![]() |
Algebraic Aspects of Cryptography
ISBN: 9783642083327 / Angielski / Miękka / 206 str. Termin realizacji zamówienia: 22 dni roboczych This book is intended as a text for a course on cryptography with emphasis on algebraic methods. It is written so as to be accessible to graduate or advanced undergraduate students, as well as to scientists in other fields. The first three chapters form a self-contained introduction to basic concepts and techniques. Here my approach is intuitive and informal. For example, the treatment of computational complexity in Chapter 2, while lacking formalistic rigor, emphasizes the aspects of the subject that are most important in cryptography. Chapters 4-6 and the Appendix contain material that for...
This book is intended as a text for a course on cryptography with emphasis on algebraic methods. It is written so as to be accessible to graduate or a...
|
617,33 |
![]() |
Number Theory for Computing
ISBN: 9783642077104 / Angielski / Miękka / 435 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Modern cryptography depends heavily on number theory, with primality test ing, factoring, discrete logarithms (indices), and elliptic curves being perhaps the most prominent subject areas. Since my own graduate study had empha sized probability theory, statistics, and real analysis, when I started work ing in cryptography around 1970, I found myself swimming in an unknown, murky sea. I thus know from personal experience how inaccessible number theory can be to the uninitiated. Thank you for your efforts to case the transition for a new generation of cryptographers. Thank you also for helping...
Modern cryptography depends heavily on number theory, with primality test ing, factoring, discrete logarithms (indices), and elliptic curves being per...
|
cena:
233,19 |
![]() |
Modern Cryptography, Probabilistic Proofs and Pseudorandomness
ISBN: 9783642084324 / Angielski / Miękka / 183 str. Termin realizacji zamówienia: 22 dni roboczych You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The interplay between randomness and computation is one of the most fas- cinating scientific phenomena uncovered in the last couple of decades. This interplay is at the heart of modern cryptography and plays a fundamental role in complexity theory at large. Specifically, the interplay of randomness and computation is pivotal to several intriguing notions of probabilistic proof systems and is the focal of the computational approach to randomness. This book provides an introduction to these three, somewhat...
You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The interplay between randomness and computation is one of the most fa...
|
447,07 |
![]() |
Cryptographic Engineering
ISBN: 9781441944177 / Angielski / Miękka / 522 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry. This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments.... Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and... |
cena:
1022,92 |
![]() |
Advances in Information Technology: 4th International Conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010, Proceedings
ISBN: 9783642166983 / Angielski / Miękka / 215 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. It was our intention to organize IAIT 2010 as the place where researchers and ind- trial practitioners could share their work and achievements in information technology, both theoretical and in application. This is the fourth time we have organized IAIT to serve as a venue to foster collaboration among industry and academia from different parts of the world. A lot has been achieved since the launch of the first IAIT in 2005; however, many challenges remain to be addressed in the years to come. IAIT 2010 drew attendance from leading professionals in both industry and academes, as in IAIT 2009....
It was our intention to organize IAIT 2010 as the place where researchers and ind- trial practitioners could share their work and achievements in info...
|
cena:
204,55 |
![]() |
Network-Aware Security for Group Communications
ISBN: 9781441943354 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcasts and the delivery of network control messages, will rely upon the ability to reliably deliver data simultaneously to a large group of users. As these networks become increasingly pervasive and these multi-user services become increasingly ubiquitous, it will become essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group... Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcas... |
cena:
409,14 |
![]() |
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations
ISBN: 9781609608309 / Angielski / Twarda / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished. Scholars, researchers, law makers, and ordinary women and their supporters will gain a better...
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It e...
|
cena:
1005,14 |
![]() |
Identity-Based Encryption
ISBN: 9781441993823 / Angielski / Twarda / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find... Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption ... |
cena:
409,14 |
![]() |
Software-Schutz: Rechtliche, Organisatorische Und Technische Maßnahmen
ISBN: 9783211819661 / Niemiecki / Miękka / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Der Software-Schutz umfaBt zum einen den Schutz von Software von Endbeniitzern vor unbefugtem Zugriff und den Schutz von Computern vor unbefugter Beniitzung, zum anderen den Schutz von Software vor illegaler VervieWntigung. Da Software ein machtiges Werkzeug sein kann und sich zu minimalen Kosten in Serie produzieren laBt, ist das Risiko des MiBbrauchs besonders hoch. Der illegale Verkauf und Tausch von PC-Software ist heute schon weit verbreitet. Viele wissen dabei nicht, daB sie eigentlich etwas Unrechtes tun. Auch das miBbrauchliche Eindringen in fremde Computer hat in den letzten lahren...
