![]() |
Practical Signcryption
ISBN: 9783540894094 / Angielski / Twarda / 274 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features...
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confiden...
|
cena:
402,53 |
![]() |
Provable Security: 4th International Conference, Provsec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings
ISBN: 9783642162794 / Angielski / Miękka / 279 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.
The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash function, protocol, encryption, and signcryption. This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.
The 17 papers presented we... |
cena:
201,24 |
![]() |
Digital Signatures: A Survey of Law and Practice in the European Union
ISBN: 9781855734692 / Angielski / Miękka / 466 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the explosion of e-commerce, and especially the use of the internet for business transactions, the "paperless office" should surely already have become a reality. Its progress has, however, been impede by tha lack of sufficient information security and a workable legal framework. So where are we now? Can we really trust electronic business transactions to be reliable, provable and enforceable, even on an international basis? Find the answers in this ground-breaking study undertaken for the European Commission. Carried out by the Interdisciplinary Centre for law and Information...
With the explosion of e-commerce, and especially the use of the internet for business transactions, the "paperless office" should surely already have ...
|
cena:
979,55 |
![]() |
Data Privacy and Security
ISBN: 9781441918161 / Angielski / Miękka / 465 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents... Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is... |
cena:
322,01 |
![]() |
Cryptographic Security Architecture: Design and Verification
ISBN: 9781441929808 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models and practices. "Cryptographic Security Architecture" unveils an alternative means of building a trustworthy system based on concepts... A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar ... |
cena:
402,53 |
![]() |
Multimedia Data Hiding
ISBN: 9781441929945 / Angielski / Miękka / 219 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The digital information revolution has brought about profound changes in our society and our life. New devices and powerful software have made it possible for consumers worldwide to create, manipulate, share, and enjoy the multimedia information. Internet and wireless networks offer ubiquitous channels to deliver and to exchange multimedia information for such pur poses as remote collaboration, distant learning, and entertainment. With all these advances in multimedia coding and communication technologies over the past decade, the major hurdle for allowing much broader access of multimedia...
The digital information revolution has brought about profound changes in our society and our life. New devices and powerful software have made it poss...
|
cena:
402,53 |
![]() |
Mathematical Modeling: Problems, Methods, Applications
ISBN: 9781441933713 / Angielski / Miękka / 294 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains review articles and original results obtained in various fields of modern science using mathematical simulation methods. The basis of the articles are the plenary and some section reports that were made and discussed at the Fourth International Mathematical Simulation Conference, held in Moscow on June 27 through July 1, 2000. The conference was devoted to the following scientific areas: mathematical and computer discrete systems models; non-linear excitation in condensed media; complex systems evolution; mathematical models in economics; non-equilibrium processes...
This volume contains review articles and original results obtained in various fields of modern science using mathematical simulation methods. The basi...
|
cena:
603,81 |
![]() |
Intrusion Detection and Correlation: Challenges and Solutions
ISBN: 9781441936240 / Angielski / Miękka / 118 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and cryptography. The Internet is omnipresent and companies have increasingly put critical resources online. This has given rise to the activities of cyber criminals. Virtually all organizations face increasing threats to their networks and the... Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the proble... |
cena:
402,53 |
![]() |
A Classical Introduction to Cryptography: Applications for Communications Security
ISBN: 9781441937971 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature... A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication securit... |
cena:
322,01 |
![]() |
Towards a Quarter-Century of Public Key Cryptography: A Special Issue of Designs, Codes and Cryptography an International Journal. Volume 19, No. 2/3
ISBN: 9781441949721 / Angielski / Miękka / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Towards a Quarter-Century of Public Key Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area.
Towards a Quarter-Century of Public Key Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field. Towards a Quarter-Century of Public Key Cryptography brings together in one place important contributions and up-to-date research results in ...
|
cena:
402,53 |
![]() |
Validation and Verification of Knowledge Based Systems: Theory, Tools and Practice
ISBN: 9781441951076 / Angielski / Miękka / 366 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Knowledge-based (KB) technology is being applied to complex problem-solving and critical tasks in many application domains. Concerns have naturally arisen as to the dependability of knowledge-based systems (KBS). As with any software, attention to quality and safety must be paid throughout development of a KBS and rigorous verification and validation (V&V) techniques must be employed. Research in V&V of KBS has emerged as a distinct field only in the last decade and is intended to address issues associated with quality and safety aspects of KBS and to credit such applications with the same...
Knowledge-based (KB) technology is being applied to complex problem-solving and critical tasks in many application domains. Concerns have naturally ar...
|
cena:
805,10 |
![]() |
Databases and Mobile Computing
ISBN: 9781441951625 / Angielski / Miękka / 86 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Database and Mobile Computing brings together in one place important contributions and up-to-date research results in this important area.
