![]() |
Cryptographic Engineering
ISBN: 9780387718163 / Angielski / Twarda / 522 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry. This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments.... Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and... |
cena:
1022,92 |
![]() |
Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, Uk, September 1-3, 2008, Proceedings
ISBN: 9783540855033 / Angielski / Miękka / 394 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Pairing 2008 Conference was held at Royal Holloway, University of London during September 1-3, 2008. This conference followed on from the Pairing in Cryptography workshop (held in Dublin, Ireland on June 12-15, 2005) and the Pairing 2007 conference (held in Tokyo, Japan on July 2-4, 2007, with proce- ings published in Springer's LNCS 4575). The aim of this series of conferences is to bring together leading researchers and practitioners from academia and industry, all concerned with problems related to pairing-based cryptography. The programme consisted of 3 invited talks and 20...
The Pairing 2008 Conference was held at Royal Holloway, University of London during September 1-3, 2008. This conference followed on from the Pairing ...
|
cena:
204,55 |
![]() |
Algebraic Cryptanalysis
ISBN: 9780387887562 / Angielski / Twarda / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SAT-solvers and the methods of Nicolas Courtois. Topics include: Analytic Combinatorics, and its application to cryptanalysis The... Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided... |
cena:
1022,92 |
![]() |
Smart Card Research and Advanced Applications: 7th Ifip Wg 8.8/11.2 International Conference, Cardis 2006, Tarragona, Spain, April 19-21, 2006, Procee
ISBN: 9783540333111 / Angielski / Miękka / 360 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT Security, which often appear sc- tered and only loosely connected. Smart card research unites them by providing a common goal: advancing the state of the art of designing and deploying small tokens to increase the security in Information Technology. CARDIS has a tradition of more than one decade, and has established itself asthepremier conferencefor researchresultsinsmartcardtechnology.As smart card research is unique, so is CARDIS; the conference successfully attracts a-...
Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT Security, which often appear ...
|
cena:
204,55 |
![]() |
Auto-Identification and Ubiquitous Computing Applications
ISBN: 9781605662985 / Angielski / Twarda / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There is a need within radio-frequency identification (RFID) and other smart technologies to understand related practical implications. Auto-Identification and Ubiquitous Computing Applications: RFID and Smart Technologies for Information Convergence reports on problems related to the primary use of RFID technologies. This book provides a detailed overview of RFID literature, specifically in using RFID and smart technologies for identification, and draws together several different fields of research across supply chain management, asset tracking, and novel use of RFID for identification.
There is a need within radio-frequency identification (RFID) and other smart technologies to understand related practical implications. Auto-Identific...
|
cena:
1005,14 |
![]() |
Protecting Privacy in Video Surveillance
ISBN: 9781848823006 / Angielski / Miękka / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Protecting Privacy in Video Surveillance offers the state of the art from leading researchers and experts in the field. This broad ranging volume discusses the topic from various technical points of view and also examines surveillance from a societal perspective. A comprehensive introduction carefully guides the reader through the collection of cutting-edge research and current thinking. The technical elements of the field feature topics from MERL blind vision, stealth vision and privacy by de-identifying face images, to using mobile communications to assert privacy... Protecting Privacy in Video Surveillance offers the state of the art from leading researchers and experts in the field. This broad ranging... |
cena:
204,55 |
![]() |
Algebraic Geometry in Coding Theory and Cryptography
ISBN: 9780691102887 / Angielski / Twarda / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion of the interplay between nonsingular projective curves and algebraic function fields over finite fields. This interplay is fundamental to research in the field today, yet until now no other textbook has featured complete proofs of it. Niederreiter and Xing cover classical applications like... This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to informat... |
cena:
336,44 |
![]() |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 18th International Symposium, Aaecc-18, Tarragona, Sapin, June 8-12, 2009, Proceedin
ISBN: 9783642021800 / Angielski / Miękka / 243 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The AAECC symposia serieswas started in 1983by Alain Poli (Toulouse), who, together with R. Desq, D. Lazardand P. Camion, organizedthe ?rst conference. OriginallytheacronymAAECCstoodfor"AppliedAlgebraandError-Correcting Codes."Overtheyearsitsmeaninghasshiftedto"AppliedAlgebra, Algebraic- gorithmsandError-CorrectingCodes,"re?ectingthegrowingimportanceofc- plexity, particularlyfor decoding algorithms.During the AAECC-12 symposium the ConferenceCommitteedecidedtoenforcethe theoryandpracticeofthe c- ing side as well as the cryptographic aspects. Algebra was conserved, as in the past, but slightly...
The AAECC symposia serieswas started in 1983by Alain Poli (Toulouse), who, together with R. Desq, D. Lazardand P. Camion, organizedthe ?rst conference...
|
cena:
204,55 |
![]() |
Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009, Proceedings
ISBN: 9783642026164 / Angielski / Miękka / 876 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs,...
