Introduction to Cryptography with Mathematical Foundations and Computer Implementations
ISBN: 9781439817636 / Angielski / Twarda / 672 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed. Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key... From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundation... |
|
cena:
505,98 zł |
Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings
ISBN: 9783642047657 / Angielski / Miękka / 301 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within computer security in the Nordic countries - thereby establishing a forum for discussions and co-operation between universities, industry and computer societies. Since then, the workshop has developed into a fully fledged inter- tional information security conference, held in the Nordic countries on a round robin basis. The 14th Nordic Conference on Secure IT Systems was held in Oslo on 14-16 October 2009. Under the theme Identity and Privacy in the Internet Age, this year's...
The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within computer security in the Nordic coun...
|
|
cena:
192,30 zł |
Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008.
ISBN: 9783642102394 / Angielski / Miękka / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) This volume constitutes the selected and extended papers of the International Conference on Advances in Security Technology, SecTech 2008, and Its Special Sessions, held in Sanya, Hainan Island, China in December 2008. The book includes the special sessions on advanced security technologies towards convergence and green IT (AST-CGIT 2008), on biometrics: security and privacy (BSP 2008), on security education (ASSSE 2008), on security engineering environment (SEE 2008), wireless networks (WN 2008).
This volume constitutes the selected and extended papers of the International Conference on Advances in Security Technology, SecTech 2008, and Its ... |
|
cena:
192,30 zł |
Information Theoretic Security
ISBN: 9783642102295 / Angielski / Miękka / 211 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) ICITS 2007, the Second International Conference on Information Theoretic - curity, was held in Madrid, Spain, May 25-29, 2007. The ?rst one was held on Awaji Island, Japan, October 16-19, 2005, as the 2005 IEEE Information T- ory Workshop on Theory and Practice in Information-Theoretic Security (ITW 2005, Japan). The General Chair of ICITS 2007, Javier Lopez, and the Organ- ing Committee were responsible for local organization, registration, etc. Modern unclassi?ed research on cryptography started with Shannon's work on cryptography using information theory. Since then we have seen several -...
ICITS 2007, the Second International Conference on Information Theoretic - curity, was held in Madrid, Spain, May 25-29, 2007. The ?rst one was held o...
|
|
cena:
192,30 zł |
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers
ISBN: 9783642054433 / Angielski / Miękka / 465 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary, in Calgary, Alberta, Canada, during August 13-14, 2009. There were 74 participants from 19 countries. Previous workshops in this series were held at Queens University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of - terloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), Concordia University in Montreal (2006), University of Ottawa (2007), and Mount Allison...
The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary, in Calgary, Alberta, Canada, during August 13-14...
|
|
cena:
192,30 zł |
Cryptography Engineering: Design Principles and Practical Applications
ISBN: 9780470474242 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many... The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.
Cryptography is vital to keeping in... |
|
cena:
229,10 zł |
Information and Communications Security: 11th International Conference, Icics 2009
ISBN: 9783642111440 / Angielski / Miękka / 504 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) This book constitutes the refereed proceedings of the 11th International Conference on Information and Communications Security, ICICS 2009, held in Beijing, China, in December 2009. The 37 revised full papers presented together with one invited paper were carefully reviewed and selected from 162 submissions. The papers are organized in topical sections on cryptanalysis, algorithms and implemantations, public key cryptography, security applications, software security, system security, network security, database security, trust management, and applied cryptography.
This book constitutes the refereed proceedings of the 11th International Conference on Information and Communications Security, ICICS 2009, held in Be...
|
|
cena:
384,63 zł |
Replication: Theory and Practice
ISBN: 9783642112935 / Angielski / Miękka / 308 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Replication is a topic of interest in the distributed computing, distributed systems, and database communities. Although these communities have traditionally looked at replication from different viewpoints and with different goals (e.g., performance versus fault tolerance), recent developments have led to a convergence of these different goals. The objective of this state-of-the-art survey is not to speculate about the future of replication, but rather to understand the present, to make an assessment of approximately 30 years of research on replication, and to present a comprehensive view... Replication is a topic of interest in the distributed computing, distributed systems, and database communities. Although these communities have tra... |
|
cena:
269,23 zł |
Cryptography and Coding: 12th Ima International Conference, Imacc 2009, Cirencester, Uk, December 15-17, 2009, Proceedings
ISBN: 9783642108679 / Angielski / Miękka / 495 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) This book constitutes the refereed proceedings of the 12th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2009. The 26 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on coding theory, symmetric cryptography, security protocols, asymmetric cryptography, Boolean functions and side channels and implementations.
