Vi bøger
Levering: 1 - 2 hverdage

Bøger i Security and Cryptology serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • af Aggelos Kiayias & Helger Lipmaa
    420,95 kr.

  • - 11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers
    af Sven Dietrich
    454,95 kr.

    The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http://fc07. ifca. ai), organized by the International Financial Crypt- raphy Association (IFCA, http://www. ifca. ai/), was held in Tobago, February 12-15, 2007. The conference is a well-established and premier international - rum for research, advanced development, education, exploration, and debate - garding security in the context of ?nance and commerce. We continue to cover all aspects of securing transactions and systems, which this year included a range of technical areas such as cryptography, payment systems, anonymity, privacy, - thentication, and commercial and ?nancial transactions. For the ?rst time, there was an adjacent workshop on Usable Security, held after FC 2007 in the same - cation. The papers are included in the last part of this volume. The conference goal was to bring together top cryptographers, data-security specialists, and c- puter scientists with economists, bankers, implementers, and policy makers. The goal was met this year: there were 85 submissions, out of which 17 research papers and 1 system presentation paper were accepted. In addition, the conference featured two distinguished speakers, Mike Bond and Dawn Jutla, and two panel sessions, one on RFID and one on virtual economies. As always, there was the rump session on Tuesday evening, colorful as usual.

  • af Alejandro Hevia & Gregory Neven
    454,95 kr.

  • af Salvatore J. Stolfo, Davide Balzarotti & Marco Cova
    454,95 kr.

  • af Tsuyoshi Takagi, Yong Yu, Guilin Wang, mfl.
    454,95 kr.

  • af Dieter Gollmann & Felix C. Freiling
    454,95 kr.

  • af Angelos D. Keromytis
    454,95 kr.

  • af Simone Fischer-Hübner, Gerald Quirchmayr & Sokratis Katsikas
    420,95 kr.

  • af Vijay Atluri & Claudia Diaz
    454,95 kr.

  • af Masayuki Abe
    418,94 kr.

  • - First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers
    af Bart Preneel
    420,95 kr.

    This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies.

  • af Kai Rannenberg, Nils Gruschka, Agnieszka Gryszczy¿ska, mfl.
    547,95 kr.

  • af Frank Piessens, Juan Caballero & Nataliia Bielova
    454,95 kr.

  • af Rudrapatna Shyamasundar & Atul Prakash
    454,95 kr.

  • af Palash Sarkar & Tetsu Iwata
    454,95 kr.

  • af Aggelos Kiayias, Dimitris Gritzalis & Ioannis Askoxylakis
    454,95 kr.

  • af Michele Mosca
    454,95 kr.

  • af Matthew Robshaw & Lejla Batina
    454,95 kr.

  • af Jaideep Vaidya & Miroslaw Kutylowski
    454,95 kr.

  • af Roberto De Prisco & Michel Abdalla
    454,95 kr.

  • af Maki Yoshida & Koichi Mouri
    437,95 kr.

  • af Juan A. Garay & Rosario Gennaro
    454,95 kr.

  • af Thorsten Holz & Sotiris Ioannidis
    437,95 kr.

  • af Serge Vaudenay, Ioana Boureanu & Philippe Owesarski
    454,95 kr.

  • af Andrea Saracino
    547,95 kr.

    This book constitutes the proceedings of the 4th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2021, held in Darmstadt, Germany, on October 8, 2021. The workshop was co-located with ESORICS 2021. The 11 full papers presented in this volume were carefully reviewed and selected from 14 submissions. The workshop presents new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including smart home environment.

  • - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings
    af Phong Q. Nguyen
    454,95 kr.

    This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.

  • - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings
    af Hugo Krawczyk
    598,95 kr.

    This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.

  • - 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
    af Kazue Sako
    454,95 kr.

    The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

  • - 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
    af Kazue Sako
    454,95 kr.

    The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.