![]() |
Privacy and Identity Management for Life: 5th Ifip Wg 9.2, 9.6/11.4, 11.6, 11.7/Primelife International Summer School, Nice, France, September 7-11, 2
ISBN: 9783642422539 / Angielski / Miękka / 314 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies andthepeopleresponsible for making decisions about them, designing, and implementing them scarcely consider those requirements, thereby potentially putting individuals privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may...
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain c...
|
cena:
201,24 |
![]() |
Certification and Security in Inter-Organizational E-Services: Ifip 18th World Computer Congress, August 22-27, 2004, Toulouse, France
ISBN: 9781461498094 / Angielski / Miękka / 149 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC 2004 in August, 2004, in Toulouse, France. Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles. As the range of services managed and accessed through communication networks grows throughout... Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Worksho... |
cena:
201,24 |
![]() |
Communications and Multimedia Security: 8th Ifip Tc-6 Tc-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the L
ISBN: 9781461498933 / Angielski / Miękka / 290 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Multimedia Security. This state-of-the-art volume presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2004, in Windermere, UK. The papers presented here represent the very latest developments in security research from leading people in the field. The papers explore a wide variety of subjects including privacy protection and trust negotiation,... Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of C... |
cena:
402,53 |
![]() |
The Hash Function Blake
ISBN: 9783662447567 / Angielski / Twarda / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation. In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as... This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of... |
cena:
342,14 |
![]() |
Information Security Applications: 15th International Workshop, Wisa 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers
ISBN: 9783319150864 / Angielski / Miękka / 406 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy.
This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on ...
|
cena:
201,24 |
![]() |
Applications of Cryptography and Network Security
ISBN: 9781632400659 / Angielski / Twarda / 380 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is the essential and efficient ingredient to the recipe of security solutions. With the arrival of new age communication systems and high speed networks in the future, cryptography will have a key role to play. This book talks about the crucial security challenges that the computing world is facing today and also discusses several techniques to fight against such attacks. The chapters in this book discuss various facets of cryptography and their applications. It will cater to the needs of researchers, engineers, graduates and PhD students working in this field. It will also be...
Cryptography is the essential and efficient ingredient to the recipe of security solutions. With the arrival of new age communication systems and high...
|
cena:
577,84 |
![]() |
Computing Security & Cryptography Handbook
ISBN: 9781632401137 / Angielski / Twarda / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents some critical security challenges that are faced in today's computing world. It discusses, in detail, the defense mechanisms against these kinds of attacks with the help of classical and modern approaches of cryptography and other defense mechanisms. The book not only deals with theoretical and fundamental aspects of cryptography, but also talks in length about different applications of cryptographic protocols and techniques in designing computing and network security solutions. This book will prove itself to be beneficial for researchers, engineers, graduate and doctoral...
This book presents some critical security challenges that are faced in today's computing world. It discusses, in detail, the defense mechanisms agains...
|
cena:
462,23 |
![]() |
Integrated Research in Steganography
ISBN: 9781632403131 / Angielski / Twarda / 102 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Steganography involves the art of concealing one message or data file within another. Stenographic technologies form an essential part of the future of internet privacy and security. This book emphasizes a novel field of study in steganography. They are the underlying science and art of communicating which keep the existence of the communication hidden. This book provides a broad overview of this technology by introducing distinct and latest concepts of steganography and steganalysis. The book also briefly covers the history of steganography and evaluates steganalysis methods considering...
Steganography involves the art of concealing one message or data file within another. Stenographic technologies form an essential part of the future o...
|
cena:
288,82 |
![]() |
Protocols and Procedures of Cryptography and Network Security
ISBN: 9781632404237 / Angielski / Twarda / 156 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides an overview on various methodologies and procedures of cryptography. In the times of escalating worldwide development of electronic data storage and communications, efficient security of information has become a crucial need. The most efficient tool for the protection of information is cryptography, used in a combination with other tools for assuring the security of information in all of its applications, including user authentication, data integrity and confidentiality. This book is a compilation of in-depth research work in the field of cryptography. It describes some of...
This book provides an overview on various methodologies and procedures of cryptography. In the times of escalating worldwide development of electronic...
|
cena:
365,89 |
![]() |
Artificial Immune System: Applications in Computer Security
ISBN: 9781119076285 / Angielski / Twarda / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extrac...
|
cena:
468,89 |
![]() |
Applied Cryptography: Protocols, Algorithms and Source Code in C
ISBN: 9781119096726 / Angielski / Twarda / 784 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols... From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptograph... |
cena:
291,87 |
![]() |
Information Security and Cryptology - Icisc 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers
ISBN: 9783319159423 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile...
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology,...
|
cena:
201,24 |
![]() |
Public-Key Cryptography -- Pkc 2015: 18th Iacr International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, Usa, Marc
ISBN: 9783662464465 / Angielski / Miękka / 824 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based,...
This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held ...
|
cena:
201,24 |
![]() |
Theory of Cryptography: 12th International Conference, Tcc 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I
ISBN: 9783662464939 / Angielski / Miękka / 660 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC... |
cena:
201,24 |
![]() |
Theory of Cryptography: 12th International Conference, Tcc 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II
ISBN: 9783662464960 / Angielski / Miękka / 700 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC... |
cena:
201,24 |
![]() |
Secure Multiparty Computation and Secret Sharing
ISBN: 9781107043053 / Angielski / Twarda / 381 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing. In a secure MPC, each party possesses some private data, while secret sharing provides a way for one party to spread information on a secret such that all parties together hold full information, yet no single party has all the...
In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties ...
|
cena:
326,46 |
![]() |
Lightweight Cryptography for Security and Privacy: Third International Workshop, Lightsec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selecte
ISBN: 9783319163628 / Angielski / Miękka / 169 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2014, held in Istanbul, Turkey, in September 2014. The 10 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: efficient implementations and designs; attacks; and protocols.
This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privac...
|
cena:
161,03 |
![]() |
Principles of Security and Trust: 4th International Conference, Post 2015, Held as Part of the European Joint Conferences on Theory and Practice of So
ISBN: 9783662466650 / Angielski / Miękka / 365 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, in London, UK, in April 2015. The 17 regular papers presented in this volume were carefully reviewed and selected from 57 submissions. In addition, one invited talk is included. The papers have been organized in topical sections on information flow and security types, risk assessment and security policies, protocols, hardware and physical security and privacy and...
This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST 2015, held as part of the...
|
cena:
201,24 |
![]() |
Fast Software Encryption: 21st International Workshop, Fse 2014, London, Uk, March 3-5, 2014. Revised Selected Papers
ISBN: 9783662467053 / Angielski / Miękka / 636 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theory; stream ciphers; hash functions; advanced constructions.
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in Lond...
|
cena:
201,24 |
![]() |
Leakage Resilient Password Systems
ISBN: 9783319175027 / Angielski / Miękka / 64 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP systems. Quantitative analysis proves that a secure LRP system in practical settings imposes a considerable amount of cognitive workload unless certain secure channels are involved. The book introduces a...
This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP ...
|
cena:
201,24 |