![]() |
Topics in Cryptology - CT-RSA 2001: The Cryptographer's Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
ISBN: 9783540418986 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. You are holding the rst in a hopefully long and successful series of RSA Cr- tographers' Track proceedings. The Cryptographers' Track (CT-RSA) is one of the many parallel tracks of the yearly RSA Conference. Other sessions deal with government projects, law and policy issues, freedom and privacy news, analysts' opinions, standards, ASPs, biotech and healthcare, nance, telecom and wireless security, developers, new products, implementers, threats, RSA products, VPNs, as well as cryp- graphy and enterprise tutorials. RSA Conference 2001 is expected to continue the tradition and remain the...
You are holding the rst in a hopefully long and successful series of RSA Cr- tographers' Track proceedings. The Cryptographers' Track (CT-RSA) is one ...
|
cena:
203,13 |
![]() |
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security: International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21-23, 2001 Proceedings
ISBN: 9783540421030 / Angielski / Miękka / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Systems, MMM-ACNS 2001, held in St. Petersburg in May 2001.
The 24 revised full papers presented together with five invited contributions were carefully reviewed and selected from 36 submissions. The papers are organized in topical sections on network security systems: foundations, models and architectures; intrusion detection: foundations and models; access control, authentication, and authorization; and cryptography and steganography:... This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Syst...
|
cena:
304,72 |
![]() |
Foundations of Security Analysis and Design: Tutorial Lectures
ISBN: 9783540428961 / Angielski / Miękka / 405 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic commerce, information protection, network and systems integrity, etc. This volume presents revised versions of lectures given by leading security researchers during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, held in Bertinoro, Italy in September.
Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, ...
|
cena:
203,13 |
![]() |
Topics in Cryptology - CT-RSA 2002: The Cryptographer's Track at the RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings
ISBN: 9783540432241 / Angielski / Miękka / 318 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly RSA Security Conference in Springer-Verlag's Lecture Notes in Computer Science series. With 14 parallel tracks and many thousands of participants, the RSA - curity Conference is the largest e-security and cryptography conference. In this setting, the Cryptographers' Track presents the latest scienti?c developments. The program committee considered 49 papers and selected 20 for presen- tion. One paper was withdrawn by the authors. The program...
This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly ...
|
cena:
203,13 |
![]() |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
ISBN: 9783540255215 / Angielski / Miękka / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Second International Conference on Security in Pervasive Computing, SPC 2005, held in Boppard, Germany in April 2005.The 14 revised full papers and 3 revised short papers presented together with abstracts of 5 invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on smart devices and applications, authentication, privacy and anonymity, and access control and information flow.
This book constitutes the refereed proceedings of the Second International Conference on Security in Pervasive Computing, SPC 2005, held in Boppard, G...
|
cena:
203,13 |
![]() |
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
ISBN: 9783540404101 / Angielski / Miękka / 222 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9. The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed are DES implementation for DRM applications, cryptographic attacks, industrial challenges, public key broadcast encryption, fingerprinting, copy-prevention techniques, copyright limitations, content protection, watermarking systems,...
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002... |
cena:
203,13 |
![]() |
Cryptography: Policy and Algorithms: International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings
ISBN: 9783540607595 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995.
Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the... This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Au...
|
cena:
203,13 |
![]() |
Information Security and Cryptology - ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers
ISBN: 9783540213765 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and... This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 20... |
cena:
203,13 |
![]() |
Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings
ISBN: 9783540405153 / Angielski / Miękka / 540 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003. The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on privacy and anonymity, elliptic curve cryptography, cryptanalysis, mobile and network security, digital signatures, cryptosystems, key management, and theory and hash functions.
This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in... |
cena:
203,13 |
![]() |
Information Security: 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings
ISBN: 9783540426622 / Angielski / Miękka / 562 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange of ideas. The conference, an outgrowth of the Information Security Workshop (ISW) series, was held in Malaga, Spain, on October 1-3, 2001. Previous workshops were ISW '97 at Ishikawa, Japan; ISW '99 at Kuala Lumpur, Malaysia; and ISW 2000 at Wollongong, Australia. The General Co chairs, Javier Lopez and Eiji Okamoto, oversaw the local organization, registration, and performed many other tasks. Many individuals deserve thanks for their...