This book constitutes the refereed proceedings of the 12th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in Decembe...
|
|
cena:
384,63 zł |
Information Security Applications: 10th International Workshop, Wisa 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers
ISBN: 9783642108372 / Angielski / Miękka / 404 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busan, Korea during August 25-27, 2009. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea Internet and Security Agency (KISA), sponsored by the Ministry of Public Administration and Security (MoPAS) and the Korea Communications Commission (KCC), financially sponsored by the ST. Ltd. The aim of the workshop was to serve as a forum for presenting new research and...
The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busan, Korea during August 25-27, 2009. The workshop was ...
|
|
cena:
192,30 zł |
Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings
ISBN: 9783642106279 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009. The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation. This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, Indi... |
|
cena:
192,30 zł |
Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedin
ISBN: 9783642106217 / Angielski / Miękka / 159 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated...
This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The...
|
|
cena:
192,30 zł |
Database Theory and Application: International Conference, Dta 2009, Held as Part of the Future Generation Information Technology Conference, Fgit 200
ISBN: 9783642105821 / Angielski / Miękka / 185 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle...
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common t...
|
|
cena:
192,30 zł |
Cryptology and Network Security: 8th International Conference, Cans 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings
ISBN: 9783642104329 / Angielski / Miękka / 538 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan, during December 12-14, 2009. The conference was jointly co-organized by the NationalInstituteofAdvancedIndustrialScienceandTechnology(AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). In ad- tion, the event was supported by the Special Interest Group on Computer Se- rity (CSEC), IPSJ, Japan, the Japan Technical Group on Information Security (ISEC), IEICE, the Japan Technical Committee on Information and Com-...
The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan,...
|
|
cena:
384,63 zł |
Advances in Cryptology - Asiacrypt 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Ja
ISBN: 9783642103650 / Angielski / Miękka / 740 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) ASIACRYPT 2009, the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo, Japan, during December 6-10, 2009. The conference was sponsored by the International - sociation for Cryptologic Research (IACR) in cooperation with the Technical Group on Information Security (ISEC) of the Institute of Electronics, Infor- tion and Communication Engineers (IEICE). ASIACRYPT 2009 was chaired by Eiji Okamoto and I had the honor of serving as the Program Chair. The conference received 300 submissions from which two papers were wi-...
ASIACRYPT 2009, the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo, Japan, during Decemb...
|
|
cena:
192,30 zł |
Information Systems, Technology and Management
ISBN: 9783642120343 / Angielski / Miękka / 434 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) This volume constitutes the refereed proceedings of the 4th International Conference on Information Systems, Technology and Management, ICISTM 2010, held in Bangkok, Thailand, in March 2010.The 28 revised full papers presented together with 3 keynote lectures, 9 short papers, and 2 tutorial papers were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on information systems, information technology, information management, and applications.
This volume constitutes the refereed proceedings of the 4th International Conference on Information Systems, Technology and Management, ICISTM 2010, h...
|
|
cena:
384,63 zł |
Cyber Security: Deterrence and It Protection for Critical Infrastructures
ISBN: 9783319022789 / Angielski / Miękka / 72 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to...
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods o...
|
|
cena:
192,30 zł |
Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings
ISBN: 9783642133640 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This...
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli-...
|
|
cena:
192,30 zł |
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010 Hyderabad, India, June 21, 2010 Proceedings
ISBN: 9783642136009 / Angielski / Miękka / 183 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010.
Constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010.
|
|
cena:
192,30 zł |
Data and Applications Security and Privacy XXIV: 24th Annual Ifip Wg 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings
ISBN: 9783642137389 / Angielski / Miękka / 376 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The 18 full and 11 short papers presented in this volume were carefully reviewed and selected from 61 submissions. The topics covered are query and data privacy; data protection; access control; data confidentiality and query verification; policy definition and enforcement; and trust and identity management.
This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June...
|
|
cena:
192,30 zł |