![]() |
Smart Card. Research and Applications: Third International Conference, Cardis'98 Louvain-La-Neuve, Belgium, September 14-16, 1998 Proceedings
ISBN: 9783540679233 / Angielski / Miękka / 379 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Smart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated their research. The CARDIS conferences were created to provide a forum for this research. CARDIS 1998 is the third international conference on Smart Card Research and Advanced Applications, held in Louvain-la-Neuve, Belgium, 14-16 Sept- ber 1998. The ?rst CARDIS was held in Lille, France in November 1994, and the second was held in Amsterdam, The Netherlands in September 1996. The fourth CARDIS is scheduled to take place in Bristol, UK in...
Smart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated th...
|
cena:
204,55 |
![]() |
Random Curves: Journeys of a Mathematician
ISBN: 9783540740773 / Angielski / Twarda / 392 str. Termin realizacji zamówienia: 22 dni roboczych Neal Koblitz is a co-inventor of one of the two most popular forms of encryption and digital signature, and his autobiographical memoirs are collected in this volume. Besides his own personal career in mathematics and cryptography, Koblitz details his travels to the Soviet Union, Latin America, Vietnam and elsewhere; political activism; and academic controversies relating to math education, the C. P. Snow "two-culture" problem, and mistreatment of women in academia. These engaging stories fully capture the experiences of a student and later a scientist caught up in the tumultuous events of... Neal Koblitz is a co-inventor of one of the two most popular forms of encryption and digital signature, and his autobiographical memoirs are collec... |
378,97 |
![]() |
RFID Security: Techniques, Protocols and System-On-Chip Design
ISBN: 9780387764801 / Angielski / Twarda / 446 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware... RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardwa... |
cena:
613,74 |
![]() |
Advances in Cryptology - Crypto 2007: 27th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 19-23, 2007, Proceedings
ISBN: 9783540741428 / Angielski / Miękka / 650 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed proceedings of the 27th Annual International Cryptology Conference held in Santa Barbara, California, in August 2007. Thirty-three full papers are presented along with one important invited lecture. The papers address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis. In addition, readers will discover many advanced and emerging applications. This volume constitutes the refereed proceedings of the 27th Annual International Cryptology Conference held in Santa Barbara, California, in Augus... |
cena:
409,14 |
![]() |
Automata, Languages and Programming: 22nd International Colloquium, Icalp 95, Szeged, Hungary, July 10 - 14, 1995. Proceedings
ISBN: 9783540600848 / Angielski / Miękka / 692 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the proceedings of the 22nd Interna- tional Colloquium on Automata, Languages, and Programming, held under the sponsorship of EATCS in Szeged, Hungary in July 1995.
The volume presents four invited papers and 53 full revised research papers selected from a total of 111 submissions. ICALP traditionally covers the whole area of theoretical computer science; among the topics addressed in the volume are concurrency, automata, formal languages, algorithms, communication protocols, computational complexity, computability, foundations of programming, learning and coding,... This volume constitutes the proceedings of the 22nd Interna- tional Colloquium on Automata, Languages, and Programming, held under the sponsorship of ...
|
cena:
409,14 |
![]() |
Secure Networking - Cqre (Secure) '99: International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings
ISBN: 9783540668008 / Angielski / Miękka / 266 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The CQRE Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving economic processes. The unprecedented reliance on computer technology has transformed the previous technical side-issue "information security" to a management problem requiring decisions of strategic importance. Thus one of the main goals of the conference is to provide a platform for both technical specialists as well as decision makers from government, industry, commercial, and academic communities. The target of CQRE is to promote and stimulate...
The CQRE Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving econ...
|
cena:
204,55 |
![]() |
Eurocode '90: International Symposium on Coding Theory and Applications, Udine, Italy, November 5-9, 1990. Proceedings
ISBN: 9783540543039 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents a selection of the papers presented at EUROCODE '90, the symposium on coding theory held in Udine, Italy, November 1990. It gives the state of the art on coding in Europe and ranges from theoretical top- ics like algebraic geometry and combinatorial coding to applications like modulation, real-space decoding and VLSI implementation. The book is divided into eight sections: - Algebraic codes - Combinatorial codes - Geometric codes - Protection of information - Convolutional codes - Information theory - Modulation - Applications of coding. Five of the sections are introduced...
This book presents a selection of the papers presented at EUROCODE '90, the symposium on coding theory held in Udine, Italy, November 1990. It gives t...
|
cena:
204,55 |
![]() |
Emerging Directions in Embedded and Ubiquitous Computing: Euc 2007 Workshops: Trust, Wsoc, Ncus, Uuwsn, Usn, Eso, and Secubiq, Taipei, Taiwan, Decembe
ISBN: 9783540770893 / Angielski / Miękka / 866 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the EUC 2007 workshops held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2007, in Taipei, Taiwan, in December 2007. The 69 revised full papers presented together with four invited papers were carefully reviewed and selected from about 200 submissions to the seven workshops. A broad range of topics are covered. This book constitutes the refereed proceedings of the EUC 2007 workshops held in conjunction with the IFIP International Conference on Embedded and... |
cena:
409,14 |
![]() |
Fast Software Encryption: 9th International Workshop, Fse 2002, Leuven, Belgium, February 4-6, 2002. Revised Papers
ISBN: 9783540440093 / Angielski / Miękka / 284 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This Fast Software Encryption workshop was the ninth in a series of workshops started in Cambridge in December 1993. The previous workshop took place in YokohamainApril2001.Itconcentratedonallaspectsoffastprimitivesfor symmetric cryptography: secret key ciphers, the design and cryptanalysis of block and stream ciphers, as well as hash functions and message authentication codes (MACs). The ninth Fast Software Encryption workshop was held in February 2002 in Leuven, Belgium and was organized by General Chair Matt Landrock (Cryp- mathic Belgium), in cooperation with the research group COSIC of...
