Vi bøger
Levering: 1 - 2 hverdage

Kodeteori og kryptologi

Her finder du spændende bøger om Kodeteori og kryptologi. Nedenfor er et flot udvalg af over 380 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Christoph Arndt
    1.233,95 - 1.728,95 kr.

  • - International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings
    af Eli Biham
    1.144,95 kr.

  • - 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001. Revised Papers
    af Serge Vaudenay
    584,95 kr.

  • - Second International Workshop, MDIC 2001, Amalfi, Italy, September 17-18, 2001. Proceedings
    af Maurizio Tucci
    572,95 kr.

    Multimedia technologies are rapidly attracting more and more interest every day. The Internet as seen from the end user is one of the reasons for this phenomenon, but not the only one. Video on Demand is one of the buzzwords today, but its real availability to the general public is yet to come. Content providers - such as publishers, broadcasting companies, and audio/video production ?rms - must be able to archive and index their productions for later retrieval. This is a formidable task, even more so when the material to be sorted encompasses many di?erent types of several media and covers a time span of several years. In order for such a vast amount of data to be easily available, existing database design models and indexing methodologies have to be improved and re?ned. In addition, new techniques especially tailored to the various types of multimedia must be devised and evaluated. For archiving and trasmission, data compression is another issue that needs to be addressed. In many cases, it has been found that compression and indexing can be successfully integrated, since compressing the data by ?ltering out irrelevancy implies some degree of und- standing of the content structure.

  • - 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings
    af Frederic Cuppens
    581,95 kr.

    his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000.The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.

  • - Third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 Proceedings
    af Herve Debar
    572,95 kr.

    Since 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experiments and deployment issues. This year, RAID has grown one step further to establish itself as a well-known event in the security community, with the publication of hardcopy proceedings. RAID 2000 received 26 paper submissions from 10 countries and 3 continents. The program committee selected 14 papers for publication and examined 6 of them for presentation. In addition RAID 2000 received 30 extended abstracts proposals; 15 of these extended abstracts were accepted for presentation. - tended abstracts are available on the website of the RAID symposium series, http://www.raid-symposium.org/. We would like to thank the technical p- gram committee for the help we received in reviewing the papers, as well as all the authors for their participation and submissions, even for those rejected. As in previous RAID symposiums, the program alternates between fun- mental research issues, such as newtechnologies for intrusion detection, and more practical issues linked to the deployment and operation of intrusion det- tion systems in a real environment. Five sessions have been devoted to intrusion detection technology, including modeling, data mining and advanced techniques.

  • - International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12-16, 1996 Proceedings
    af Ueli Maurer
    588,95 kr.

    The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Saragossa. It took place at the Palacio de Congresos in Saragossa, Spain, during May 12-16, 1996. This was the fifteenth annual EUROCRYPT conference (this name has been used since the third conference held in 1984), each of which has been held in a different city in Europe. For the second time, proceedings were available at the conference. JosC Pastor Franco, the General Chair, was resp- sible for local organization and registration. His contribution to the snccess of the conference is gratefully acknowledged. The Program Committee considered 126 submitted papers and selected 34 for presentation. Each paper was sent to all members of the Program Committee and was assigned to at least three of them for careful evaluation. There were also two invited talks. James L. Massey, this year's IACR Distinguished Ltcturer, gave a lecture entitled "e;The difficulty with difficulty"e;. Massey is the third to receive this honor, the first two being Gustavus Simmons and Adi Shamir. Shafi Goldwasser gave an invited talk entitled "e;Multi party secure protocols: past and present"e;. These proceedings contain revised versions of the 34 contributed talks. While the papers were carefully selected, they have not been refereed like submissions to a refereed journal. The authors bear full responsibility for the contents of their papers. Some authors may write final versions of their papers for publication in a refereed journal.

  • af Frank Vogt
    726,95 kr.

  • - Workshop Proceedings Brussels, November 25, 1992
    af S. Pfleger
    575,95 kr.

