![]() |
Rfid Security: Techniques, Protocols and System-On-Chip Design
ISBN: 9781441945570 / Angielski / Miękka / 446 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware... RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardwa... |
cena:
579,64 zł |
![]() |
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
ISBN: 9781609608514 / Angielski / Twarda / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter...
Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Prac...
|
cena:
1089,27 zł |
![]() |
Geometries, Codes and Cryptography
ISBN: 9783211822050 / Angielski / Miękka / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The general problem studied by information theory is the reliable transmission of information through unreliable channels. Channels can be unreliable either because they are disturbed by noise or because unauthorized receivers intercept the information transmitted. In the first case, the theory of error-control codes provides techniques for correcting at least part of the errors caused by noise. In the second case cryptography offers the most suitable methods for coping with the many problems linked with secrecy and authentication. Now, both error-control and cryptography schemes can be...
The general problem studied by information theory is the reliable transmission of information through unreliable channels. Channels can be unreliable ...
|
cena:
193,19 zł |
![]() |
Post-Quantum Cryptography
ISBN: 9783642100192 / Angielski / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical... Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader ... |
cena:
579,64 zł |
![]() |
Security and Privacy in Mobile Information and Communication Systems: Second International Icst Conference, Mobisec 2010, Catania, Sicily, Italy, May
ISBN: 9783642175015 / Angielski / Miękka / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.
MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile tech...
|
cena:
193,19 zł |
![]() |
Encyclopedia of Cryptography and Security
ISBN: 9781441959058 / Angielski / Miękka / 1416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition 5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography...
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive ...
|
cena:
3284,81 zł |
![]() |
Advances in Cryptology -- Crypto '91: Proceedings
ISBN: 9783540551881 / Angielski / Miękka / 484 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Presents the proceedings of the 11th in a series of workshops on cryptology sponsored by the International Association for Cryptologic Research. All theoretical and practical aspects of cryptology are represented.
Presents the proceedings of the 11th in a series of workshops on cryptology sponsored by the International Association for Cryptologic Research. All t...
|
cena:
193,19 zł |
![]() |
A Classical Introduction to Cryptography Exercise Book
ISBN: 9781441939128 / Angielski / Miękka / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY...
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerlan...
|
cena:
166,13 zł |
![]() |
Primality Testing and Integer Factorization in Public-Key Cryptography
ISBN: 9781441945860 / Angielski / Miękka / 371 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP. Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer... The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm,... |
cena:
579,64 zł |
![]() |
Chipkarten ALS Sicherheitswerkzeug: Grundlagen Und Anwendungen
ISBN: 9783540541400 / Niemiecki / Miękka / 167 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Chipkarten sind Kleinstrechner in Scheckkartenformat, die selbstandig Daten verwalten und verarbeiten konnen. Eine ihrer wichtigsten Anwendungen ist die Realisierung von Sicherheitsdiensten. Mit der Chipkarte steht erstmals ein Werkzeug zur Verfugung, das den Einsatz kryptographischer Methoden kommerziell moglich macht und damit in ausserst benutzerfreundlicher Weise hohe Sicherheit bietet. Es ermoglicht z.B. einen sicheren Zugang zum offentlichen Telefon, "elektronisches Einkaufen" (POS-Banking, electronic cash) oder den Einsatz als Dokument, etwa als medizinischer Notfallausweis. Dieses...
Chipkarten sind Kleinstrechner in Scheckkartenformat, die selbstandig Daten verwalten und verarbeiten konnen. Eine ihrer wichtigsten Anwendungen ist d...
|
cena:
198,60 zł |
![]() |
Formale Begriffsanalyse Mit C++: Datenstrukturen Und Algorithmen
ISBN: 9783540610717 / Niemiecki / Miękka / 325 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Das Buch soll den Leser, der an Formaler Begriffsanalyse als Methode der Datenanalyse und Wissenstrukturierung interessiert ist, in die Lage versetzen, eigene C++-Programme zur Formalen Begriffsanalyse zu schreiben. Die C++-Klassenbibliothek wird in Aufbau und Benutzung ausfuhrlich anhand zahlreicher Beispiele sowie den zugrunde liegenden mathematischen Begriffen diskutiert. Die Vorgehensweisen der Formalen Begriffsanalyse werden an einem Anwendungsbeispiel erlautert, so dass das Buch sowohl als Leitfaden fur den interessierten Neueinsteiger als auch als Handbuch fur den versierten...
