Post-Quantum Cryptography Using Complexity
ISBN: 9781469959139 / Angielski / Miękka / 144 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive version of 3SAT-based cryptography. Subsequent research into 3SAT revealed the appropriate constants to make 3SAT-based cryptography work.
This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive ve...
|
|
cena:
72,10 zł |
Critical Information Infrastructure Security: 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010, Revised Papers
ISBN: 9783642216930 / Angielski / Miękka / 160 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information Infrastructure Security, CRITIS 2010, held in Athens, Greece in September 2010. The 12 revised full papers and two poster papers presented went through two rounds of reviewing and improvement and were selected from 30 submissions. The papers included address various techniques to realize the security of systems, communications, and data.
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information Infrastructure Security, CRIT...
|
|
cena:
194,97 zł |
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers
ISBN: 9783642217012 / Angielski / Miękka / 415 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, that was held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, that was hel...
|
|
cena:
194,97 zł |
Studies in Complexity and Cryptography: Miscellanea on the Interplay Between Randomness and Computation
ISBN: 9783642226694 / Angielski / Miękka / 564 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents a collection of 36 pieces of scientific work in the areas of complexity theory and foundations of cryptography: 20 research contributions, 13 survey articles, and 3 programmatic and reflective viewpoint statements. These so far formally unpublished pieces were written by Oded Goldreich, some in collaboration with other scientists.
The articles included in this book essentially reflect the topical scope of the scientific career of Oded Goldreich now spanning three decades. In particular the topics dealt with include average-case complexity, complexity of approximation,... This book presents a collection of 36 pieces of scientific work in the areas of complexity theory and foundations of cryptography: 20 research contrib...
|
|
cena:
350,98 zł |
Advances in Cryptology -- Crypto 2011: 31st Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 14-18, 2011, Proceedings
ISBN: 9783642227912 / Angielski / Miękka / 782 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. This volume also contains the abstract of one invited talk.
Constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 201...
|
|
cena:
194,97 zł |
Trust, Privacy and Security in Digital Business: 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011, Proceedings
ISBN: 9783642228896 / Angielski / Miękka / 223 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Offers proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011. This title features papers that are organized in the following topical sections: identity and trust management; security and privacy models for pervasive information systems; and, reliability and security of content and data.
Offers proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011. This title features papers that are or...
|
|
cena:
194,97 zł |
Computer Security – ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings
ISBN: 9783642238215 / Angielski / Miękka / 686 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011, held in Leuven, Belgium, in September 2011. This book features the articles that are organized in topical sections on wireless security; Web security; forensics, biometrics and software protection; access control; and, privacy.
Constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011, held in Leuven, Belgium, in September 2011. Th...
|
|
cena:
194,97 zł |
Cryptographic Hardware and Embedded Systems -- CHES 2011: 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings
ISBN: 9783642239502 / Angielski / Miękka / 524 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japa...
|
|
cena:
194,97 zł |
Information Security and Cryptology - ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers
ISBN: 9783642242083 / Angielski / Miękka / 434 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. This book includes the papers that are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, and network and mobile security.
Constitutes the refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea...
|
|
cena:
194,97 zł |
Advances in Digital Forensics VII: 7th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 31 - February 2, 2011, Re
ISBN: 9783642242113 / Angielski / Twarda / 290 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. This title describes research results and applications in the discipline of digital forensics. It highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. This title describes resear...
|
|
cena:
194,97 zł |
Provable Security: 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011, Proceedings
ISBN: 9783642243158 / Angielski / Miękka / 397 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 5th Provable Security Conference held in Xi'an, China, in October 2011. The 22 full papers presented together with 4 short papers and 2 invited talks were carefully reviewed and selected from 75 submissions. The papers are divided in topical sections on cryptographic primitives; encryption; cryptographic protocols; security models and framework; and, key agreement.
This book constitutes the refereed proceedings of the 5th Provable Security Conference held in Xi'an, China, in October 2011. The 22 full papers prese...
|
|
cena:
194,97 zł |
Security Aspects in Information Technology: First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings
ISBN: 9783642245855 / Angielski / Miękka / 187 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of two invited lectures were carefully reviewed and selected from 112 submissions. The papers address all current aspects in cryptography, security aspects in high performance computing and in networks as well. The papers are divided in topical sections on embedded security; digital rights management; cryptographic protocols;...
This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance C...
|
|
cena:
194,97 zł |
Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings
ISBN: 9783642247118 / Angielski / Miękka / 249 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. This title includes sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, and biometrics.
Constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in...
|
|
cena:
194,97 zł |
Information Security: 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings
ISBN: 9783642248603 / Angielski / Miękka / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in Octobe...
|
|
cena:
194,97 zł |
High Performance Networking, Computing, and Communication Systems: Second International Conference ICHCC 2011, Singapore, May 5-6, 2011, Selected Pape
ISBN: 9783642250019 / Angielski / Miękka / 636 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed post-proceedings of the Second International Conference on High Performance Networking, Computing, and Communication systems, ICHCC 2011, held in Singapore in May 2011. The conference was held together with the Second International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011, which proceedings are published in CCIS 164. The 84 revised selected papers presented were carefully reviewed and selected for inclusion in the book. The topics covered range from computational science, engineering and technology to digital...
This book constitutes the refereed post-proceedings of the Second International Conference on High Performance Networking, Computing, and Communicatio...
|
|
cena:
389,98 zł |
Advances in Information and Computer Security: 6th International Workshop on Security, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings
ISBN: 9783642251405 / Angielski / Miękka / 231 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The 14 revised full papers presented in this volume were carefully reviewed and selected from 45 submissions. They address all current issues in information and computer security such as foundations of security, security in networks and ubiquitous computing systems, and security in real life applications. The papers are organized in topical sections on software protection and reliability; cryptographic protocol; pairing and identity based signature;...
This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The ...
|
|
cena:
194,97 zł |
Rfid Security and Privacy: 7th International Workshop, Rfidsec 2011, Amherst, Ma, Usa, June 26-28, 2011, Revised Selected Papers
ISBN: 9783642252853 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed post-workshop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues (RFIDSec) 2011, held in Amherst, Massachusetts, USA, in June 2011.
Constitutes the refereed post-workshop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues (RFID...
|
|
cena:
194,97 zł |
Cryptology and Network Security: 10th International Conference, CANS 2011 Sanya, China, December 10-12, 2011 Proceedings
ISBN: 9783642255120 / Angielski / Miękka / 313 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, Chin...
|
|
cena:
194,97 zł |
Progress in Cryptology - INDOCRYPT 2011: 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings
ISBN: 9783642255779 / Angielski / Miękka / 401 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in...
|
|
cena:
194,97 zł |
Theory of Security and Applications: Joint Workshop, TOSCA 2011, Saarbrücken, Germany,March 31-April 1, 2011, Revised Selected Papers
ISBN: 9783642273742 / Angielski / Miękka / 225 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrucken, Germany, in March/April 2011, in association with ETAPS 2011. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. The papers feature topics including various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various...
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known ...
|
|
cena:
194,97 zł |