![]() |
Secure Data Managment: 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings
ISBN: 9783642235559 / Angielski / Miękka / 170 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle, WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference . The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are organized in topical sections on privacy protection and quantification, security in cloud and sensor networks and secure data managment technologies.
This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle, WA, USA in September 2, 2011 as a s...
|
cena:
202,66 |
![]() |
Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday
ISBN: 9783642283673 / Angielski / Miękka / 502 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jaques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as...
This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all ove...
|
cena:
202,66 |
![]() |
Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 -
ISBN: 9783642286407 / Angielski / Miękka / 431 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software.The 20 papers, presented together with the abstract of an invited talk and a joint-ETAPS paper, were selected from a total of 67 submissions. Topics covered by the papers include: foundations of security, authentication, confidentiality, privacy and anonymity, authorization and trust, network security, protocols for security,...
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, ...
|
cena:
202,66 |
![]() |
Transactions on Data Hiding and Multimedia Security VII
ISBN: 9783642286926 / Angielski / Miękka / 115 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applica...
|
cena:
202,66 |
![]() |
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings
ISBN: 9783642289132 / Angielski / Miękka / 656 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in ...
|
cena:
202,66 |
![]() |
Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings
ISBN: 9783642291005 / Angielski / Miękka / 406 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012.
Constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou...
|
cena:
202,66 |
![]() |
Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers
ISBN: 9783642294198 / Angielski / Miękka / 279 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011. The 15 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 42 submissions. The papers focus on security and trust policy models; security protocol design and analysis; formal models of trust and reputation; logics for security and trust; distributed...
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, F...
|
cena:
202,66 |
![]() |
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
ISBN: 9781597497435 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel... As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, t... |
cena:
196,65 |
![]() |
The LLL Algorithm: Survey and Applications
ISBN: 9783642261640 / Angielski / Miękka / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computational aspects of geometry of numbers have been revolutionized by the Lenstra Lenstra Lovasz lattice reduction algorithm (LLL), which has led to bre- throughs in elds as diverse as computer algebra, cryptology, and algorithmic number theory. After its publication in 1982, LLL was immediately recognized as one of the most important algorithmic achievements of the twentieth century, because of its broad applicability and apparent simplicity. Its popularity has kept growing since, as testi ed by the hundreds of citations of the original article, and the ever more frequent use of LLL as a...
Computational aspects of geometry of numbers have been revolutionized by the Lenstra Lenstra Lovasz lattice reduction algorithm (LLL), which has led t...
|
cena:
932,39 |
![]() |
Financial Cryptography and Data Security: FC 2011 Workshops, Rlcps and Wecsr, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Pap
ISBN: 9783642298882 / Angielski / Miękka / 185 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011. The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial...
This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Se...
|
cena:
202,66 |
![]() |
Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers
ISBN: 9783642299629 / Angielski / Miękka / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel...
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011...
|
cena:
202,66 |
![]() |
Public Key Cryptography - PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 20
ISBN: 9783642300561 / Angielski / Miękka / 734 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. This title features papers that are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, and more.
Constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmsta...
|
cena:
202,66 |
![]() |
Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6,
ISBN: 9783642304354 / Angielski / Twarda / 610 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refered proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012.
Constitutes the refered proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, ...
|
cena:
405,36 |
![]() |
Privacy Enhancing Technologies: 12th International Symposium, Pets 2012, Vigo, Spain, July 11-13, 2012, Proceedings
ISBN: 9783642316791 / Angielski / Miękka / 319 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 12th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 2012.
Constitutes the refereed proceedings of the 12th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 201...
|
cena:
202,66 |
![]() |
Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers
ISBN: 9783642260407 / Angielski / Miękka / 257 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments,...
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- ...
|
cena:
405,36 |
![]() |
Transactions on Data Hiding and Multimedia Security VIII
ISBN: 9783642319709 / Angielski / Miękka / 103 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applica...
|
cena:
202,66 |
![]() |
Differential Cryptanalysis of the Data Encryption Standard
ISBN: 9781461393160 / Angielski / Miękka / 188 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national standard in the mid 1970s, and had resisted all attacks in the last 15 years. This book presents the first successful attack which can break the full 16 round DES faster than via exhaustive search. It describes in full detail, the novel technique of Differential Cryptanalysis, and demonstrates its applicability to a wide variety of cryptosystems and hash functions, including FEAL, Khafre, REDOC-II, LOKI, Lucifer, Snefru, N-Hash, and many...
DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national ...
|
cena:
425,64 |
![]() |
Communications and Multimedia Security: 13th Ifip Tc 6/Tc 11 International Conference, CMS 2012, Canterbury, Uk, September 3-5, 2012, Proceedings
ISBN: 9783642328046 / Angielski / Miękka / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications...
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 201...
|
cena:
202,66 |
![]() |
Secure Data Management: 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012, Proceedings
ISBN: 9783642328725 / Angielski / Miękka / 177 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, in August 27, 2012. The 12 revised full papers presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on privacy protection, access control, secure storage on the cloud, and trust on the Web.
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, in August 27, 2012. The 1...
|
cena:
186,49 |
![]() |
Speech Dereverberation
ISBN: 9781447125778 / Angielski / Miękka / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Speech Dereverberation gathers together an overview, a mathematical formulation of the problem and the state-of-the-art solutions for dereverberation. Speech Dereverberation presents current approaches to the problem of reverberation. It provides a review of topics in room acoustics and also describes performance measures for dereverberation. The algorithms are then explained with mathematical analysis and examples that enable the reader to see the strengths and weaknesses of the various techniques, as well as giving an understanding of the questions still to be addressed. Techniques... Speech Dereverberation gathers together an overview, a mathematical formulation of the problem and the state-of-the-art solutions for dereverberati... |
cena:
608,07 |