Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher der Reihe Security and Cryptology

Filter
Filter
Ordnen nachSortieren Reihenfolge der Serie
  • - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
    von Michael Jacobson
    50,00 €

    This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.

  • - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings
    von Konrad Rieck
    45,00 €

    This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.

  • - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings
    von James Heather
    45,00 €

    This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.

  • - 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers
    von Emmanuel Prouff
    45,00 €

    This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013. The 13 revised full papers presented together with two invited talks were carefully selected from 39 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.

  • - 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers
    von Yun Q. Shi
    50,00 €

    This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.

  • - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings
    von Steven Furnell
    45,00 €

    This book constitutes the refereed proceedings of the 10th International Conference on Trust and Privacy in Digital Business, TrustBus 2013, held in Prague, Czech Republic, in August 2013 in conjunction with DEXA 2013. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: access control and authentication; identity and trust management; privacy and confidentiality management; information systems security; security policies/legal issues; and trust and privacy in mobile and pervasive environments.

  • - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings
    von Guido Marco Bertoni
    55,00 €

    This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.

  • - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
    von Sabrina de Capitani di Vimercati
    45,00 €

    This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols, Public Key Infrastructure, Wireless Authentication and Revocation, Certificate and Trusted Computing, and Digital Structures.

  • - 2nd International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers
    von Gildas Avoine
    45,00 €

    This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in Gebze, Turkey, during May 6-7, 2013. The 10 full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are grouped in topical sections on efficient Implementations and designs, block cipher cryptanalysis, wireless sensor networks, and cryptographic protocols.

  • - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings
    von Jason Crampton
    50,00 €

    This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.

  • - 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013, Proceedings
    von Rafael Accorsi
    45,00 €

    This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013). The 15 revised full papers including two invited talks were carefully reviewed and selected from 47 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

  • - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings
    von Benedikt Gierlichs
    45,00 €

    This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based identification schemes, and signatures.

  • - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings
    von Willy Susilo
    50,00 €

    This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia. The 10 revised full papers presented together with seven short papers were carefully reviewed and selected. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.

  • - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings
    von Salvatore J. Stolfo
    50,00 €

    This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St. Lucia in October 2013. The volume contains 22 full papers that were carefully reviewed and selected from 95 submissions, as well as 10 poster papers selected from the 23 submissions. The papers address all current topics in computer security ranged from hardware-level security, server, web, mobile, and cloud-based security, malware analysis, and web and network privacy.

  • von Michael Brenner, Matthew Smith & Andrew A. Adams
    45,00 €

  • - 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers
    von Sandro Bologna
    45,00 €

    This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with all areas of critical infrastructure protection research.

  • - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
    von Kazuo Sakiyama
    50,00 €

    This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in Okinawa, Japan, in November 2013. The 20 revised selected papers presented in this volume were carefully reviewed and selected from 63 submissions. They are organized in topical sections named: software and system security, cryptanalysis, privacy and cloud computing, public key cryptosystems, and security protocols.

  • - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings
    von Hanne Riis Nielsen
    50,00 €

    This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013. The 18 revised regular papers together with 3 short papers and one invited talk were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security policies, information flow, security experiences, Web security, and network security.

  • - 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
    von Kazue Sako
    55,00 €

    The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

  • - 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
    von Kazue Sako
    55,00 €

    The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

  • - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers
    von Michael Hutter
    45,00 €

    This book constitutes the proceedings of the 9th Workshop on RFID Security and Privacy, RFIDsec 2013, held in Graz, Austria, in July 2013. The 11 papers presented in this volume were carefully reviewed and selected from 23 submissions. RFIDsec deals with topics of importance to improving the security and privacy of RFID, NFC, contactless technologies, and the Internet of Things. RFIDsec bridges the gap between cryptographic researchers and RFID developers.

  • von Javier Lopez, Bernhard Hämmerli & Nils Kalstad Svendsen
    45,00 €

  • von Martijn Stam
    50,00 €

  • von Sokratis Katsikas & Isaac Agudo
    45,00 €

  • - First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers
    von Bart Preneel
    45,00 €

    This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies.

  • - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings
    von Hugo Krawczyk
    71,00 €

    This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.

  • - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings
    von Phong Q. Nguyen
    71,00 €

    This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.

  • von Liqun Chen, Moti Yung & Liehuang Zhu
    50,00 €

  • von Alessandro Aldini, Javier Lopez & Fabio Martinelli
    47,00 €

  • von Tsuyoshi Takagi & Masahiro Mambo
    49,00 €

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.