    Data fusion, the ability to combine data derived fromseveral sources to provide a coherent, informative, anduseful characterization of a situation,is a challengingtask. There is no unified and proven solution which isapplicable in all circumstances, but there are manyplausible and useful approaches which can be and are used tosolve particular applications. This volume presents the proceedings of the workshop DataFusion Applications hosted in Brussels by the 1992 ESPRITConference and Exhibition. It contains 22 papers from 69experts,who present advanced research results on datafusion together with practicalsolutions to multisensor datafusion in a wide variety of applications: real-time expertsystems, robotics, medical diagnosis and patientsurveillance, monitoring and control, marine protection,surveillance and safety in public transportation systems,image processing and interpretation, and environmentalmonitoring. The research forms part of the ESPRIT projectDIMUS (Data Integration in Multisensor Systems).

  • af Jens Johann
    770,95 kr.

  • af Jean-Philippe Aumasson
    207,95 kr.

    Crypto Dictionary is your full reference resource for all things cryptography.Cryptography from A5/0 to ZRTP Expand your mind—and your crypto knowledge—with the ultimate desktop dictionary for all things cryptography. Written by a globally recognized cryptographer for fellow experts and novices to the field alike, Crypto Dictionary is rigorous in its definitions, yet easy to read and laced with humor. You’ll find: A survey of crypto algorithms both widespread and niche, from RSA and DES to the USSR’s GOST cipherTrivia from the history of cryptography, such as the MINERVA backdoor in Crypto AG’s encryption algorithms, which may have let the US read the secret communications of foreign governmentsAn explanation of why the reference to the Blowfish cipher in the TV show 24 makes absolutely no senseDiscussions of numerous cryptographic attacks, like the slide attack and biclique attack (and the meaning of a crypto “attack”)Types of cryptographic proofs, such as zero-knowledge proofs of spacetimeA polemic against referring to cryptocurrency as “crypto”A look toward the future of cryptography, with discussions of the threat of quantum computing poses to our current cryptosystems and a nod to post-quantum algorithms, such as lattice-based cryptographic schemes Or, flip to any random page and learn something new, interesting, and mind-boggling for fun. Organized alphabetically, with hundreds of incisive entries and illustrations at your fingertips, Crypto Dictionary is the crypto world go-to guide that you’ll always want within reach.

  • af Natasa Zivic
    1.093,95 kr.

    This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and 1. The presented methods are novel and designed for noisy communication, which doesn¿t allow the successful use of cryptography. The rate of successful verifications is improved essentially not only for standard or "hard" verification, but even more after the introduction of "soft" verification. A security analysis shows the impact on the security. Information security and cryptography follow the late developments of communication theory by changing from "hard" to "soft", which results in much better results.

  • af Sjouke Mauw & Christian Damsgaard Jensen
    570,95 kr.

    This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.

  • af Alexander Kott
    1.126,95 kr.

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for this book. Situational awareness is exceptionally prominent in the field of cyber defense. It involves science, technology and practice of perception, comprehension and projection of events and entities in cyber space. Chapters discuss the difficulties of achieving cyber situational awareness ¿ along with approaches to overcoming the difficulties - in the relatively young field of cyber defense where key phenomena are so unlike the more conventional physical world. Cyber Defense and Situational Awareness is designed as a reference for practitioners of cyber security and developers of technology solutions for cyber defenders. Advanced-level students and researchers focused on security of computer networks will also find this book a valuable resource.

  • - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings
    af Claudia Eckert
    569,95 kr.

    This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.

  • af Xiaoyu Ruan
    428,95 kr.

    Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine.It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work.

  • af Christian Schlegel, Yan Zhang, Alexey Vinel, mfl.
    720,95 kr.

    This book constitutes the refereed proceedings of the 4th International Workshop on Multiple Access Communications, MACOM 2011, held in Trento, Italy, in September 2011. The 21 full papers presented were carefully reviewed and selected from more than 40 submissions. They are divided in topical sections on cognitive radio; MAC protocols; communications theory; special session on MAC protocols for WSNs; system analysis and scheduling; and queuing systems.