Databases and Mobile Computing serves as an excellent reference, providing insight into some of the most important research issues in the field. Database and Mobile Computing brings together in one place important contributions and up-to-date research results in this important area. |
cena:
402,53 |
![]() |
Oversampled Delta-Sigma Modulators: Analysis, Applications and Novel Topologies
ISBN: 9781441953506 / Angielski / Miękka / 226 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The analysis of the quantization noise in delta-sigma modulators is not a trivial task. State-of-the-art analysis methods include modelling the quantization noise as a uniform distributed white noise. However, it is not uncommon to observe limit cycle oscillations and tones at the output of a delta-sigma modulator. In most of the applications, these limit cycles and tones are strictly objectionable. Such an application, for instance, is a Fractional-N PLL frequency synthesizer, where idle tones and limit cycles generated from the delta-sigma modulator directly appear in the synthesized RF...
The analysis of the quantization noise in delta-sigma modulators is not a trivial task. State-of-the-art analysis methods include modelling the quanti...
|
cena:
451,44 |
![]() |
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
ISBN: 9781441954381 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. ...Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading E... |
cena:
805,10 |
![]() |
The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
ISBN: 9781441954473 / Angielski / Miękka / 411 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library. As such it should also serve the purpose of being a quick refresher for terms the reader has not seen since the days when one attended a computing science program, information security course or workshop. As a reference work, THE INFORMATION SECURITY DICTIONARY provides a relatively complete and easy-to-read explanation of common se- rity, malware, vulnerability and infrastructure protection...
Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an es...
|
cena:
531,39 |
![]() |
Evolutionary Multiobjective Optimization: Theoretical Advances and Applications
ISBN: 9781849969161 / Angielski / Miękka / 302 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Evolutionary Multiobjective Optimization is a rare collection of the latest state-of-the-art theoretical research, design challenges and applications in the field of multiobjective optimization paradigms using evolutionary algorithms. It includes two introductory chapters giving all the fundamental definitions, several complex test functions and a practical problem involving the multiobjective optimization of space structures under static and seismic loading conditions used to illustrate the various multiobjective optimization concepts. Important features include:... Evolutionary Multiobjective Optimization is a rare collection of the latest state-of-the-art theoretical research, design challeng... |
cena:
523,30 |
![]() |
Fuzzy Probabilities and Fuzzy Sets for Web Planning
ISBN: 9783642055966 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. 1.1 Introduction This book is written in five major divisions. The first part is the introduc- tory chapters consisting of Chapters 1-3. In part two, Chapters 4-10, we use fuzzy probabilities to model a fuzzy queuing system . We switch to employ- ing fuzzy arrival rates and fuzzy service rates to model the fuzzy queuing system in part three in Chapters 11 and 12. Optimization models comprise part four in Chapters 13-17. The final part has a brief summary and sug- gestions for future research in Chapter 18, and a summary of our numerical methods for calculating fuzzy probabilities, values of...
1.1 Introduction This book is written in five major divisions. The first part is the introduc- tory chapters consisting of Chapters 1-3. In part two, ...
|
cena:
402,53 |
![]() |
Chaos-Based Digital Communication Systems: Operating Principles, Analysis Methods, and Performance Evaluation
ISBN: 9783642056161 / Angielski / Miękka / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the 1970's and 1980's, we saw phenomenal advancement in nonlinear sci ence, which had led to many important discoveries that greatly improve our understanding of the physical world. Among them, the discovery of chaos in deterministic systems is unarguably one of the most revolutionary scientific findings. We are now able to explain the apparent complexity and subtle or der exhibited by many physical systems under the unified framework of chaos theory. The past decade has seen heightened interest in the exploitation of chaos for useful applications in engineering systems. One application...
In the 1970's and 1980's, we saw phenomenal advancement in nonlinear sci ence, which had led to many important discoveries that greatly improve our un...
|
cena:
603,81 |
![]() |
Intelligent Agents: Theory and Applications
ISBN: 9783642060311 / Angielski / Miękka / 404 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This research book presents the agent theory and adaptation of agents in different contexts. Agents of different orders of complexity must be autonomous in the rules used. The agent must have a brain by which it can discover rules contained within the data. Because rules are the instruments by which agents change the environment, any adaptation of the rules can be considered as an evolution of the agents. Because uncertainty is present in every context, we shall describe in this book how it is possible to introduce global uncertainty from the local world into the description of the rules....
This research book presents the agent theory and adaptation of agents in different contexts. Agents of different orders of complexity must be autonomo...
|
cena:
603,81 |
![]() |
Knowledge, Complexity and Innovation Systems
ISBN: 9783642075506 / Angielski / Miękka / 482 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In recent years there has been growing scientific interest in the triangular relationship between knowledge. complexity and innovation systems. The concept of'innovation systems' carries the idea that innovations do not originate as isolated discrete phenomena, but are generated through the interaction of a number of actors or agents. This set of actors and interactions possess certain specific characteristics that tend to remain over time. Such characteristics are also shared by national, regional, sectoral and technological interaction systems. They can all be represented as sets of ...
In recent years there has been growing scientific interest in the triangular relationship between knowledge. complexity and innovation systems. The co...
|
cena:
603,81 |