![]() |
Progress in Cryptology -- Latincrypt 2015: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico,
ISBN: 9783319221731 / Angielski / Miękka / 385 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security in Latin America, LatinCrypt 2015, held in Guadalajara, Mexico, in August 2015. The 20 papers presented were carefully reviewed and selected from 49 submissions. They were organized in topical sections named: cryptographic protocols; foundations; post-quantum cryptography; symmetric key cryptanalysis; we still love pairings; curves in cryptography; and cryptographic engineering. This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security in Latin America, LatinCrypt 2015,... |
cena:
193,19 zł |
![]() |
Advances in Information and Computer Security: 10th International Workshop on Security, Iwsec 2015, Nara, Japan, August 26-28, 2015, Proceedings
ISBN: 9783319224244 / Angielski / Miękka / 357 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. provable security; secure protocol; systems security; and security in hardware.
This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full pap...
|
cena:
193,19 zł |
![]() |
Cryptographic Hardware and Embedded Systems -- Ches 2015: 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings
ISBN: 9783662483237 / Angielski / Miękka / 704 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. side-channel attacks on public key cryptography; side-channel analysis and fault injection attacks; higher-order side-channel attacks;
This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in S...
|
cena:
193,19 zł |
![]() |
Trust and Trustworthy Computing: 8th International Conference, Trust 2015, Heraklion, Greece, August 24-26, 2015, Proceedings
ISBN: 9783319228457 / Angielski / Miękka / 328 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume. This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklio... |
cena:
193,19 zł |
![]() |
Advances in Digital Forensics XI: 11th Ifip Wg 11.9 International Conference, Orlando, Fl, Usa, January 26-28, 2015, Revised Selected Papers
ISBN: 9783319241227 / Angielski / Twarda / 357 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security... Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wir... |
cena:
193,19 zł |
![]() |
Financial Cryptography and Data Security: FC 2015 International Workshops, Bitcoin, Wahc, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revis
ISBN: 9783662480502 / Angielski / Miękka / 309 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Security, FC 2015, in San Juan, Puerto Rico, in January 2015. The 22 full papers presented were carefully reviewed and selected from 39 submissions. They feature the outcome of the Second Workshop on Bitcoin Research, BITCOIN 2015, the Third Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2015, and the First Workshop on Wearable Security and Privacy, Wearable 2015. This book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Secu... |
cena:
193,19 zł |
![]() |
Fast Software Encryption: 22nd International Workshop, Fse 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers
ISBN: 9783662481158 / Angielski / Miękka / 600 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The papers are organized in topical sections on block cipher cryptanalysis; more block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes;
This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Ista...
|
cena:
193,19 zł |
![]() |
Sicherheit Im Online-Banking: Pin/Tan Und Hbci Im Magischen Dreieck Aus Sicherheit, Kosten Und Einfacher Bedienbarkeit
ISBN: 9783658099596 / Niemiecki / Miękka / 125 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Das Buch unterzieht den aktuellen Stand der Sicherungsverfahren im Online-Banking einer kritischen Analyse. Neben den verschiedenen PIN/TAN-Verfahren und HBCI werden im Ausblick auch andere Systeme wie PayPal betrachtet. Sicherheit gilt als oberstes Ziel im Online-Banking. Doch eine Analyse der angebotenen Sicherungsverfahren zeigt, dass Sicherheit keine absolute Prioritat hat, sondern Banken und Nutzer ihre Entscheidung in einem magischen Dreieck aus Sicherheit, Kosten und Benutzungsfreundlichkeit treffen. Vor fast 20 Jahren haben die Verbande der deutschen Kreditwirtschaft die... Das Buch unterzieht den aktuellen Stand der Sicherungsverfahren im Online-Banking einer kritischen Analyse. Neben den verschiedenen PIN/TAN-Verfahr... |
cena:
126,37 zł |
![]() |
Technology and Practice of Passwords: International Conference on Passwords, Passwords'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Pa
ISBN: 9783319241913 / Angielski / Miękka / 153 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8 revised full papers presented together with 2 revised short papers were carefully reviewed and selected from 30 initial submissions. The papers are organized in topical sections on hash functions, usability, analyses and new techniques.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Tr...
