Transactions on Data Hiding and Multimedia Security IX: Special Issue on Visual Cryptography
ISBN: 9783642550454 / Angielski / Miękka / 131 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applicat...
|
|
cena:
193,19 zł |
Information Security Practice and Experience: 10th International Conference, Ispec 2014, Fuzhou, China, May 5-8, 2014, Proceedings
ISBN: 9783319063195 / Angielski / Miękka / 578 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.
This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou...
|
|
cena:
193,19 zł |
Querying Over Encrypted Data in Smart Grids
ISBN: 9783319063546 / Angielski / Miękka / 78 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for...
This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypt...
|
|
cena:
193,19 zł |
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
ISBN: 9780071821650 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Best practices for protecting critical data and systems
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance... Best practices for protecting critical data and systems
Information Assurance Handbook: Effective Computer Security and Risk Management Strategi... |
|
cena:
306,60 zł |
Advances in Cryptology – EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings
ISBN: 9783642552199 / Angielski / Miękka / 714 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and...
This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYP...
|
|
cena:
193,19 zł |
Protecting Oracle Database 12c
ISBN: 9781430262114 / Angielski / Miękka / 332 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration despite ongoing and new security issues in the software. The book demonstrates, through coded examples, how you can enable the consolidation features of Oracle Database 12c without increasing risk of either internal corruption or external vulnerability. In addition, new protections not publicly available are included, so that you can see how demonstrable risk improvements... Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle databa... |
|
cena:
212,51 zł |
Progress in Cryptology - Africacrypt 2014: 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings
ISBN: 9783319067339 / Angielski / Miękka / 476 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICA CRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented together with 1 invited talk were carefully reviewed and selected from 83 submissions. The aim of Africa crypt 2014 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography and its applications as follows: Public-Key...
This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa...
|
|
cena:
193,19 zł |
Secure Data Management: 10th Vldb Workshop, Sdm 2013, Trento, Italy, August 30, 2013, Proceedings
ISBN: 9783319068107 / Angielski / Miękka / 139 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions.
This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 r...
|
|
cena:
193,19 zł |
Engineering Secure Future Internet Services and Systems: Current Research
ISBN: 9783319074511 / Angielski / Miękka / 393 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers. The engineering approach of the Network of Excellence NESSoS, funded by the European Commission, is based on the principle of addressing security concerns from the very beginning in all software development phases, thus contributing to reduce the amount of software vulnerabilities and enabling the systematic treatment of security needs through the engineering process. The...
This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future I...
|
|
cena:
193,19 zł |
Healthcare Information Security and Privacy
ISBN: 9780071831796 / Angielski / Miękka / 560 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Operational, tested information security and privacy practices for the healthcare environment
Written by an expert in the field with multiple industry certifications, this definitive resource fully addresses information security and privacy considerations and their implications within the business of patient care. The book begins with an overview of the organization, financing, and delivery of healthcare and discusses technology, terminology, and data management principles. The topic coverage continues across all aspects of information security and privacy, with a special emphasis on... Operational, tested information security and privacy practices for the healthcare environment
Written by an expert in the field with multiple indus... |
|
cena:
306,60 zł |
Applied Cryptography and Network Security: 12th International Conference, Acns 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
ISBN: 9783319075358 / Angielski / Miękka / 586 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.
This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in L...
|
|
cena:
193,19 zł |
Selected Areas in Cryptography -- Sac 2013: 20th International Conference, Burnaby, Bc, Canada, August 14-16, 2013, Revised Selected Papers
ISBN: 9783662434130 / Angielski / Miękka / 590 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections including: lattices; discrete logarithms; stream ciphers and authenticated encryption; post-quantum (hash-based and system solving); white box crypto; block ciphers; elliptic curves, pairings and RSA; hash functions and MACs; and side-channel attacks.
The papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections including: lattic...
|
|
cena:
193,19 zł |
Information Security Theory and Practice. Securing the Internet of Things: 8th Ifip Wg 11.2 International Workshop, Wistp 2014, Heraklion, Crete, Gree
ISBN: 9783662438251 / Angielski / Miękka / 201 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy.
This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 20...
|
|
cena:
193,19 zł |
Foundations of Coding: Compression, Encryption, Error Correction
ISBN: 9781118881446 / Angielski / Twarda / 376 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations. This text focuses on the ways to structure information so that its transmission will be in the safest, quickest, and most efficient and error-free manner possible. All coding operations are covered in a single framework, with initial chapters addressing early mathematical models and algorithmic... Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations ... |
|
cena:
518,85 zł |
Practical Cryptography: Algorithms and Implementations Using C++
ISBN: 9781482228892 / Angielski / Twarda / 365 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language.
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without...
|
|
cena:
616,46 zł |
Information Security and Privacy: 19th Australasian Conference, Acisp 2014, Wollongong, Nsw, Australia, July 7-9, 2014. Proceedings
ISBN: 9783319083438 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.
This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in...
|
|
cena:
193,19 zł |
Smart Card Research and Advanced Applications: 12th International Conference, Cardis 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Pap
ISBN: 9783319083018 / Angielski / Miękka / 271 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Card Research and Advanced Applications, CARDIS 2013, held in Berlin, Germany, in November 2013. The 17 revised full papers presented in this book were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on security technologies; attacks on masking; side channel attacks; software and protocol analysis; side channel countermeasures; and side channel and fault attacks.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Card Research and Advanced App...
|
|
cena:
185,49 zł |
Privacy Enhancing Technologies: 14th International Symposium, Pets 2014, Amsterdam, the Netherlands, July 16-18, 2014, Proceedings
ISBN: 9783319085050 / Angielski / Miękka / 333 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies, PETS 2014, held in Amsterdam, The Netherlands, in July 2014. The 16 full papers presented were carefully selected from 86 submissions. Topics addressed by the papers published in these proceedings include study of privacy erosion, designs of privacy-preserving systems, censorship resistance, social networks and location privacy.
This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies, PETS 2014, held in Amsterdam, Th...
|
|
cena:
193,19 zł |
Trust and Trustworthy Computing: 7th International Conference, Trust 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings
ISBN: 9783319085920 / Angielski / Miękka / 226 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.
This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, ...
|
|
cena:
185,49 zł |
Digital-Forensics and Watermarking: 12th International Workshop, Iwdw 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers
ISBN: 9783662438855 / Angielski / Miękka / 530 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis; visual cryptography; reversible data hiding; forensics; watermarking; anonymizing and plate recognition.
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, he...
|
|
cena:
193,19 zł |