This Fast Software Encryption workshop was the ninth in a series of workshops started in Cambridge in December 1993. The previous workshop took place ...
|
cena:
204,55 |
![]() |
Cryptology and Network Security: 4th International Conference, Cans 2005, Xiamen, China, December 14-16, 2005, Proceedings
ISBN: 9783540308492 / Angielski / Miękka / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, intrusion detection and viruses, authentication and signature, signcryption, e-mail security, cryptosystems, privacy and tracing, information hiding, firewalls, denial of service and DNS security, and trust management.
Constitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, intrusion detection a...
|
cena:
204,55 |
![]() |
Secure Multi-Party Non-Repudiation Protocols and Applications
ISBN: 9780387756295 / Angielski / Twarda / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level... The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professio... |
cena:
409,14 |
![]() |
Detection of Intrusions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings
ISBN: 9783540266136 / Angielski / Miękka / 241 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA). DIMVA is organized by the Special Interest Group Security -- Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) as an annual conference that brings together experts from throughout the world to discuss the state of the art in the areas of intrusion detection, detection of malware, and assessment of vulnerabilities....
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions...
|
cena:
204,55 |
![]() |
Public Key Cryptography - Pkc 2003: 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, Fl, Usa, January 6-8, 2003, P
ISBN: 9783540003243 / Angielski / Miękka / 376 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciation for Cryptologic Research (www.iacr.org). This year the workshop was organized in cooperation with the Department of Computer Science, Florida State University. The General Chair, Mike Burmester was responsible for local organization, registration, etc. There were 105 submitted papers which were considered by the Program Committee. This is an increase of 52% compared to PKC 2002, which took place in Paris, France, February 2002, and which was...
PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciati...
|
cena:
204,55 |
![]() |
Stacs 98: 15th Annual Symposium on Theoretical Aspects of Computer Science, Paris, France, February 25-27, 1998, Proceedings
ISBN: 9783540642305 / Angielski / Miękka / 636 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the strictly refereed proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science, STACS 98, held in Paris, France, in February 1998.
The volume presents three invited surveys together with 52 revised full papers selected from a total of 155 submissions. The papers are organized in topical sections on algorithms and data structures, logic, complexity, and automata and formal languages. This book constitutes the strictly refereed proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science, STACS 98, held in Par...
|
cena:
409,14 |
![]() |
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005,
ISBN: 9783540291138 / Angielski / Miękka / 482 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the proceedings of the Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 2005. The papers in this book include topics on mathematical models, architectures and protocols for computer network security, and authentication, authorization and access control.
Constitutes the proceedings of the Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 2005...
|
cena:
204,55 |
![]() |
Information Security and Cryptology: First Sklois Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
ISBN: 9783540308553 / Angielski / Miękka / 428 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware, theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer's Lecture Notes in Computer Science (LNCS) series. The area of research covered...
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of th...
|
cena:
204,55 |
![]() |
Communications and Multimedia Security: 9th Ifip Tc-6 Tc-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings
ISBN: 9783540287919 / Angielski / Miękka / 360 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. It is our great pleasure to present the proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), which washeld in Salzburg on September 19 21,2005.Continuing the tradition of p- vious CMS conferences, we sought a balanced program containing presentations on various aspects of secure communication and multimedia systems. Special emphasis was laid on papers with direct practical relevance for the construction of secure communication systems. The selection of the program was a challenging task. In total, we received 143 submissions, from which 28...
It is our great pleasure to present the proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), which ...
|
cena:
204,55 |
![]() |
Digital Rights Management: Technologies, Issues, Challenges and Systems
ISBN: 9783540359982 / Angielski / Miękka / 360 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS pronounced dramatics ), took place in Sydney, Australia on 31st October - 2nd November, 2005. It was or- nized by the Centre for Information Security of the University of Wollongong and in cooperation with the International Association of Cryptologic Research (IACR) and IEEE Computer Society s Task Force on Information Assurance. DRMTICS isan internationalconferenceseriesthat coversthe areaof digital rights management, including research advancements of an applied and theor-...
The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS pronounced dramatics ), took plac...
|
cena:
204,55 |
![]() |
Trust Management II: Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 20
ISBN: 9780387094274 / Angielski / Twarda / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re...
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trond...
|
cena:
409,14 |
![]() |
Advances in Ad Hoc Networking: Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008
ISBN: 9780387094892 / Angielski / Twarda / 238 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the Seventh Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net'2008), celebrated in Palma de Mallorca (llles Balears, Spain) during June 25-27, 2008. This IFIP TC6 Workshop was organized by the Universitat de les Illes Balears in cooperation with the Asociaci6n de Tdcnicos de lnform tica and sponsored by the following Working Groups: WG6.3 (Performance of Computer Networks) and WG6.8 (Mobile and Wireless Communications). The rapid evolution of the networking industry introduces new exciting challenges that need to be explored by the research...
This volume contains the proceedings of the Seventh Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net'2008), celebrated in Palma de Mallorca (llle...
|
cena:
409,14 |