Udvidet returret til d. 31. januar 2025

Datakryptering

Her finder du spændende bøger om Datakryptering. Nedenfor er et flot udvalg af over 316 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Frank Vogt
    726,95 kr.

  • - Workshop Proceedings Brussels, November 25, 1992
    af S. Pfleger
    575,95 kr.

    Data fusion, the ability to combine data derived fromseveral sources to provide a coherent, informative, anduseful characterization of a situation,is a challengingtask. There is no unified and proven solution which isapplicable in all circumstances, but there are manyplausible and useful approaches which can be and are used tosolve particular applications. This volume presents the proceedings of the workshop DataFusion Applications hosted in Brussels by the 1992 ESPRITConference and Exhibition. It contains 22 papers from 69experts,who present advanced research results on datafusion together with practicalsolutions to multisensor datafusion in a wide variety of applications: real-time expertsystems, robotics, medical diagnosis and patientsurveillance, monitoring and control, marine protection,surveillance and safety in public transportation systems,image processing and interpretation, and environmentalmonitoring. The research forms part of the ESPRIT projectDIMUS (Data Integration in Multisensor Systems).

  • af Jean-Philippe Aumasson
    207,95 kr.

    Crypto Dictionary is your full reference resource for all things cryptography.Cryptography from A5/0 to ZRTP Expand your mind—and your crypto knowledge—with the ultimate desktop dictionary for all things cryptography. Written by a globally recognized cryptographer for fellow experts and novices to the field alike, Crypto Dictionary is rigorous in its definitions, yet easy to read and laced with humor. You’ll find: A survey of crypto algorithms both widespread and niche, from RSA and DES to the USSR’s GOST cipherTrivia from the history of cryptography, such as the MINERVA backdoor in Crypto AG’s encryption algorithms, which may have let the US read the secret communications of foreign governmentsAn explanation of why the reference to the Blowfish cipher in the TV show 24 makes absolutely no senseDiscussions of numerous cryptographic attacks, like the slide attack and biclique attack (and the meaning of a crypto “attack”)Types of cryptographic proofs, such as zero-knowledge proofs of spacetimeA polemic against referring to cryptocurrency as “crypto”A look toward the future of cryptography, with discussions of the threat of quantum computing poses to our current cryptosystems and a nod to post-quantum algorithms, such as lattice-based cryptographic schemes Or, flip to any random page and learn something new, interesting, and mind-boggling for fun. Organized alphabetically, with hundreds of incisive entries and illustrations at your fingertips, Crypto Dictionary is the crypto world go-to guide that you’ll always want within reach.

  • af Natasa Zivic
    1.093,95 kr.

    This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and 1. The presented methods are novel and designed for noisy communication, which doesn¿t allow the successful use of cryptography. The rate of successful verifications is improved essentially not only for standard or "hard" verification, but even more after the introduction of "soft" verification. A security analysis shows the impact on the security. Information security and cryptography follow the late developments of communication theory by changing from "hard" to "soft", which results in much better results.

  • af Sjouke Mauw & Christian Damsgaard Jensen
    570,95 kr.

    This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.

  • af Alexander Kott
    1.126,95 kr.

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for this book. Situational awareness is exceptionally prominent in the field of cyber defense. It involves science, technology and practice of perception, comprehension and projection of events and entities in cyber space. Chapters discuss the difficulties of achieving cyber situational awareness ¿ along with approaches to overcoming the difficulties - in the relatively young field of cyber defense where key phenomena are so unlike the more conventional physical world. Cyber Defense and Situational Awareness is designed as a reference for practitioners of cyber security and developers of technology solutions for cyber defenders. Advanced-level students and researchers focused on security of computer networks will also find this book a valuable resource.

  • - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings
    af Claudia Eckert
    569,95 kr.

    This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.

  • af Xiaoyu Ruan
    428,95 kr.

    Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine.It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work.

  • af Christian Schlegel, Yan Zhang, Alexey Vinel, mfl.
    720,95 kr.

    This book constitutes the refereed proceedings of the 4th International Workshop on Multiple Access Communications, MACOM 2011, held in Trento, Italy, in September 2011. The 21 full papers presented were carefully reviewed and selected from more than 40 submissions. They are divided in topical sections on cognitive radio; MAC protocols; communications theory; special session on MAC protocols for WSNs; system analysis and scheduling; and queuing systems.

  • af Agnes Hui Chan & Virgil Gligor
    594,95 kr.