Das Buch soll den Leser, der an Formaler Begriffsanalyse als Methode der Datenanalyse und Wissenstrukturierung interessiert ist, in die Lage versetzen...
|
cena:
198,60 zł |
![]() |
Fast Software Encryption: 5th International Workshop, Fse '98, Paris, France, March 23-25, 1998, Proceedings
ISBN: 9783540642657 / Angielski / Miękka / 297 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 5th International Workshop on Fast Software Encryption, FSE '98, held in Paris, France, in March 1998. The 20 revised full papers presented were carefully reviewed and selected from a total of 39 submissions. The volume is divided in topical sections on cryptanalysis, new stream ciphers, design construction analysis, hash functions, pseudo-random generators, new block ciphers, and modes of operation.
This book constitutes the refereed proceedings of the 5th International Workshop on Fast Software Encryption, FSE '98, held in Paris, France, in March...
|
cena:
193,19 zł |
![]() |
Digitale Signatur: Grundlagen, Funktion Und Einsatz
ISBN: 9783540655633 / Niemiecki / Miękka / 209 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digitale Kommunikation dringt in immer mehr Bereiche privater und unternehmerischer Anwendungsfelder ein. Seit 1997 sind die gesetzlichen Rahmenbedingungen in Deutschland fur rechtlich gesicherte Vorgange im Internet geschaffen. Zentraler Bestandteil ist die digitale Signatur. Die Autoren erklaren anschaulich und detailliert deren Konzept und Einsatzmoglichkeiten. Die Funktionen von Signatur, Trustcenter, Chipkarte und asymmetrischem Schlusselverfahren werden dargestellt und durch zahlreiche Diagramme verdeutlicht. Die Informationen dienen als Entscheidungsgrundlage fur den Einsatz der...
Digitale Kommunikation dringt in immer mehr Bereiche privater und unternehmerischer Anwendungsfelder ein. Seit 1997 sind die gesetzlichen Rahmenbeding...
|
cena:
198,60 zł |
![]() |
Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January
ISBN: 9783642125942 / Angielski / Miękka / 168 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, held in Hong Kong, during January 4-5, 2010. The 25 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on Privacy Protection and Challenges, Legal Challenges, Engineering and Social Challenges, Ethical and Medical Concerns, Policy Issues and Deployments in Asia, Challenges in Large Scale Biometrics Identification. This volume constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Ethics and Policy of Biometric... |
cena:
193,19 zł |
![]() |
Network and System Security: 9th International Conference, Nss 2015, New York, Ny, Usa, November 3-5, 2015, Proceedings
ISBN: 9783319256443 / Angielski / Miękka / 542 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security. ... This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA,... |
cena:
193,19 zł |
![]() |
Information Security: 5th International Conference, Isc 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings
ISBN: 9783540442707 / Angielski / Miękka / 502 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide variety of different disciplines of information security to foster the exchange of ideas. The conference is an outgrowth of the Information Security Workshop, first held in Ishikawa, Japan 1997. ISC 2002 was held in Sao Paulo, Brazil, on September 30- October 2, 2002. The Program Committee considered 81 submissions of which 38 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. The...