This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 200...
|
cena:
409,14 |
![]() |
Cyber Situational Awareness: Issues and Research
ISBN: 9781441901392 / Angielski / Twarda / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the...
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future res...
|
cena:
409,14 |
![]() |
The Future of Identity in the Information Society: 4th Ifip Wg 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September
ISBN: 9783642033148 / Angielski / Twarda / 281 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the...
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The in...
|
cena:
409,14 |
![]() |
Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009 Linz, Austria, September 3-4, 2009 Proceedings
ISBN: 9783642037474 / Angielski / Miękka / 169 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents the proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2009), held in Linz, Austria d- ing September 3-4, 2009. The conference continues from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007) and Turin (2008). The advances in the information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the pro- sion of high-quality services over global networks. The aim is to utilize this 'infor- tion society era' for...
This book presents the proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2009), held in Lin...
|
cena:
204,55 |
![]() |
Global Security, Safety, and Sustainability: 5th International Conference, Icgs3 2009, London, Uk, September 1-2, 2009, Proceedings
ISBN: 9783642040610 / Angielski / Miękka / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The 2009 two-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, s- cial events and infrastructures. The importance of adopting systematic and...
The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several...
|
cena:
204,55 |
![]() |
Personal Satellite Services: International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers
ISBN: 9783642042591 / Angielski / Miękka / 168 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the International Conference on Personal Satellite Services (PSATS 2009) in Rome, Italy in March 2009. The 17 papers papers demonstrate recent advances in Internet applications over satellites, satellites technologies, and future satellite location-based systems. This book constitutes the proceedings of the International Conference on Personal Satellite Services (PSATS 2009) in Rome, Italy in March 2009. |
cena:
204,55 |
![]() |
Advances in Information Security and Its Application: Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009, Proceedings
ISBN: 9783642026324 / Angielski / Miękka / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Welcome to the Third International Conference on Information Security and Ass- ance (ISA 2009). ISA 2009 was the most comprehensive conference focused on the various aspects of advances in information security and assurance. The concept of security and assurance is emerging rapidly as an exciting new paradigm to provide reliable and safe life services. Our conference provides a chance for academic and industry professionals to discuss recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance...
Welcome to the Third International Conference on Information Security and Ass- ance (ISA 2009). ISA 2009 was the most comprehensive conference focused...
|
cena:
204,55 |
![]() |
Safety and Security in Multiagent Systems: Research Results from 2004-2006
ISBN: 9783642048784 / Angielski / Miękka / 343 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As intelligent autonomous agents and multiagent system applications become more pervasive, it becomes increasingly important to understand the risks associated with using these systems. Incorrect or inappropriate agent behavior can have harmful - fects, including financial cost, loss of data, and injury to humans or systems. For - ample, NASA has proposed missions where multiagent systems, working in space or on other planets, will need to do their own reasoning about safety issues that concern not only themselves but also that of their mission. Likewise, industry is interested in agent...
As intelligent autonomous agents and multiagent system applications become more pervasive, it becomes increasingly important to understand the risks a...
|
cena:
204,55 |
![]() |
Progress in Cryptology - Indocrypt 2001: Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001
ISBN: 9783540430100 / Angielski / Miękka / 358 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. These are the refereed proceedings of the Second International Conference in Cryptology in India, INDOCRYPT 2001, held in Chennai, India in December 2001. The 31 revised full papers presented together with an invited survey were reviewed and selected from 77 submissions. The papers are organized in topical sections on hashing, algebraic schemes, elliptic curves, coding theory, applications, cryptanalysis, distributed cryptography, Boolean functions, digitial signatures, and shift registers.
These are the refereed proceedings of the Second International Conference in Cryptology in India, INDOCRYPT 2001, held in Chennai, India in December 2...
|
cena:
204,55 |
![]() |
Information Security: 12th International Conference, Isc 2009 Pisa, Italy, September 7-9, 2009 Proceedings
ISBN: 9783642044731 / Angielski / Miękka / 524 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009. The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and... This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Ita... |
cena:
409,14 |
![]() |
Software and Data Technolgoies
ISBN: 9783642052002 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains the best papers of the Third International Conference on Software and Data Technologies (ICSOFT 2008), held in Porto, Portugal, which was organized by the Institute for Systems and Technologies of Information, Communication and Control (INSTICC), co-sponsored by the Workflow Management Coalition (WfMC), in cooperation with the Interdisciplinary Institute for Collaboration and Research on Enterprise Systems and Technology (IICREST). The purpose of ICSOFT 2008 was to bring together researchers, engineers and practitioners interested in information technology and software...
This book contains the best papers of the Third International Conference on Software and Data Technologies (ICSOFT 2008), held in Porto, Portugal, whi...
|
cena:
204,55 |
![]() |
Future Generation Information Technology
ISBN: 9783642105081 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle...
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common t...
|
cena:
204,55 |