|
cena:
154,58 zł |
![]() |
Cryptoschool
ISBN: 9783662484234 / Angielski / Twarda / 876 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book offers an introduction to cryptology, the science that makes secure communications possible, and addresses its two complementary aspects: cryptography----the art of making secure building blocks----and cryptanalysis----the art of breaking them. The text describes some of the most important systems in detail, including AES, RSA, group-based and lattice-based cryptography, signatures, hash functions, random generation, and more, providing detailed underpinnings for most of them. With regard to cryptanalysis, it presents a number of basic tools such as the differential and linear... This book offers an introduction to cryptology, the science that makes secure communications possible, and addresses its two complementary aspects:... |
cena:
146,81 zł |
![]() |
Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense
ISBN: 9783319251318 / Angielski / Twarda / 251 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization's mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial... This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, ... |
cena:
579,64 zł |
![]() |
Secure It Systems: 20th Nordic Conference, Nordsec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings
ISBN: 9783319265018 / Angielski / Miękka / 231 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 20th Nordic Conference on Secure IT Systems, held in Stockholm, Sweden, in October 2015. The 11 full papers presented together with 5 short papers in this volume were carefully reviewed and selected from 38 submissions. They are organized in topical sections named: cyber-physical systems security, privacy, cryptography, trust and fraud, and network and software security. This book constitutes the proceedings of the 20th Nordic Conference on Secure IT Systems, held in Stockholm, Sweden, in October 2015. The 1... |
cena:
185,49 zł |
![]() |
Advances in Cryptology - Asiacrypt 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland,
ISBN: 9783662487990 / Angielski / Miękka / 802 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks... The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of C... |
cena:
193,19 zł |
![]() |
Advances in Cryptology -- Asiacrypt 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland
ISBN: 9783662487969 / Angielski / Miękka / 810 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks... The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of C... |
cena:
386,41 zł |
![]() |
Security Protocols XXIII: 23rd International Workshop, Cambridge, Uk, March 31 - April 2, 2015, Revised Selected Papers
ISBN: 9783319260952 / Angielski / Miękka / 367 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Information Security in Fiction and in Fact." This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge... |
cena:
193,19 zł |
![]() |
Provable Security: 9th International Conference, Provsec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings
ISBN: 9783319260587 / Angielski / Miękka / 504 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are grouped in topical sections on fundamental, protocol, authenticated encryption and key exchange, encryption and identification, privacy and cloud, leakage-resilient cryptography and lattice cryptography, signature and broadcast encryption. This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in ... |
cena:
193,19 zł |
![]() |
Progress in Cryptology -- Indocrypt 2015: 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings
ISBN: 9783319266169 / Angielski / Miękka / 371 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in India, INDOCRYPT 2015, held in Bangalore, India, in December 2015. The 19 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on public key encryption; cryptanalysis; side channel attacks; information theoretic cryptography; and lightweight cryptography. This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in India, INDOCRYPT 2015, held in Bangalore, Indi... |
cena:
193,19 zł |
![]() |
Dynamic Secrets in Communication Security
ISBN: 9781493902293 / Angielski / Miękka / 136 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a...
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a compl...
|
cena:
193,19 zł |
![]() |
Cryptology and Network Security: 14th International Conference, Cans 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings
ISBN: 9783319268224 / Angielski / Miękka / 257 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs. This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakes... |
cena:
185,49 zł |
![]() |
Information Systems Security: 11th International Conference, Iciss 2015, Kolkata, India, December 16-20, 2015. Proceedings
ISBN: 9783319269603 / Angielski / Miękka / 584 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigation; cloud security; crypto systems and protocols; information flow control; sensor networks and cognitive radio; and watermarking and steganography. This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, I... |
cena:
193,19 zł |