![]() |
Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers
ISBN: 9783642359989 / Angielski / Miękka / 407 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC 2012, held in Windsor, Ontario, Canada, in August 2012. The 24 papers presented were carefully reviewed and selected from 87 submissions. They are organized in topical sections named: cryptanalysis, digital signatures, stream ciphers, implementations, block cipher cryptanalysis, lattices, hashfunctions, blockcipher constructions, and miscellaneous.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC ...
|
cena:
205,02 |
![]() |
Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings
ISBN: 9783642360947 / Angielski / Miękka / 405 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, i...
|
cena:
205,02 |
![]() |
Radio Frequency Identification: Security and Privacy Issues: 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
ISBN: 9783642361395 / Angielski / Miękka / 181 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and ...
|
cena:
188,66 |
![]() |
Handbook of Finite Fields
ISBN: 9781439873786 / Angielski / Twarda / 1068 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors compile state-of-the-art research in this definitive handbook. Edited by two renowned researchers, the book uses a uniform style and format throughout and each chapter is self contained and peer reviewed. The first part of the book traces the history of finite fields through the eighteenth and nineteenth centuries. The second part presents theoretical properties of... Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applic... |
cena:
1169,72 |
![]() |
Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers
ISBN: 9783642356933 / Angielski / Miękka / 277 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, UK, in April 2012. Following the tradition of this workshop series, each paper war revised by the authors to incorporate ideas from the workshop, and is followed in these proceedings by an edited transcription of the presentation and ensuing discussion. The volume contains 14 papers with their transcriptions as well as an introduction, i.e. 29 contributions in total. The theme of the workshop was "Bringing protocols to life."
This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, U...
|
cena:
188,66 |
![]() |
Pairing-Based Cryptography -- Pairing 2012: 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers
ISBN: 9783642363337 / Angielski / Miękka / 333 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012.
The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track were carefully reviewed and selected from 49 submissions. These papers are presented together with 6 invited talks. The contributions are organized in topical sections on: algorithms for pairing computation, security models for encryption, functional encryption, implementations in hardware and software,... This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germa...
|
cena:
205,02 |
![]() |
Security and Privacy for Implantable Medical Devices
ISBN: 9781461416739 / Angielski / Twarda / 205 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD). It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts...
This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable m...
|
cena:
410,09 |
![]() |
Public-Key Cryptography -- PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 -- March 1, 2013, Proceedings
ISBN: 9783642363610 / Angielski / Miękka / 518 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held ...
|
cena:
205,02 |
![]() |
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings
ISBN: 9783642365935 / Angielski / Miękka / 726 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013. The 36 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers cover topics such as study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones; formulation and treatment of new cryptographic problems; study of notions of security and relations...
This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013...
|
cena:
205,02 |
![]() |
Ceh Certified Ethical Hacker All-In-One Exam Guide, Third Edition [With Access Code]
ISBN: 9781259836558 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fully up-to-date coverage of every topic on the CEH v9 certification exam Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam. Readers will find learning objectives at the beginning of each chapter, exam tips, end-of-chapter reviews, and practice exam questions with in-depth answer explanations. An integrated study system based on... Fully up-to-date coverage of every topic on the CEH v9 certification exam Thoroughly revised for current exam objec... |
cena:
178,14 |
![]() |
Theory and Practice of Cryptography Solutions for Secure Information Systems
ISBN: 9781466640306 / Angielski / Twarda / 612 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of...
Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business...
|
cena:
1021,19 |
![]() |
Hacker Contest: Sicherheitsprobleme, Lösungen, Beispiele
ISBN: 9783642625060 / Niemiecki / Miękka / 301 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Know-how zur Abwehr von Hacker-Angriffen
Mehr Sicherheit fur Netze, Systeme und Anwendungen Praxis-Leitfaden mit konzeptionellem Ansatz Anschaulich durch zeitlose Beispiele Ein Wettbewerb der Hacker? Wer knackt am schnellsten das Sicherheitssystem? Know-how zur Abwehr von Hacker-Angriffen
Mehr Sicherheit fur Netze, Systeme und Anwendungen Praxis-Leitfaden mit konzeptionellem Ansatz Ansch... |
cena:
153,27 |
![]() |
Distributed Networks: Intelligence, Security, and Applications
ISBN: 9781466559578 / Angielski / Twarda / 412 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence, Security, and Applications brings together scientific research in distributed network intelligence, security, and novel applications. The book presents recent trends and advances in the theory and applications of network intelligence and helps you understand how to successfully... For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized c... |
cena:
1095,06 |
![]() |
Security and Privacy in Biometrics
ISBN: 9781447152293 / Angielski / Twarda / 438 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of... This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from... |
cena:
410,09 |
![]() |
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers
ISBN: 9783642267987 / Angielski / Miękka / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy...
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer ...
|
cena:
205,02 |
![]() |
Emerging Management Mechanisms for the Future Internet: 7th Ifip Wg 6.6 International Conference on Autonomous Infrastructure, Management, and Securit
ISBN: 9783642389979 / Angielski / Miękka / 161 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, held in Barcelona, Spain, in June 2013. The 11 full papers presented were carefully reviewed and selected from 32 submissions. The volume also includes 7 papers presented at the AIMS Ph.D. workshop. They were reviewed and selected from 14 submissions. The papers are organized in topical sections on traffic engineering and quality-of-service; monitoring and modeling; security management; content distribution and multimedia; autonomous...
This book constitutes the refereed proceedings of the 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security,...
|
cena:
205,02 |
![]() |
Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings
ISBN: 9783642368172 / Angielski / Miękka / 552 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography,...
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the ...
|
cena:
205,02 |
![]() |
Security and Privacy Protection in Information Processing Systems: 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013, Proceedings
ISBN: 9783642392177 / Angielski / Twarda / 436 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on malware, authentication and authorization, network security/cryptography, software security, policy compliance and obligations, privacy protection, risk analysis and security metrics, social engineering, and security management/forensics.
This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auc...
|
cena:
410,09 |
![]() |
Simple Steps to Data Encryption: A Practical Guide to Secure Computing
ISBN: 9780124114838 / Angielski / Miękka / 86 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into... Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is conce... |
cena:
119,41 |
![]() |
Introduction to Biometrics
ISBN: 9780387773254 / Angielski / Twarda / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometric recognition, or simply biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes. It is a rapidly evolving field with applications ranging from securely accessing one's computer to gaining entry into a country. While the deployment of large-scale biometric systems in both commercial and government applications has increased the public awareness of this technology, "Introduction to Biometrics" is the first textbook to introduce the fundamentals of Biometrics to undergraduate/graduate students. The three commonly used modalities... Biometric recognition, or simply biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes. It... |
cena:
410,09 |