The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange ...
|
cena:
203,13 |
![]() |
Financial Cryptography: 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000 Proceedings
ISBN: 9783540427001 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Financial Cryptography 2000 marked the fourth time the technical, business, legal, and political communities from around the world joined together on the smallislandofAnguilla, BritishWestIndiestodiscussanddiscovernewadvances in securing electronic ?nancial transactions. The conference, sponsored by the International Financial Cryptography Association, was held on February 20 24, 2000. The General Chair, Don Beaver, oversaw the local organization and registration. The program committee considered 68 submissions of which 21 papers were accepted. Each submitted paper was reviewed by a minimum...
Financial Cryptography 2000 marked the fourth time the technical, business, legal, and political communities from around the world joined together on ...
|
cena:
203,13 |
![]() |
Integrity Primitives for Secure Information Systems: Final RIPE Report of RACE Integrity Primitives Evaluation
ISBN: 9783540606406 / Angielski / Miękka / 251 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man-month project conducted by 16 leading European security experts.
This book offers expert advice to professionals seeking to secure information systems by applying up-to-date cryptographic techniques. The core of this volume is a detailed integrity primitives portfolio recommendation. Among the issues addressed are security services, integrity mechanisms, data origin authentication, entity authentication, access control, data integrity,... This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man...
|
cena:
203,13 |
![]() |
Fast Software Encryption: 6th International Workshop, FSE'99 Rome, Italy, March 24-26, 1999 Proceedings
ISBN: 9783540662266 / Angielski / Miękka / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed post-workshop proceedings of the 6th International Workshop on Fast Software Encryption (FSE'99), held in Rome, Italy, in March 1999. The 22 revised full papers presented were carefully selected from a total of 51 submissions during two rounds of reviewing and revision. The book is divided into sections on advanced encryption standard (AES), remotely keyed encryptions, analysis of block ciphers, miscellaneous, modes of operation and stream ciphers.
This volume constitutes the refereed post-workshop proceedings of the 6th International Workshop on Fast Software Encryption (FSE'99), held in Rome, I...
|
cena:
203,13 |
![]() |
Beautiful Security: Leading Security Experts Explain How They Think
ISBN: 9780596527488 / Angielski / Miękka / 302 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same.
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology dem... |
cena:
166,94 |
![]() |
Computer Safety, Reliability and Security: 20th International Conference, SAFECOMP 2001, Budapest, Hungary, September 26-28, 2001 Proceedings
ISBN: 9783540426073 / Angielski / Miękka / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This year we celebrated another anniversary: after 20 years of SAFECOMP in 1999, th this was the 20 SAFECOMP since its inauguration in 1979. This series of events focuses on critical computer applications. It is intended to be a platform for knowledge transfer between academia, industry, and research institutions. Papers are solicited on all aspects of computer systems in which safety, reliability, and security (applied to safety in terms of integrity and availability) are of importance. The 20th SAFECOMP tried to cover new grounds, both thematically and geographically. The previous 19...
This year we celebrated another anniversary: after 20 years of SAFECOMP in 1999, th this was the 20 SAFECOMP since its inauguration in 1979. This seri...
|
cena:
203,13 |
![]() |
Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings
ISBN: 9783540205920 / Angielski / Miękka / 550 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2003, held in Taipei, Taiwan in November/December 2003.The 32 revised full papers presented together with one invited paper were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on public key cryptography, number theory, efficient implementations, key management and protocols, hash functions, group signatures, block cyphers, broadcast and multicast, foundations and complexity theory,...
This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Securit...
|
cena:
203,13 |
![]() |
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
ISBN: 9783540407317 / Angielski / Miękka / 210 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requirement. This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security... For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the br... |
cena:
203,13 |
![]() |
Information Security and Cryptology: ICISC 2007
ISBN: 9783540767879 / Angielski / Miękka / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization. This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seo... |
cena:
203,13 |
![]() |
Finite Automata and Application to Cryptography
ISBN: 9783540782568 / Angielski / Twarda / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Finite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to cryptography. In addition, autonomous finite automata and Latin arrays, which are relative to the canonical form for one-key cryptosystems based on finite automata, are also discussed. Finite automata are regarded as a natural model for ciphers. The Ra Rb transformation method is introduced to deal with the structure problem of such automata; then public key cryptosystems based on finite automata and a canonical form for one-key ciphers... Finite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to crypt... |
cena:
609,48 |
![]() |
Network Security: Know It All
ISBN: 9780123744630 / Angielski / Twarda / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field's leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized...
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the fi...
|
cena:
297,40 |