    As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide variety of different disciplines of information security to foster the exchange of ideas. The conference is an outgrowth of the Information Security Workshop, first held in Ishikawa, Japan 1997. ISC 2002 was held in Sao Paulo, Brazil, on September 30- October 2, 2002. The Program Committee considered 81 submissions of which 38 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. The papers provide a representative sample of both the variety and the truly international scope of information security research conducted currently. The topics addressed range from e-commerce protocols to access control and trust management, and to cryptography and cryptographic algorithms. Many people deserve our gratitude for their contribution to the success of the conference. We would like to thank the General Chair, Routo Terada, for overseeing the local arrangements, including registration and maintaining the conference website, and for the smooth running of the conference. We are grateful to Robbie Ye for his expert help in processing the electronic submissions, reviews and acceptance notifications. Robbie's enthusiasm and energy greatly simplified the Program Committee's task of conducting the on-line evaluation of the submitted papers under tight time constraints.

  • - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings
    af Phong Q. Nguyen
    614,95 kr.

    This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.

  • af Yehuda Lindell
    616,95 kr.

    This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.

  • af Matthew Wright & Simone Fischer-Hübner
    576,95 - 580,95 kr.

  • af Tor Helleseth & Jonathan Jedwab
    582,95 kr.

    This book constitutes the refereed proceedings of the 7th International Conference on Sequences and Their Applications, SETA 2012, held in Waterloo, Canada, in June 2012. The 28 full papers presented together with 2 invited papers in this volume were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on perfect sequences; finite fields; boolean functions; Golomb 80th birthday session; linear complexity; frequency hopping; correlation of sequences; bounds on sequences, cryptography; aperiodic correlation; and Walsh transform.

  • af Johannes Buchmann, Marc Fischlin & Mark Manulis
    614,95 kr.

    This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

  • af Hao Yin, Robert Bestak, Lukas Kencl, mfl.
    589,95 - 590,95 kr.

  • - 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers
    af Roberto Bruni
    582,95 - 719,95 kr.

    This book constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing, TGC 2011, held in Aachen, Germany, in June 2011. The 14 revised full papers presented were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections on modeling formalisms for concurrent systems; model checking and quantitative extensions thereof; semantics and analysis of modern programming languages; probabilistic models for concurrency; and testing and run-time verification.

  • af Ronald Cramer
    609,95 kr.

    This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.

  • af Alfredo Cuzzocrea & Umeshwar Dayal
    595,95 kr.

    This book constitutes the refereed proceedings of the 13th International Conference on Data Warehousing and Knowledge Discovery, DaWak 2011 held in Toulouse, France in August/September 2011. The 37 revised full papers presented were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections on physical and conceptual data warehouse models, data warehousing design methodologies and tools, data warehouse performance and optimization, pattern mining, matrix-based mining techniques and stream, sensor and time-series mining.

  • af Hui Li, Jianying Zhou & Xuejia Lai
    586,95 kr.

    This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.

  • af Andreas Uhl, Bart de Decker, Jorn Lapon & mfl.
    575,95 kr.

    This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26 revised papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, biometrics, multimedia security, network security and authentication.

  • af Robin Sommer, Davide Balzarotti & Gregor Maier
    587,95 - 597,95 kr.

  • af Laurence T. Yang, Yan Wang, Jose M. Alcaraz Calero, mfl.
    575,95 kr.

    This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada, September 2011. The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications.

  • af Jan Camenisch & Costas Lambrinoudakis
    571,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management.

  • af Udaya Parampalli & Philip Hawkes
    593,95 kr.

    This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

  • af Sergey Balandin, Yevgeni Koucheryavy & Honglin Hu
    608,95 kr.

    This book constitutes the refereed proceedings of the 11th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN 2011 and the 4th Conference on Smart Spaces, ruSMART 2011 jointly held in St. Petersburg, Russia, in August 2011. The 56 revised full papers presented were carefully reviewed and selected from numerous submissions. The ruSMART papers are organized in topical sections on role of context in smart spaces, smart spaces platforms and smart-M3, methods for studying smart spaces, and smart spaces solutions. The NEW2AN papers are organized in topical sections on wireless PHY and power control, ad hoc networks, WSN, special topics, simulation + fundamental analysis I, traffic modeling and measurement, simulation + fundamental analysis II, network performance and QoS, cooperative, P2P, overlay networks and content, applications and services, API and software, and video.

  • af Phillip Rogaway
    620,95 kr.

    This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical sections on randomness and its use; computer-assisted cryptographic proofs; outsourcing and delegatin computation; symmetric cryptanalysis and constructions; secure computation: leakage and side channels; quantum cryptography; lattices and knapsacks; public-key encryption; symmetric schemes; signatures; obilvious transfer and secret sharing; and multivariate and coding-based schemes.

  • af Antoine Joux
    588,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.

  • af Javier Lopez & Gene Tsudik
    599,95 kr.

    This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

  • af Kenneth G. Paterson
    607,95 kr.

    This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011.The 31 papers, presented together with 2 invited talks, were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on lattice-base cryptography, implementation and side channels, homomorphic cryptography, signature schemes, information-theoretic cryptography, symmetric key cryptography, attacks and algorithms, secure computation, composability, key dependent message security, and public key encryption.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.