ayuso of University of Simon Bolivar in the European Mathematical Societya (TM)s review journal Zentralblatt fA1/4r Mathematik (see Zbl 1048.11103).

Quantum Computational Number Theory (Paperback, Softcover reprint of the original 1st ed. 2015): Song Y. Yan Quantum Computational Number Theory (Paperback, Softcover reprint of the original 1st ed. 2015)
Song Y. Yan
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorization, discrete logarithms, elliptic curve arithmetic, conjecture and numerical verification. The author discusses quantum algorithms for solving the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP), and the Elliptic Curve Discrete Logarithm Problem (ECDLP) and for attacking IFP, DLP and ECDLP based cryptographic systems. Chapters also cover various other quantum algorithms for Pell's equation, principal ideal, unit group, class group, Gauss sums, prime counting function, Riemann's hypothesis and the BSD conjecture. Quantum Computational Number Theory is self-contained and intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the related fields. Number theorists, cryptographers and professionals working in quantum computing, cryptography and network security will find this book a valuable asset.

International Joint Ventures in China - Ownership, Control and Performance (Hardcover, 2000 ed.): Y. Yan International Joint Ventures in China - Ownership, Control and Performance (Hardcover, 2000 ed.)
Y. Yan
R2,889 Discovery Miles 28 890 Ships in 10 - 15 working days

Corporate governance, namely the relationship between the ownership and control of firms, takes on new dimensions in the case of international joint ventures operating in the special context of China. The present study contributes a new examination of this relationship firstly through its conceptual refinement, and secondly through original empirical research. It develops the concept of ownership as suited to joint venture, in which account is taken of non-capital resourcing by foreign and Chinese partners.

Quantum Attacks on Public-Key Cryptosystems (Paperback, 2013 ed.): Song Y. Yan Quantum Attacks on Public-Key Cryptosystems (Paperback, 2013 ed.)
Song Y. Yan
R3,441 Discovery Miles 34 410 Ships in 10 - 15 working days

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists. Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.

Primality Testing and Integer Factorization in Public-Key Cryptography (Paperback, Softcover reprint of hardcover 2nd ed.... Primality Testing and Integer Factorization in Public-Key Cryptography (Paperback, Softcover reprint of hardcover 2nd ed. 2009)
Song Y. Yan
R4,377 Discovery Miles 43 770 Ships in 10 - 15 working days

Intended for advanced level students in computer science and mathematics, this key text, now in a brand new edition, provides a survey of recent progress in primality testing and integer factorization, with implications for factoring based public key cryptography. For this updated and revised edition, notable new features include a comparison of the Rabin-Miller probabilistic test in RP, the Atkin-Morain elliptic curve test in ZPP and the AKS deterministic test.

Number Theory for Computing (Paperback, Softcover reprint of hardcover 2nd ed. 2002): M. E. Hellmann Number Theory for Computing (Paperback, Softcover reprint of hardcover 2nd ed. 2002)
M. E. Hellmann; Song Y. Yan
R1,816 Discovery Miles 18 160 Ships in 10 - 15 working days

This book provides a good introduction to the classical elementary number theory and the modern algorithmic number theory, and their applications in computing and information technology, including computer systems design, cryptography and network security. In this second edition proofs of many theorems have been provided, further additions and corrections were made.

Cryptanalytic Attacks on RSA (Paperback, Softcover reprint of hardcover 1st ed. 2008): Song Y. Yan Cryptanalytic Attacks on RSA (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Song Y. Yan
R3,095 Discovery Miles 30 950 Ships in 10 - 15 working days

RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number theory, background information on complexity theory and number theory is presented first, followed by an account of the RSA cryptographic system and its variants.

This book is also suitable as a secondary text for advanced-level students in computer science and mathematics.

Foreign Investment and Corporate Governance in China (Paperback, 1st ed. 2005): Y. Yan Foreign Investment and Corporate Governance in China (Paperback, 1st ed. 2005)
Y. Yan
R1,509 Discovery Miles 15 090 Ships in 10 - 15 working days

This book reports on foreign investments in transitional economies and the corporate governance of international strategic alliances in China. It throws new light on the relationship between ownership, corporate governance, international technology transfer, organizational learning and the performance of such alliances. The book reviews the problems encountered by these international strategic alliances, provides significant empirical evidence of foreign investment decisions and profiles corporate governance and organizational learning in strategic alliances. Based on research into 1000 firms in China, it draws important conclusions for theory and practice.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Robert Burns Story
John Cairney CD R437 Discovery Miles 4 370
The Little Book of Ocean Animal Sounds
Caz Buckingham, Andrea Pinnington Board book  (1)
R474 R435 Discovery Miles 4 350
Over the Waves to Shetland
Da Fustra CD R516 Discovery Miles 5 160
and the shadows took him - A Novel
Daniel Chacon Paperback R434 R409 Discovery Miles 4 090
SAICA Student Handbook 2024/2025 Volume…
Paperback R1,156 R1,089 Discovery Miles 10 890
Life of Pi - Novel and Study Notes
Paperback R110 Discovery Miles 1 100
Financial Accounting - An Introduction
Jacqui Kew Paperback R677 Discovery Miles 6 770
Average Expectations - Lessons in…
Shep Rose Paperback R445 R415 Discovery Miles 4 150
Globalization, International Spillovers…
Charlie Karlsson, Andreas P. Cornett, … Hardcover R3,876 Discovery Miles 38 760
Search the Rain Forest, Find the Animals
Nancy Coffelt Hardcover R381 Discovery Miles 3 810

 

Partners