![]() |
Elliptic Curves and Their Applications to Cryptography: An Introduction
ISBN: 9781461373728 / Angielski / Miękka / 164 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems.
Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the... Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic...
|
cena:
932,39 |
![]() |
Predictive Modular Neural Networks: Applications to Time Series
ISBN: 9781461375401 / Angielski / Miękka / 314 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The subject of this book is predictive modular neural networks and their ap- plication to time series problems: classification, prediction and identification. The intended audience is researchers and graduate students in the fields of neural networks, computer science, statistical pattern recognition, statistics, control theory and econometrics. Biologists, neurophysiologists and medical engineers may also find this book interesting. In the last decade the neural networks community has shown intense interest in both modular methods and time series problems. Similar interest has been expressed...
The subject of this book is predictive modular neural networks and their ap- plication to time series problems: classification, prediction and identif...
|
cena:
405,36 |
![]() |
Information Security Practice and Experience: 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings
ISBN: 9783642380327 / Angielski / Miękka / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks. This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, hel... |
cena:
202,66 |
![]() |
Advances in Cryptology - Eurocrypt 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Gree
ISBN: 9783642383472 / Angielski / Miękka / 736 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.
This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYP...
|
cena:
202,66 |
![]() |
Dynamic Secrets in Communication Security
ISBN: 9781461478300 / Angielski / Twarda / 136 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a...
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a compl...
|
cena:
202,66 |
![]() |
Security for Cloud Storage Systems
ISBN: 9781461478720 / Angielski / Miękka / 83 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the... Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm o... |
cena:
162,12 |
![]() |
Trust Management VII: 7th Ifip Wg 11.11 International Conference, Ifiptm 2013, Malaga, Spain, June 3-7, 2013, Proceedings
ISBN: 9783642383229 / Angielski / Twarda / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013, held in Malaga, Spain, in June 2013. The 14 revised full papers and 9 short papers presented were carefully reviewed and selected from 62 submissions. The papers cover a wide range of topics focusing on multi-disciplinary areas such as: trust models, social foundations of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.
This book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013, held in Malaga, Spa...
|
cena:
202,66 |
![]() |
Information Security and Cryptology: 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers
ISBN: 9783642385186 / Angielski / Miękka / 393 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, ...
|
cena:
202,66 |
![]() |
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th Ifip Wg 11.2 International Workshop, Wist 2013, Heraklion
ISBN: 9783642385292 / Angielski / Miękka / 145 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.
This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security...
|
cena:
202,66 |
![]() |
Progress in Cryptology -- Africacrypt 2013: 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013, Proceedings
ISBN: 9783642385520 / Angielski / Miękka / 453 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in Cairo, Egypt, in June 2013. The 26 papers presented were carefully reviewed and selected from 77 submissions. They cover the following topics: secret-key and public-key cryptography and cryptanalysis, efficient implementation, cryptographic protocols, design of cryptographic schemes, security proofs, foundations and complexity theory, information theory, multi-party computation, elliptic curves, and lattices.
This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa...
|
cena:
202,66 |
![]() |
Post-Quantum Cryptography: 5th International Workshop, Pqcrypto 2013, Limoges, France, June 4-7, 2013, Proceedings
ISBN: 9783642386152 / Angielski / Miękka / 259 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations.
This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France,...
|
cena:
202,66 |
![]() |
Network and System Security: 7th International Conference, Nss 2013, Madrid, Spain, June 3-4, 2013, Proceedings
ISBN: 9783642386305 / Angielski / Miękka / 793 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems;...
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 201...
|
cena:
202,66 |
![]() |
Secure Information Management Using Linguistic Threshold Approach
ISBN: 9781447150152 / Angielski / Twarda / 136 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text details linguistic threshold schemes for information sharing. It examines the opportunities of using these techniques to create new models of managing strategic information shared within a commercial organisation or a state institution.
This text details linguistic threshold schemes for information sharing. It examines the opportunities of using these techniques to create new models o...
|
cena:
202,66 |
![]() |
Trust and Trustworthy Computing: 6th International Conference, Trust 2013, London, Uk, June 17-19, 2013, Proceedings
ISBN: 9783642389078 / Angielski / Miękka / 278 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track.
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK,...
|
cena:
186,49 |
![]() |
Applied Cryptography and Network Security: 11th International Conference, Acns 2013, Banff, Ab, Canada, June 25-28, 2013. Proceedings
ISBN: 9783642389795 / Angielski / Miękka / 572 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.
This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in B...
|
cena:
202,66 |
![]() |
Trustworthy Execution on Mobile Devices
ISBN: 9781461481898 / Angielski / Miękka / 85 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mob...
|
cena:
202,66 |
![]() |
Principles of Security and Trust: Second International Conference, Post 2013, Held as Part of the European Joint Conferences on Theory and Practice of
ISBN: 9783642368295 / Angielski / Miękka / 287 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical...
This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of ...
|
cena:
202,66 |
![]() |
E-Voting and Identity: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings
ISBN: 9783642391842 / Angielski / Miękka / 211 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held ...
|
cena:
186,49 |
![]() |
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters
ISBN: 9781430261483 / Angielski / Miękka / 156 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book is a must have resource guide for anyone who wants to... implement TXT within their environments. I wish we had this guide when our engineering teams were implementing TXT on our solution platforms John McAuley, EMC Corporation "This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud. Alex Rodriguez, Expedient Data Centers "This book is an invaluable reference for understanding enhanced server security, and... "This book is a must have resource guide for anyone who wants to... implement TXT within their environments. I wish we had this guide when our eng... |
cena:
154,01 |
![]() |
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings
ISBN: 9783642392559 / Angielski / Miękka / 305 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The 16 revised full and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing.
This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec ...
|
cena:
202,66 |