![]() |
Advances in Cryptology — CRYPTO ’96: 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18–22, 1996, Proceedings
ISBN: 9783540615125 / Angielski / Miękka / 415 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Crypto '96, the Sixteenth Annual Crypto Conference, is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and P- vacy and the Computer Science Department of the University of California at Santa Barbara (UCSB). It takes place at UCSB from August 18 to 22, 1996. The General Chair, Richard Graveman, is responsible for local organization and registration. The scientific program was organized by the 16-member Program C- mittee. We considered 115 papers. (An additional 15 submissions had to be...
Crypto '96, the Sixteenth Annual Crypto Conference, is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with...
|
cena:
201,24 |
![]() |
Fast Software Encryption: 5th International Workshop, Fse '98, Paris, France, March 23-25, 1998, Proceedings
ISBN: 9783540642657 / Angielski / Miękka / 297 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 5th International Workshop on Fast Software Encryption, FSE '98, held in Paris, France, in March 1998. The 20 revised full papers presented were carefully reviewed and selected from a total of 39 submissions. The volume is divided in topical sections on cryptanalysis, new stream ciphers, design construction analysis, hash functions, pseudo-random generators, new block ciphers, and modes of operation.
This book constitutes the refereed proceedings of the 5th International Workshop on Fast Software Encryption, FSE '98, held in Paris, France, in March...
|
cena:
201,24 |
![]() |
Vlsi-Soc: Design Methodologies for Soc and Sip: 16th Ifip Wg 10.5/IEEE International Conference on Very Large Scale Integration, Vlsi-Soc 2008, Rhodes
ISBN: 9783642122668 / Angielski / Twarda / 285 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains extended and revised versions of the best papers that were p- sented during the 16th edition of the IFIP/IEEE WG10.5 International Conference on Very Large Scale Integration, a global System-on-a-Chip Design & CAD conference. The 16th conference was held at the Grand Hotel of Rhodes Island, Greece (October 13-15, 2008). Previous conferences have taken place in Edinburgh, Trondheim, V- couver, Munich, Grenoble, Tokyo, Gramado, Lisbon, Montpellier, Darmstadt, Perth, Nice and Atlanta. VLSI-SoC 2008 was the 16th in a series of international conferences sponsored by IFIP TC 10...
This book contains extended and revised versions of the best papers that were p- sented during the 16th edition of the IFIP/IEEE WG10.5 International ...
|
cena:
201,24 |
![]() |
Distributed Computing: 29th International Symposium, Disc 2015, Tokyo, Japan, October 7-9, 2015, Proceedings
ISBN: 9783662486528 / Angielski / Miękka / 678 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 29th International Symposium on Distributed Computing, DISC 2015, held in Tokyo, Japan, in October 2015.
The 42 full papers and 14 short papers presented in this volume were carefully reviewed and selected from 143 submissions. The papers feature original contributions to theory, design, implementation, modeling, analysis, or application of distributed systems and networks. This book constitutes the proceedings of the 29th International Symposium on Distributed Computing, DISC 2015, held in Tokyo, Japan, in October 201... |
cena:
201,24 |
![]() |
Advances in Cryptology - Eurocrypt '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceeding
ISBN: 9783540576006 / Angielski / Twarda / 465 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Eurocrypt is a series of open workshops on the theory and application of cryptographic techniques. These meetings have taken place in Europe every year since 1982 and are sponsored by the International Association for Cryptologic Research. Eurocrypt '93 was held in the village of Lofthus in Norway in May 1993. The call for papers resulted in 117 submissions with authors representing 27 different countries. The 36 accepted papers were selected by the program committee after a blind refereeing process. The papers are grouped into parts on authentication, public key, block ciphers, secret...
Eurocrypt is a series of open workshops on the theory and application of cryptographic techniques. These meetings have taken place in Europe every yea...
|
cena:
201,24 |
![]() |
Digital Communication
ISBN: 9780898382952 / Angielski / Miękka / 713 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book concerns digital communication. Specifically, we treat the transport of bit streams from one geographical location to another over various physical media, such as wire pairs, coaxial cable, optical fiber, and radio waves. Further, we cover the mul tiplexing, multiple access, and synchronization issues relevant to constructing com munication networks that simultaneously transport bit streams from many users. The material in this book is thus directly relevant to the design of a multitude of digital communication systems, including for example local and metropolitan area data net...
This book concerns digital communication. Specifically, we treat the transport of bit streams from one geographical location to another over various p...
|
cena:
402,53 |
![]() |
Theory of Cryptography: 8th Theory of Cryptography Conference, Tcc 2011, Providence, Ri, Usa, March 28-30, 2011, Proceedings
ISBN: 9783642195709 / Angielski / Miękka / 631 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, that was held in Providence, Rhode Island, USA. This book includes 35 full papers together with 2 invited talks.
Constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, that was held in Providence, Rhode Island, USA...
|
cena:
402,53 |
![]() |
Random Walks and Diffusions on Graphs and Databases: An Introduction
ISBN: 9783642195914 / Angielski / Twarda / 262 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text introduces the theory of graphs and random walks on graphs, covers methods for exploring the structure of finite connected graphs and databases, and details applications in electric resistance networks, urban planning, linguistic databases, and more.