Der Software-Schutz umfaBt zum einen den Schutz von Software von Endbeniitzern vor unbefugtem Zugriff und den Schutz von Computern vor unbefugter Beni...
|
cena:
210,28 |
![]() |
Diensteintegrierende Kommunikationsnetze Mit Teilnehmerüberprüfbarem Datenschutz
ISBN: 9783540523277 / Niemiecki / Mikrofilm / 345 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Menschen und Maschinen kommunizieren immer mehr uber offentliche Vermittlungsnetze. Sensitive Daten wie personenbezogene Daten oder vertrauliche Geschaftsdaten konnen dabei sowohl aus den eigentlichen Nutzdaten als auch aus den Vermittlungsdaten, z.B. Ziel- und Herkunftsadresse, Datenumfang und Zeit, gewonnen werden. In diesem Buch wird erstmals umfassend untersucht, wie diese Daten vor illegalen und legalen Netzbenutzern, dem Betreiber des Netzes und den Herstellern der Vermittlungszentralen sowie ihren Mitarbeitern geschutzt werden konnen. Nach einer Problemanalyse werden die zur Abhilfe...
Menschen und Maschinen kommunizieren immer mehr uber offentliche Vermittlungsnetze. Sensitive Daten wie personenbezogene Daten oder vertrauliche Gesch...
|
cena:
210,28 |
![]() |
Data Fusion Applications: Workshop Proceedings Brussels, November 25, 1992
ISBN: 9783540569732 / Angielski / Miękka / 266 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Data fusion, the ability to combine data derived from several sources to provide a coherent, informative, and useful characterization of a situation, is a challenging task. There is no unified and proven solution which is applicable in all circumstances, but there are many plausible and useful approaches which can be and are used to solve particular applications. This volume presents the proceedings of the workshop Data Fusion Applications hosted in Brussels by the 1992 ESPRIT Conference and Exhibition. It contains 22 papers from 69 experts, who present advanced research results on data...
Data fusion, the ability to combine data derived from several sources to provide a coherent, informative, and useful characterization of a situation, ...
|
cena:
204,55 |
![]() |
Jit'99: Java-Informations-Tage 1999
ISBN: 9783540664642 / Niemiecki / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
191,17 |
![]() |
Networking 2010: 9th International IFIP TC 6 Networking Conference Chennai, India, May 11-15, 2010 Proceedings
ISBN: 9783642129629 / Angielski / Miękka / 410 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th IFIP-TC6 Networking Conference, Networking 2010. Papers were solicited in three broad topic areas: applications and services, network technologies, and internet design. All papers were considered on their merits by a uni?ed Technical ProgramCommittee (TPC); there was no attempt to enforce a quota among topic areas. We believe the resulting program is an excellentrepresentationofthebreadthofrecentadvancesinnetworkingresearch. This year, the conference received 101 full paper submissions from 23 co- trieson?vecontinents,...
This book constitutes the refereed proceedings of the 9th IFIP-TC6 Networking Conference, Networking 2010. Papers were solicited in three broad topic ...
|
cena:
204,55 |
![]() |
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers
ISBN: 9783642207686 / Angielski / Twarda / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. This title features the papers that are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, and usable privacy.
Constitutes the refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsi...
|
cena:
204,55 |
![]() |
Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices
ISBN: 9781613501320 / Angielski / Twarda / 342 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections of cyber ethics and cyber law are still underexplored. Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the...
Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the u...
|
cena:
1021,19 |
![]() |
Unconstrained Face Recognition
ISBN: 9781441938909 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a collection of novel approaches that are able to recognize human faces under various unconstrained situations. The underlying basis of these approaches is that, unlike conventional face recognition algorithms, they exploit the... Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun... |
cena:
409,14 |
![]() |
Security for Wireless Sensor Networks
ISBN: 9781441940988 / Angielski / Miękka / 212 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target...
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monito...
|
cena:
613,74 |
![]() |
Privacy and Identity Management for Life
ISBN: 9783642203169 / Angielski / Twarda / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundament...
|
cena:
613,74 |
![]() |
Data and Applications Security and Privacy XXV: 25th Annual Ifip Wg 11.3 Conference, Dbsec 2011, Richmond, Va, Usa, July 11-13, 2011, Proceedings
ISBN: 9783642223471 / Angielski / Miękka / 309 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec ...
|
cena:
204,55 |
![]() |
Security Protocols XIX: 19th International Workshop, Cambridge, Uk, March 28-30, 2011, Revised Selected Papers
ISBN: 9783642258664 / Angielski / Miękka / 383 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, UK, in March 2011. Following the tradition of this workshop series, each paper was revised by the authors to incorporate ideas from the workshop.
This text constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, U...
|
cena:
204,55 |