wyszukanych pozycji: 16
Understanding Cryptography: A Textbook for Students and Practitioners
ISBN: 9783642446498 / Angielski / Miękka / 2014 / 372 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Cryptography is now ubiquitous moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard... Cryptography is now ubiquitous moving beyond the traditional environments, such as government communications and banking systems, we see cryptograp... |
|
cena:
147,83 zł |
Secure Information Networks: Communications and Multimedia Security Ifip Tc6/Tc11 Joint Working Conference on Communications and Multimedia Securit
ISBN: 9781475764871 / Angielski / Miękka / 2013 / 324 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Security" was used for the first time in 1995, when Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the...
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium fro...
|
|
cena:
778,22 zł |
Privacy Technologies and Policy: Second Annual Privacy Forum, Apf 2014, Athens, Greece, May 20-21, 2014, Proceedings
ISBN: 9783319067483 / Angielski / Miękka / 2014 / 191 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design," with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems.
This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised paper...
|
|
cena:
194,52 zł |
Privacy Technologies and Policy: First Annual Privacy Forum, Apf 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers
ISBN: 9783642540684 / Angielski / Miękka / 2014 / 215 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies.
This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised...
|
|
cena:
179,00 zł |
Cryptographic Hardware and Embedded Systems -- CHES 2011: 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings
ISBN: 9783642239502 / Angielski / Miękka / 2011 / 524 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japa...
|
|
cena:
194,52 zł |
Advances in Cryptology - Eurocrypt 2000: International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, May 14-18
ISBN: 9783540675174 / Angielski / Miękka / 2000 / 612 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This title constitutes 39 revised full papers divided in topical sections of factoring and discrete logarithm, digital signatures, private information retrieval, key management protocols, threshold cryptography, public-key encryption, quantum cryptography, multi-party computation and information theory, zero-knowledge, symmetric cryptography, Boolean functions and hardware, voting schemes, and stream ciphers and block ciphers.
This title constitutes 39 revised full papers divided in topical sections of factoring and discrete logarithm, digital signatures, private information...
|
|
cena:
389,09 zł |
Fast Software Encryption: Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings
ISBN: 9783540605904 / Angielski / Miękka / 1995 / 375 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994.
The 28 papers presented significantly advance the state of the art of software algorithms for two cryptographic primitives requiring very high speeds, namely encryption algorithms and hash functions: this volume contains six proposals for new ciphers as well as new results on the security of the new proposals. In addition, there is an introductory overview by the volume editor. The papers are... This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption h...
|
|
cena:
194,52 zł |
Progress in Cryptology -- AFRICACRYPT 2009: Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009, Proceedings
ISBN: 9783642023835 / Angielski / Miękka / 2009 / 435 str. Termin realizacji zamówienia: ok. 20 dni roboczych. AFRICACRYPT 2009washeld during June 21-25,2009in Gammarth, Tunisia. After AFRICACRYPT 2008 in Casablanca, Morocco, it was the second inter- tional research conference in Africa dedicated to cryptography. The conference received70 submissions;four of these wereidenti?ed as irr- ular submissions. The remaining papers went through a careful doubly ano- mous review process. Every paper received at least three reports; papers with a ProgramCommittee member asco-authorreceived?vereports.After the review period, 25 papers were accepted for presentation. The authors were requested to...
AFRICACRYPT 2009washeld during June 21-25,2009in Gammarth, Tunisia. After AFRICACRYPT 2008 in Casablanca, Morocco, it was the second inter- tional res...
|
|
cena:
194,52 zł |
Topics in Cryptology - CT-RSA 2002: The Cryptographer's Track at the RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings
ISBN: 9783540432241 / Angielski / Miękka / 2002 / 318 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly RSA Security Conference in Springer-Verlag's Lecture Notes in Computer Science series. With 14 parallel tracks and many thousands of participants, the RSA - curity Conference is the largest e-security and cryptography conference. In this setting, the Cryptographers' Track presents the latest scienti?c developments. The program committee considered 49 papers and selected 20 for presen- tion. One paper was withdrawn by the authors. The program...
This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly ...
|
|
cena:
194,52 zł |
Applied Cryptography and Network Security: 16th International Conference, Acns 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
ISBN: 9783319933863 / Angielski / Miękka / 2018 / 716 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. Symmetric Key Primitives; Symmetric Key Primitives;
This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held i...
|
|
cena:
389,09 zł |
Understanding Cryptography: A Textbook for Students and Practitioners
ISBN: 9783642041006 / Angielski / Twarda / 2009 / 392 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Cryptography is now ubiquitous moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard... Cryptography is now ubiquitous moving beyond the traditional environments, such as government communications and banking systems, we see cryptograp... |
|
cena:
147,83 zł |
Secure Information Networks: Communications and Multimedia Security Ifip Tc6/Tc11 Joint Working Conference on Communications and Multimedia Securit
ISBN: 9780792386001 / Angielski / Twarda / 1999 / 324 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Security" was used for the first time in 1995, when Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the...
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium fro...
|
|
cena:
778,22 zł |
Integrity Primitives for Secure Information Systems: Final RIPE Report of RACE Integrity Primitives Evaluation
ISBN: 9783540606406 / Angielski / Miękka / 1995 / 251 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man-month project conducted by 16 leading European security experts.
This book offers expert advice to professionals seeking to secure information systems by applying up-to-date cryptographic techniques. The core of this volume is a detailed integrity primitives portfolio recommendation. Among the issues addressed are security services, integrity mechanisms, data origin authentication, entity authentication, access control, data integrity,... This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man...
|
|
cena:
194,52 zł |
Selected Areas in Cryptography: 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers
ISBN: 9783540331087 / Angielski / Miękka / 2006 / 371 str. Termin realizacji zamówienia: ok. 20 dni roboczych. SAC 2005 was the 12th in a series of annual workshops on Selected Areas in Cryptography. This was the 5th time the workshop was hosted by Queen's U- versity in Kingston (the previous workshops were held here in 1994, 1996, 1998 and 1999).Other SAC workshopshave been organizedat Carleton University in Ottawa (1995, 1997 and 2003), the Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. John's (2002) and the University of Waterloo (2000 and 2004). The workshop provided a relaxed atmosphere in which - searchers in cryptography could present and discuss new work on...
SAC 2005 was the 12th in a series of annual workshops on Selected Areas in Cryptography. This was the 5th time the workshop was hosted by Queen's U- v...
|
|
cena:
194,52 zł |
State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997 Revised Lectures
ISBN: 9783540654742 / Angielski / Miękka / 1998 / 400 str. Termin realizacji zamówienia: ok. 20 dni roboczych. The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer...
The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of c...
|
|
cena:
194,52 zł |
Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991
ISBN: 9783540573418 / Angielski / Miękka / 1993 / 284 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and...
This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Ka...
|
|
cena:
182,85 zł |