This text introduces the theory of graphs and random walks on graphs, covers methods for exploring the structure of finite connected graphs and databa...
|
cena:
402,53 |
![]() |
Database Machines: Fourth International Workshop Grand Bahama Island, March 1985
ISBN: 9780387962009 / Angielski / Miękka / 376 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the papers presented at the Fourth International Workshop on Database Machines. The papers cover a wide spectrum of topics including descrip tions of database machine implementations. analysis of algorithms and database machine components. architectures for knowledge management. recovery and con currency control issues. and solutions to the 110 bottleneck problem. As at the pre vious workshops in Florence. San Diego. and Munich. a diverse collection of coun tries. universities. research labs. and database machine vendors were represented by the authors and conference...
This volume contains the papers presented at the Fourth International Workshop on Database Machines. The papers cover a wide spectrum of topics includ...
|
cena:
201,24 |
![]() |
Advances in Classification and Data Analysis
ISBN: 9783540414889 / Angielski / Miękka / 378 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains a selection of papers presented at the biannual meeting of the Classification and Data Analysis Group of Societa Italiana di Statistica, which was held in Rome, July 5-6, 1999. From the originally submitted papers, a careful review process led to the selection of 45 papers presented in four parts as follows: CLASSIFICATION AND MULTIDIMENSIONAL SCALING Cluster analysis Discriminant analysis Proximity structures analysis and Multidimensional Scaling Genetic algorithms and neural networks MUL TIV ARIA TE DATA ANALYSIS Factorial methods Textual data analysis Regression...
This volume contains a selection of papers presented at the biannual meeting of the Classification and Data Analysis Group of Societa Italiana di Stat...
|
cena:
402,53 |
![]() |
Chaos-Based Cryptography: Theory, Algorithms and Applications
ISBN: 9783642205415 / Angielski / Twarda / 398 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers... Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic sys... |
cena:
603,81 |
![]() |
Information and Meaning: An Evolutionary Perspective
ISBN: 9783540761396 / Angielski / Miękka / 255 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Designed to clarify issues relating to the concept of information, this volume aims to develop a science of information and to study a pattern of interrelated phenomena which extends throughout nature. It covers a range of territory, from the nature of information to how neurons create thought.
Designed to clarify issues relating to the concept of information, this volume aims to develop a science of information and to study a pattern of inte...
|
cena:
402,53 |
![]() |
An Integrated Approach to Software Engineering
ISBN: 9781441935441 / Angielski / Miękka / 566 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. An introductory course in Software Engineering remains one of the hardest subjects to teach. Much of the difficulty stems from the fact that Software Engineering is a very wide field which includes a wide range of topics. Con- sequently, what should be the focus of an introductory course remains a challenge with many possible viewpoints. This third edition of the book approaches the problem from the perspec- tive of what skills a student should possess after the introductory course, particularly if it may be the only course on software engineering in the stu- dent's program. The goal of this...
An introductory course in Software Engineering remains one of the hardest subjects to teach. Much of the difficulty stems from the fact that Software ...
|
cena:
297,70 |
![]() |
Algebraic Aspects of the Advanced Encryption Standard
ISBN: 9781441937292 / Angielski / Miękka / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic tech niques. The cipher is a fitting tribute to their distinctive approach to cipher design. Since the publication of the AES, however, the very same algebraic structures have been the subject of increasing cryptanalytic attention and this monograph has been written to summarise current research. We hope that this work...
It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent R...
|
cena:
422,66 |
![]() |
Cryptographics: Exploiting Graphics Cards for Security
ISBN: 9781441939647 / Angielski / Miękka / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes. CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs... Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficult... |
cena:
402,53 |
![]() |
Computer Viruses and Malware
ISBN: 9781441940162 / Angielski / Miękka / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware... Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger... |
cena:
523,30 |
![]() |
Multivariate Public Key Cryptosystems
ISBN: 9781441940773 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC will become a necessary alternative. Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. The first chapter is an introduction to the basic ideas and early development of both... Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly be... |
cena:
483,04 |
![]() |
Malware Detection
ISBN: 9781441940957 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have... Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medi... |
cena:
1207,67 |
![]() |
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ISBN: 9781441940964 / Angielski / Miękka / 394 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the network's location or its relative location, with respect to the rest of the network neighbors. However, due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. Secure Localization and Time... Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the n... |
cena:
827,64 |
![]() |
Artificial Intelligence Applications and Innovations: 3rd Ifip Conference on Artificial Intelligence Applications and Innovations (Aiai), 2006, June 7
ISBN: 9781441941688 / Angielski / Miękka / 744 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Artificial Intelligence applications build on a rich and proven theoretical background to provide solutions to a wide range of real life problems. The ever expanding abundance of information and computing power enables researchers and users to tackle higly interesting issues for the first time, such as applications providing personalized access and interactivity to multimodal information based on preferences and semantic concepts or human-machine interface systems utilizing information on the affective state of the user. The purpose of the 3rd IFIP Conference on Artificial Intelligence... Artificial Intelligence applications build on a rich and proven theoretical background to provide solutions to a wide range of real life problems. ... |
cena:
603,81 |