![]() |
Topics in Cryptology -- Ct-Rsa 2015: The Cryptographer's Track at the Rsa Conference 2015, San Francisco, Ca, Usa, April 20-24, 2015. Proceedings
ISBN: 9783319167145 / Angielski / Miękka / 508 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based encryption, membership, secure and efficient implementation of AES based Cryptosystems, chosen ciphertext attacks in theory and practice, algorithms for solving hard problems, constructions of hash...
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, i...
|
cena:
201,24 |
![]() |
Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers
ISBN: 9783319167442 / Angielski / Miękka / 547 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and...
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology,...
|
cena:
201,24 |
![]() |
Smart Card Research and Advanced Applications: 13th International Conference, Cardis 2014, Paris, France, November 5-7, 2014. Revised Selected Papers
ISBN: 9783319167626 / Angielski / Miękka / 261 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures; side-channel analysis; embedded implementations; public-key cryptography and leakage and fault attacks.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced App...
|
cena:
193,23 |
![]() |
Transactions on Data Hiding and Multimedia Security X
ISBN: 9783662467381 / Angielski / Miękka / 107 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applicat...
|
cena:
161,03 |
![]() |
Foundations and Practice of Security: 7th International Symposium, Fps 2014, Montreal, Qc, Canada, November 3-5, 2014. Revised Selected Papers
ISBN: 9783319170398 / Angielski / Miękka / 375 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions.
This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montrea...
|
cena:
201,24 |
![]() |
Risks and Security of Internet and Systems: 9th International Conference, Crisis 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers
ISBN: 9783319171265 / Angielski / Miękka / 275 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling.
This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Sys...
|
cena:
201,24 |
![]() |
Advances in Cryptology - Eurocrypt 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulga
ISBN: 9783662467992 / Angielski / Miękka / 818 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption,... The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications ... |
cena:
201,24 |
![]() |
Advances in Cryptology - Eurocrypt 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulga
ISBN: 9783662468029 / Angielski / Miękka / 838 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key...
The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of ...
|
cena:
402,53 |
![]() |
Efficient Algorithms for Elliptic Curve Cryptosystems Using Endomorphisms
ISBN: 9784431553472 / Angielski / Twarda / 21-08-2026 / 300 str. Książka dostępna od: 21-08-2026 This book focuses on fast algorithms for computing scalar multiplication (or point multiplication) on certain types of elliptic curves, as scalar multiplication is the most time-consuming operation in elliptic curve cryptography (ECC). More precisely, the text provides readers with both a theoretical perspective on the use of low Hamming weight Frobenius expansion for scalar multiplication and a practical perspective on the implementation of scalar multiplication using the above technique. ECC has a wide range of applications, including public-key encryption and digital signatures. However,...
This book focuses on fast algorithms for computing scalar multiplication (or point multiplication) on certain types of elliptic curves, as scalar mult...
|
|
Termin ukazania się książki: 21-08-2026
Książkę można już zamówić z rabatem 5% |
|
728,13 |
![]() |
Information Theoretic Security: 8th International Conference, Icits 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
ISBN: 9783319174693 / Angielski / Miękka / 297 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held in Lugano, Switzerland, in May 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers cover a variety of topics at the intersection of cryptography, information theory, and quantum physics. This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held i... |
cena:
201,24 |
![]() |
Information Security Practice and Experience: 11th International Conference, Ispec 2015, Beijing, China, May 5-8, 2015, Proceedings
ISBN: 9783319175324 / Angielski / Miękka / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015.
The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability. This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijin...
|
cena:
201,24 |
![]() |
Ict Systems Security and Privacy Protection: 30th Ifip Tc 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
ISBN: 9783319184661 / Angielski / Twarda / 646 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security manag...
|
cena:
402,53 |
![]() |
Codes, Cryptology, and Information Security: First International Conference, C2si 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thi
ISBN: 9783319186801 / Angielski / Miękka / 375 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015. The 22 regular papers presented together with 8 invited talks were carefully reviewed and selected from 59 submissions. The first aim of this conference is to pay homage to Thierry Berger for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography in Morocco since 2003. The second aim of the conference is to provide an international forum for researchers from academia and... This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat... |
cena:
201,24 |
![]() |
Mathematical Foundations of Public Key Cryptography
ISBN: 9781498702232 / Angielski / Twarda / 236 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography. In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience... |
cena:
386,87 |
![]() |
Digital-Forensics and Watermarking: 13th International Workshop, Iwdw 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers
ISBN: 9783319193205 / Angielski / Miękka / 626 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on forensics; watermarking; reversible data hiding; visual cryptography; and steganography and steganalysis. This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking,... |
cena:
201,24 |
![]() |
Information Security and Privacy: 20th Australasian Conference, Acisp 2015, Brisbane, Qld, Australia, June 29 -- July 1, 2015, Proceedings
ISBN: 9783319199610 / Angielski / Miękka / 510 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015.The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions.
This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in...
|
cena:
201,24 |
![]() |
Smart TV Security: Media Playback and Digital Video Broadcast
ISBN: 9783319209937 / Angielski / Miękka / 92 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book discusses the emerging topic of Smart TV security, including its implications on consumer privacy. The author presents chapters on the architecture and functionality of Smart TVs, various attacks and defenses, and associated risks for consumers. This includes the latest attacks on broadcast-related digital services and built-in media playback, as well as access to integrated cameras and microphones. This book is a useful resource for professionals, researchers and students engaged with the field of Smart TV security. This book discusses the emerging topic of Smart TV security, including its implications on consumer privacy. The author presents chapters on the ar... |
cena:
201,24 |
![]() |
Encrypted Email: The History and Technology of Message Privacy
ISBN: 9783319213439 / Angielski / Miękka / 100 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure... This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the c... |
cena:
201,24 |
![]() |
Cryptography and Information Security in the Balkans: First International Conference, Balkancryptsec 2014, Istanbul, Turkey, October 16-17, 2014, Revi
ISBN: 9783319213552 / Angielski / Miękka / 251 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic protocols and public key cryptography. The book also contains one invited talk in full paper length. This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balk... |
cena:
193,23 |
![]() |
Financial Cryptography and Data Security: 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers
ISBN: 9783662478530 / Angielski / Miękka / 574 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Secu...
|
cena:
201,24 |