As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in ...
|
cena:
193,19 zł |
![]() |
Approximative Public-Key-Kryptosysteme
ISBN: 9783540509042 / Niemiecki / Miękka / 174 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In der vorliegenden Arbeit werden die Einsatzmoglichkeiten approximativer Verfahren fur Public-Key-Kryptosysteme untersucht. Dazu werden in einer allgemeinverstandlichen Einleitung die notwendigen Grundlagen erarbeitet. Im Anschluss daran werden Resultate uber eine reellwertige Approximation periodischer und nichtperiodischer Funktionen fur Verschlusselungssysteme mit offentlichem Schlussel entwickelt. Weiterhin werden die kryptologischen Eigenschaften rationaler Zahlen untersucht. Diese fliessen in die Entwicklung eines neuen Konzeptes fur ein Public-Key-Kryptosystem ein, die...
In der vorliegenden Arbeit werden die Einsatzmoglichkeiten approximativer Verfahren fur Public-Key-Kryptosysteme untersucht. Dazu werden in einer allg...
|
cena:
198,60 zł |
![]() |
Datenschutz und Datensicherung im Wandel der Informationstechnologien: 1.GI-Fachtagung München, 30. und 31. Oktober 1985 Proceedings
ISBN: 9783540160366 / Niemiecki / Miękka / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Der Arbeitskreis "Datenschutz und Datensicherung" des Prasidiums der Gesellschaft fur In formatik sieht es als seine Aufgabe an, Probleme des Datenschutzes und der Datensicherung aus der Sicht der Informatik zu behandeln. Er hat in diesem Rahmen grundsatzliche Aus sagen zu diesen Themen unter besonderer Berucksichtigung der sich rasch entwickelnden In formationstechnologien erarbeitet und zu Entwurfen fur Anderungen des Bundesdatenschutz gesetzes Stellung genommen. Aus dieser Tatigkeit heraus entstand der Plan zur Durchfuh rung einer Fachtagung mit dem Thema "Datenschutz und Datensicherung im...
Der Arbeitskreis "Datenschutz und Datensicherung" des Prasidiums der Gesellschaft fur In formatik sieht es als seine Aufgabe an, Probleme des Datensch...
|
cena:
198,60 zł |
![]() |
VIS ’91 Verläßliche Informationssysteme: GI-Fachtagung, Darmstadt, 13.–15. März 1991 Proceedings
ISBN: 9783540539117 / Niemiecki / Miękka / 355 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Das Thema "Computer-Sicherheit" gehOrt zu den Modethemen der DV-Branche. Doch je nach Zielvorstellung und Ausgangspunkt liegen jeweils andere Frage stellungen im Schwerpunkt der Diskussion zu diesem Thema. Die neugegrOndete Fachgruppe "VerlaBliche Informationssysteme" (2.5.3) der GI wahlt als Ausgangspunkt ihrer Betrachtungen naturgemaB die systemtechnischen Gestaltungsmoglichkeiten von Informationssystemen, und von den vielen moglichen Zielen der Systemgestaltung hat die Fachgruppe die "VerlaBlichkeit" des Systems in den Mittelpunkt gestellt. Mit dem Begriff der VerlaBlichkeit verbindet die...
Das Thema "Computer-Sicherheit" gehOrt zu den Modethemen der DV-Branche. Doch je nach Zielvorstellung und Ausgangspunkt liegen jeweils andere Frage st...
|
cena:
198,60 zł |
![]() |
Advances in Cryptology -- Crypto '92: 12th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 16-20, 1992. Proceedings
ISBN: 9783540573401 / Angielski / Miękka / 593 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Crypto'92 took place on August 16-20, 1992. It was the twelfth in the series of annual cryptology conferences held on the beautiful campus of the University of California, Santa Barbara. Once again, it was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy. The conference ran smoothly, due to the diligent efforts of the g- eral chair, Spyros Magliveras of the University of Nebraska. One of the measures of the success of this series of conferences is represented by the ever increasing...
Crypto'92 took place on August 16-20, 1992. It was the twelfth in the series of annual cryptology conferences held on the beautiful campus of the Univ...
|
cena:
193,19 zł |