![]() |
Risks and Security of Internet and Systems: 9th International Conference, Crisis 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers
ISBN: 9783319171265 / Angielski / Miękka / 275 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling.
This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Sys...
|
cena:
193,19 zł |
![]() |
Advances in Cryptology - Eurocrypt 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulga
ISBN: 9783662467992 / Angielski / Miękka / 818 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption,... The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications ... |
cena:
193,19 zł |
![]() |
Advances in Cryptology - Eurocrypt 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulga
ISBN: 9783662468029 / Angielski / Miękka / 838 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key...
The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of ...
|
cena:
386,41 zł |
![]() |
Information Theoretic Security: 8th International Conference, Icits 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
ISBN: 9783319174693 / Angielski / Miękka / 297 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held in Lugano, Switzerland, in May 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers cover a variety of topics at the intersection of cryptography, information theory, and quantum physics. This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held i... |
cena:
193,19 zł |
![]() |
Information Security Practice and Experience: 11th International Conference, Ispec 2015, Beijing, China, May 5-8, 2015, Proceedings
ISBN: 9783319175324 / Angielski / Miękka / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015.
The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability. This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijin...
|
cena:
193,19 zł |
![]() |
Ict Systems Security and Privacy Protection: 30th Ifip Tc 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
ISBN: 9783319184661 / Angielski / Twarda / 646 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security manag...
|
cena:
386,41 zł |
![]() |
Codes, Cryptology, and Information Security: First International Conference, C2si 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thi
ISBN: 9783319186801 / Angielski / Miękka / 375 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015. The 22 regular papers presented together with 8 invited talks were carefully reviewed and selected from 59 submissions. The first aim of this conference is to pay homage to Thierry Berger for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography in Morocco since 2003. The second aim of the conference is to provide an international forum for researchers from academia and... This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat... |
cena:
193,19 zł |
![]() |
Mathematical Foundations of Public Key Cryptography
ISBN: 9781498702232 / Angielski / Twarda / 236 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography. In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience... |
cena:
400,65 zł |
![]() |
Digital-Forensics and Watermarking: 13th International Workshop, Iwdw 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers
ISBN: 9783319193205 / Angielski / Miękka / 626 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on forensics; watermarking; reversible data hiding; visual cryptography; and steganography and steganalysis. This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking,... |
cena:
193,19 zł |
![]() |
Information Security and Privacy: 20th Australasian Conference, Acisp 2015, Brisbane, Qld, Australia, June 29 -- July 1, 2015, Proceedings
ISBN: 9783319199610 / Angielski / Miękka / 510 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015.The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions.
This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in...
|
cena:
193,19 zł |
![]() |
Smart TV Security: Media Playback and Digital Video Broadcast
ISBN: 9783319209937 / Angielski / Miękka / 92 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book discusses the emerging topic of Smart TV security, including its implications on consumer privacy. The author presents chapters on the architecture and functionality of Smart TVs, various attacks and defenses, and associated risks for consumers. This includes the latest attacks on broadcast-related digital services and built-in media playback, as well as access to integrated cameras and microphones. This book is a useful resource for professionals, researchers and students engaged with the field of Smart TV security. This book discusses the emerging topic of Smart TV security, including its implications on consumer privacy. The author presents chapters on the ar... |
cena:
193,19 zł |
![]() |
Encrypted Email: The History and Technology of Message Privacy
ISBN: 9783319213439 / Angielski / Miękka / 100 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure... This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the c... |
cena:
193,19 zł |
![]() |
Cryptography and Information Security in the Balkans: First International Conference, Balkancryptsec 2014, Istanbul, Turkey, October 16-17, 2014, Revi
ISBN: 9783319213552 / Angielski / Miękka / 251 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic protocols and public key cryptography. The book also contains one invited talk in full paper length. This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balk... |
cena:
185,49 zł |
![]() |
Financial Cryptography and Data Security: 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers
ISBN: 9783662478530 / Angielski / Miękka / 574 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Secu...
|
cena:
193,19 zł |
![]() |
Advances in Cryptology -- Crypto 2015: 35th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 16-20, 2015, Proceedings, Part I
ISBN: 9783662479889 / Angielski / Miękka / 787 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations;...
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015,...
|
cena:
193,19 zł |
![]() |
Advances in Cryptology -- Crypto 2015: 35th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 16-20, 2015, Proceedings, Part II
ISBN: 9783662479995 / Angielski / Miękka / 783 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations;...
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015,...
|
cena:
193,19 zł |
![]() |
E-Voting and Identity: 5th International Conference, Voteid 2015, Bern, Switzerland, September 2-4, 2015, Proceedings
ISBN: 9783319222691 / Angielski / Miękka / 173 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on E-Voting and Identity, VoteID 2015, held in Bern, Switzerland, in September 2015. The 10 revised full papers presented, including one keynote and three invited talks, were carefully selected from 26 submissions.
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on E-Voting and Identity, VoteID 2015, held i...
|
cena:
193,19 zł |
![]() |
Information Security: 18th International Conference, Isc 2015, Trondheim, Norway, September 9-11, 2015, Proceedings
ISBN: 9783319233178 / Angielski / Miękka / 570 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image...
This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in S...
|
cena:
193,19 zł |
![]() |
Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings
ISBN: 9783319248578 / Angielski / Miękka / 293 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015. The 15 revised full papers were carefully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and... This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austr... |
cena:
185,49 zł |
![]() |
Radio Frequency Identification: 11th International Workshop, Rfidsec 2015, New York, Ny, Usa, June 23-24, 2015, Revised Selected Papers
ISBN: 9783319248363 / Angielski / Miękka / 175 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Workshop on Radio Frequency Identification held in New York, USA, in June 2015.
The 10 revised full papers were carefully reviewed and selected from 23 submissions and are organized in topical sections on PUFs and applications, side-channels and countermeasures, RFID system attacks, and efficient implementations. This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Workshop on Radio Frequency Identification held... |
cena:
154,58 zł |