![]() |
Theory of Cryptography: 8th Theory of Cryptography Conference, Tcc 2011, Providence, Ri, Usa, March 28-30, 2011, Proceedings
ISBN: 9783642195709 / Angielski / Miękka / 631 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, that was held in Providence, Rhode Island, USA. This book includes 35 full papers together with 2 invited talks.
Constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, that was held in Providence, Rhode Island, USA...
|
cena:
405,36 |
![]() |
Selected Areas in Cryptography: 17th International Workshop, Sac 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers
ISBN: 9783642195730 / Angielski / Miękka / 411 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 17th Annual International Workshop on Selected Areas in Cryptography, SAC 2010, held in Waterloo, Ontario, Canada in August 2010.
This book constitutes the thoroughly refereed post-proceedings of the 17th Annual International Workshop on Selected Areas in Cryptography, SAC 2010, ...
|
cena:
202,66 |
![]() |
Information and Automation: International Symposium, ISIA 2010 Guangzhou, China, November 10-11, 2010 Revised Selected Papers
ISBN: 9783642198526 / Angielski / Miękka / 780 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the International Symposium on Information and Automation, ISIA 2010, held in Guangzhou, China, in November 2010. The 110 revised full papers presented were carefully reviewed and selected from numerous submissions. The symposium provides a forum for researchers, educators, engineers, and government officials to present and discuss their latest research results and exchange views on the future research directions in the general areas of Information and Automation.
This book constitutes the refereed proceedings of the International Symposium on Information and Automation, ISIA 2010, held in Guangzhou, China, in N...
|
cena:
405,36 |
![]() |
Kryptologie: Methoden Und Maximen
ISBN: 9783540577713 / Niemiecki / Miękka / 369 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft," gewinnt fur den Informatiker zusehends praktische Bedeutung in Verbindung mit Datenbanken und Telekommunikation. Neben ihre Nutzung in rechnergestutzten offentlichen Nachrichtensystemen ("offentliche Schlussel") treten interne Anwendungen, die sich auch auf Zugriffsberechtigungen und den Quellenschutz von Software erstrecken.
Der erste Teil des Buches handelt in elf Kapiteln von den Geheimschriften und ihrem Gebrauch - von der Kryptographie. Im zweiten Teil wird in elf weiteren Kapiteln das Vorgehen zum unbefugten Entziffern... Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft," gewinnt fur den Informatiker zusehends praktische Bedeutung in Verbindung mit Datenbanken...
|
cena:
208,34 |
![]() |
Mobile Agents and Security
ISBN: 9783540647928 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. New paradigms can popularize old technologies. A new standalone" paradigm, the electronic desktop, popularized the personal computer. A new connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents....
New paradigms can popularize old technologies. A new standalone" paradigm, the electronic desktop, popularized the personal computer. A new connected"...
|
cena:
202,66 |
![]() |
Information Hiding: Second International Workshop, Ih'98, Portland, Oregon, Usa, April 14-17, 1998, Proceedings
ISBN: 9783540653868 / Angielski / Miękka / 369 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The mid-1990ssaw an exciting convergenceof a number of dieren t information protection technologies, whose theme was the hiding (as opposed to encryption) of information. Copyright marking schemes are about hiding either copyright notices or individual serial numbers imperceptibly in digital audio and video, as a component in intellectual property protection systems; anonymous c- munication is another area of rapid growth, with people designing systems for electronic cash, digital elections, and privacy in mobile communications; se- rity researchers are also interested in 'stray'...