  • af Agnes Hui Chan & Virgil Gligor
    594,95 kr.

    As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide variety of different disciplines of information security to foster the exchange of ideas. The conference is an outgrowth of the Information Security Workshop, first held in Ishikawa, Japan 1997. ISC 2002 was held in Sao Paulo, Brazil, on September 30- October 2, 2002. The Program Committee considered 81 submissions of which 38 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. The papers provide a representative sample of both the variety and the truly international scope of information security research conducted currently. The topics addressed range from e-commerce protocols to access control and trust management, and to cryptography and cryptographic algorithms. Many people deserve our gratitude for their contribution to the success of the conference. We would like to thank the General Chair, Routo Terada, for overseeing the local arrangements, including registration and maintaining the conference website, and for the smooth running of the conference. We are grateful to Robbie Ye for his expert help in processing the electronic submissions, reviews and acceptance notifications. Robbie's enthusiasm and energy greatly simplified the Program Committee's task of conducting the on-line evaluation of the submitted papers under tight time constraints.

  • - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings
    af Phong Q. Nguyen
    614,95 kr.

    This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.

  • af Yehuda Lindell
    616,95 kr.

    This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.

  • af Matthew Wright & Simone Fischer-Hübner
    576,95 - 580,95 kr.

  • af Tor Helleseth & Jonathan Jedwab
    582,95 kr.

    This book constitutes the refereed proceedings of the 7th International Conference on Sequences and Their Applications, SETA 2012, held in Waterloo, Canada, in June 2012. The 28 full papers presented together with 2 invited papers in this volume were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on perfect sequences; finite fields; boolean functions; Golomb 80th birthday session; linear complexity; frequency hopping; correlation of sequences; bounds on sequences, cryptography; aperiodic correlation; and Walsh transform.

  • af Johannes Buchmann, Marc Fischlin & Mark Manulis
    614,95 kr.

    This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

  • af Hao Yin, Robert Bestak, Lukas Kencl, mfl.
    589,95 - 590,95 kr.

  • - 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers
    af Roberto Bruni
    582,95 - 719,95 kr.

    This book constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing, TGC 2011, held in Aachen, Germany, in June 2011. The 14 revised full papers presented were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections on modeling formalisms for concurrent systems; model checking and quantitative extensions thereof; semantics and analysis of modern programming languages; probabilistic models for concurrency; and testing and run-time verification.

  • af Ronald Cramer
    609,95 kr.

    This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.

  • af Roland Wagner, Abdelkader Hameurlain & Josef Küng
    572,95 - 573,95 kr.

    The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between Grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments.This, the third issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains two kinds of papers: Firstly, a selection of the best papers from the third International Conference on Data Management in Grid and Peer-to-Peer Systems, Globe 2010, and secondly, a selection of 6 papers from the 18 papers submitted in response to the call for papers for this issue. The topics covered by this special issue include replication, the semantic web, information retrieval, data storage, source selection, and large-scale distributed applications.

  • af Alfredo Cuzzocrea & Umeshwar Dayal
    595,95 kr.

    This book constitutes the refereed proceedings of the 13th International Conference on Data Warehousing and Knowledge Discovery, DaWak 2011 held in Toulouse, France in August/September 2011. The 37 revised full papers presented were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections on physical and conceptual data warehouse models, data warehousing design methodologies and tools, data warehouse performance and optimization, pattern mining, matrix-based mining techniques and stream, sensor and time-series mining.

  • af Hui Li, Jianying Zhou & Xuejia Lai
    586,95 kr.

    This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.

  • af Andreas Uhl, Bart de Decker, Jorn Lapon & mfl.
    575,95 kr.

    This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26 revised papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, biometrics, multimedia security, network security and authentication.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.