![]() |
Applications of Cryptography and Network Security
ISBN: 9781632400659 / Angielski / Twarda / 380 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is the essential and efficient ingredient to the recipe of security solutions. With the arrival of new age communication systems and high speed networks in the future, cryptography will have a key role to play. This book talks about the crucial security challenges that the computing world is facing today and also discusses several techniques to fight against such attacks. The chapters in this book discuss various facets of cryptography and their applications. It will cater to the needs of researchers, engineers, graduates and PhD students working in this field. It will also be...
Cryptography is the essential and efficient ingredient to the recipe of security solutions. With the arrival of new age communication systems and high...
|
cena:
629,79 zł |
![]() |
Computing Security & Cryptography Handbook
ISBN: 9781632401137 / Angielski / Twarda / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents some critical security challenges that are faced in today's computing world. It discusses, in detail, the defense mechanisms against these kinds of attacks with the help of classical and modern approaches of cryptography and other defense mechanisms. The book not only deals with theoretical and fundamental aspects of cryptography, but also talks in length about different applications of cryptographic protocols and techniques in designing computing and network security solutions. This book will prove itself to be beneficial for researchers, engineers, graduate and doctoral...
This book presents some critical security challenges that are faced in today's computing world. It discusses, in detail, the defense mechanisms agains...
|
cena:
503,79 zł |
![]() |
Integrated Research in Steganography
ISBN: 9781632403131 / Angielski / Twarda / 102 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Steganography involves the art of concealing one message or data file within another. Stenographic technologies form an essential part of the future of internet privacy and security. This book emphasizes a novel field of study in steganography. They are the underlying science and art of communicating which keep the existence of the communication hidden. This book provides a broad overview of this technology by introducing distinct and latest concepts of steganography and steganalysis. The book also briefly covers the history of steganography and evaluates steganalysis methods considering...
Steganography involves the art of concealing one message or data file within another. Stenographic technologies form an essential part of the future o...
|
cena:
314,79 zł |
![]() |
Protocols and Procedures of Cryptography and Network Security
ISBN: 9781632404237 / Angielski / Twarda / 156 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides an overview on various methodologies and procedures of cryptography. In the times of escalating worldwide development of electronic data storage and communications, efficient security of information has become a crucial need. The most efficient tool for the protection of information is cryptography, used in a combination with other tools for assuring the security of information in all of its applications, including user authentication, data integrity and confidentiality. This book is a compilation of in-depth research work in the field of cryptography. It describes some of...
This book provides an overview on various methodologies and procedures of cryptography. In the times of escalating worldwide development of electronic...
|
cena:
398,79 zł |
![]() |
Artificial Immune System: Applications in Computer Security
ISBN: 9781119076285 / Angielski / Twarda / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extrac...
|
cena:
491,81 zł |
![]() |
Applied Cryptography: Protocols, Algorithms and Source Code in C
ISBN: 9781119096726 / Angielski / Twarda / 784 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols... From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptograph... |
cena:
313,64 zł |
![]() |
Information Security and Cryptology - Icisc 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers
ISBN: 9783319159423 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile...
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology,...
|
cena:
193,19 zł |
![]() |
Public-Key Cryptography -- Pkc 2015: 18th Iacr International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, Usa, Marc
ISBN: 9783662464465 / Angielski / Miękka / 824 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based,...
This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held ...
|
cena:
193,19 zł |
![]() |
Theory of Cryptography: 12th International Conference, Tcc 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I
ISBN: 9783662464939 / Angielski / Miękka / 660 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC... |
cena:
193,19 zł |
![]() |
Theory of Cryptography: 12th International Conference, Tcc 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II
ISBN: 9783662464960 / Angielski / Miękka / 700 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC... |
cena:
193,19 zł |
![]() |
Secure Multiparty Computation and Secret Sharing
ISBN: 9781107043053 / Angielski / Twarda / 381 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing. In a secure MPC, each party possesses some private data, while secret sharing provides a way for one party to spread information on a secret such that all parties together hold full information, yet no single party has all the...
In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties ...
|
cena:
429,78 zł |
![]() |
Lightweight Cryptography for Security and Privacy: Third International Workshop, Lightsec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selecte
ISBN: 9783319163628 / Angielski / Miękka / 169 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2014, held in Istanbul, Turkey, in September 2014. The 10 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: efficient implementations and designs; attacks; and protocols.
This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privac...
|
cena:
154,58 zł |
![]() |
Principles of Security and Trust: 4th International Conference, Post 2015, Held as Part of the European Joint Conferences on Theory and Practice of So
ISBN: 9783662466650 / Angielski / Miękka / 365 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, in London, UK, in April 2015. The 17 regular papers presented in this volume were carefully reviewed and selected from 57 submissions. In addition, one invited talk is included. The papers have been organized in topical sections on information flow and security types, risk assessment and security policies, protocols, hardware and physical security and privacy and...
This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST 2015, held as part of the...
|
cena:
193,19 zł |
![]() |
Fast Software Encryption: 21st International Workshop, Fse 2014, London, Uk, March 3-5, 2014. Revised Selected Papers
ISBN: 9783662467053 / Angielski / Miękka / 636 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theory; stream ciphers; hash functions; advanced constructions.
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in Lond...
|
cena:
193,19 zł |
![]() |
Leakage Resilient Password Systems
ISBN: 9783319175027 / Angielski / Miękka / 64 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP systems. Quantitative analysis proves that a secure LRP system in practical settings imposes a considerable amount of cognitive workload unless certain secure channels are involved. The book introduces a...
This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP ...
|
cena:
193,19 zł |
![]() |
Topics in Cryptology -- Ct-Rsa 2015: The Cryptographer's Track at the Rsa Conference 2015, San Francisco, Ca, Usa, April 20-24, 2015. Proceedings
ISBN: 9783319167145 / Angielski / Miękka / 508 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based encryption, membership, secure and efficient implementation of AES based Cryptosystems, chosen ciphertext attacks in theory and practice, algorithms for solving hard problems, constructions of hash...
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, i...
|
cena:
193,19 zł |
![]() |
Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers
ISBN: 9783319167442 / Angielski / Miękka / 547 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and...
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology,...
|
cena:
193,19 zł |
![]() |
Smart Card Research and Advanced Applications: 13th International Conference, Cardis 2014, Paris, France, November 5-7, 2014. Revised Selected Papers
ISBN: 9783319167626 / Angielski / Miękka / 261 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures; side-channel analysis; embedded implementations; public-key cryptography and leakage and fault attacks.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced App...
|
cena:
185,49 zł |
![]() |
Transactions on Data Hiding and Multimedia Security X
ISBN: 9783662467381 / Angielski / Miękka / 107 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applicat...
|
cena:
154,58 zł |
![]() |
Foundations and Practice of Security: 7th International Symposium, Fps 2014, Montreal, Qc, Canada, November 3-5, 2014. Revised Selected Papers
ISBN: 9783319170398 / Angielski / Miękka / 375 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions.
This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montrea...
|
cena:
193,19 zł |