The mid-1990ssaw an exciting convergenceof a number of dieren t information protection technologies, whose theme was the hiding (as opposed to encrypt...
|
cena:
267,73 |
![]() |
Terrestrial Trunked Radio - Tetra: A Global Security Tool
ISBN: 9783642090295 / Angielski / Miękka / 302 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems. In this book, the authors show how TETRA can be strongly improved and these improvements will most probably be part of future TETRA standards. The areas examined include channel assignment and multiple access techniques, video transmission, wireless LAN integration, and the establishment of multiple wireless mesh networks. Since the requirements for these networks is security, the authors show that innovative... Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased se... |
cena:
608,07 |
![]() |
Advances in Cryptology -- Asiacrypt'98: International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China,
ISBN: 9783540651093 / Angielski / Miękka / 436 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ASIACRYPT 98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22. This is the fourth of the Asiacrypt conferences. ASIACRYPT 98 is sponsored by the State Key Laboratory of Information Security (SKLOIS), University of Science and Technology of China (USTC), and the Asiacrypt Steering Committee (ASC), in cooperation with the International Association for Cryptology Research (IACR). The 16-member Program Committee organized the scientific program and considered 118...
ASIACRYPT 98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Bei...
|
cena:
202,66 |
![]() |
Visual Cryptography and Secret Image Sharing
ISBN: 9781439837214 / Angielski / Twarda / 546 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for... With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Cons... |
cena:
1081,89 |
![]() |
Algebraic Aspects of the Advanced Encryption Standard
ISBN: 9781441937292 / Angielski / Miękka / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic tech niques. The cipher is a fitting tribute to their distinctive approach to cipher design. Since the publication of the AES, however, the very same algebraic structures have been the subject of increasing cryptanalytic attention and this monograph has been written to summarise current research. We hope that this work...
It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent R...
|
cena:
425,64 |
![]() |
Cryptographics: Exploiting Graphics Cards for Security
ISBN: 9781441939647 / Angielski / Miękka / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes. CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs... Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficult... |
cena:
405,36 |
![]() |
Network Security Policies and Procedures
ISBN: 9781441940476 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization s security and will... Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and P... |
cena:
567,53 |
![]() |
Multivariate Public Key Cryptosystems
ISBN: 9781441940773 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC will become a necessary alternative. Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. The first chapter is an introduction to the basic ideas and early development of both... Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly be... |
cena:
486,44 |
![]() |
Malware Detection
ISBN: 9781441940957 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have... Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medi... |
cena:
1216,17 |
![]() |
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ISBN: 9781441940964 / Angielski / Miękka / 394 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the network's location or its relative location, with respect to the rest of the network neighbors. However, due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. Secure Localization and Time... Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the n... |
cena:
833,47 |
![]() |
Preserving Privacy in On-Line Analytical Processing (Olap)
ISBN: 9781441942784 / Angielski / Miękka / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret. Second, analytical queries about the data must be allowed for decision support purposes. The main challenge is that sensitive data can be inferred from answers to seemingly innocent aggregations of the data. This volume reviews a series of methods that can precisely answer data cube-style OLAP, regarding... Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OL... |
cena:
526,98 |
![]() |
Applied Cryptography and Network Security: 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings
ISBN: 9783642215537 / Angielski / Miękka / 568 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, that was held in Nerja, Spain.
Constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, that was held in Ner...
|
cena:
202,66 |
![]() |
Progress in Cryptology - AFRICACRYPT 2011: 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011, Proceedings
ISBN: 9783642219689 / Angielski / Miękka / 387 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Dakar, Senegal, in July 2011. This book features the papers that are organized in topical sections on protocols, cryptanalysis, secret-key cryptography, and security proofs.
Constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACR...
|
cena:
202,66 |
![]() |
Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers
ISBN: 9783642221361 / Angielski / Miękka / 257 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Remodelling the Attacker" with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an...
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, U...
|
cena:
202,66 |
![]() |
Secure and Trust Computing, Data Management, and Applications: 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Procee
ISBN: 9783642223389 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, held in Loutraki, Greece, in June 2011. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held from 2006 until 2010 in various locations. The 29 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address various theories and practical applications of secure and trust computing and data management in future...
This book constitutes the refereed proceedings of the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applicatio...
|
cena:
202,66 |