Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

New Directions of Modern Cryptography, Cao, Zhenfu


Варианты приобретения
Цена: 112290.00T
Кол-во:
 о цене
Наличие: Отсутствует. 
Возможна поставка под заказ. Дата поступления на склад уточняется после оформления заказа


Добавить в корзину
в Мои желания

Автор: Cao, Zhenfu
Название:  New Directions of Modern Cryptography
ISBN: 9781466501386
Издательство: Taylor&Francis
Классификация:

ISBN-10: 1466501383
Обложка/Формат: Hardback
Страницы: 400
Вес: 0.72 кг.
Дата издания: 06.12.2012
Язык: English
Иллюстрации: 18 tables, black and white; 43 illustrations, black and white
Размер: 241 x 158 x 25
Читательская аудитория: Postgraduate, research & scholarly
Рейтинг:
Поставляется из: Европейский союз

Boolean Functions for Cryptography and Coding Theory

Автор: Claude Carlet
Название: Boolean Functions for Cryptography and Coding Theory
ISBN: 1108473806 ISBN-13(EAN): 9781108473804
Издательство: Cambridge Academ
Рейтинг:
Цена: 79200.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This complete and accessible survey of Boolean functions for cryptography and coding, written for researchers and graduate students, balances all necessary background with comprehensive state of the art coverage, and tackles recent problems and applications like side channel attacks, Gowers norm, and cloud computing.

Modern Cryptography with Proof Techniques and Applications

Автор: Oun Hwang, Seong
Название: Modern Cryptography with Proof Techniques and Applications
ISBN: 1138584088 ISBN-13(EAN): 9781138584082
Издательство: Taylor&Francis
Рейтинг:
Цена: 112290.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Proof techniques in cryptography are very difficult to understand even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proof of the cryptographic schemes, practical aspects of them have received comparatively less attention.

Modern Cryptography: Applied Mathematics for Encryption and Information Security

Автор: William Easttom
Название: Modern Cryptography: Applied Mathematics for Encryption and Information Security
ISBN: 3031123034 ISBN-13(EAN): 9783031123030
Издательство: Springer
Рейтинг:
Цена: 51230.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. * Presents new and updated coverage of cryptography including new content on quantum resistant cryptography; * Covers the basic math needed for cryptography - number theory, discrete math, and algebra (abstract and linear); * Includes a full suite of classroom materials including exercises, Q&A, and examples.

Cryptography and network security /

Автор: Alencar, Marcelo S.,
Название: Cryptography and network security /
ISBN: 8770224072 ISBN-13(EAN): 9788770224079
Издательство: Taylor&Francis
Рейтинг:
Цена: 122490.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: It comprises twelve chapters divided into two parts discussing "Non-neutral Evolution on Human Genes" (Part I) and "Evolution of Modern Human Populations" (Part II.)The most significant feature of this book is the continent-wise discussion of modern human dispersal using human genomic data in Part II.

An Introduction to Secret Sharing

Автор: Stephen Krenn, Thomas Lorunser
Название: An Introduction to Secret Sharing
ISBN: 3031281608 ISBN-13(EAN): 9783031281600
Издательство: Springer
Рейтинг:
Цена: 41920.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research. This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.

Public-Key Cryptography - Pkc 2021: 24th Iacr International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 20

Автор: Garay Juan A.
Название: Public-Key Cryptography - Pkc 2021: 24th Iacr International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 20
ISBN: 3030752445 ISBN-13(EAN): 9783030752446
Издательство: Springer
Цена: 130430.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021.

Algebraic Geometry for Coding Theory and Cryptography

Автор: Everett W. Howe; Kristin E. Lauter; Judy L. Walker
Название: Algebraic Geometry for Coding Theory and Cryptography
ISBN: 3319876759 ISBN-13(EAN): 9783319876757
Издательство: Springer
Рейтинг:
Цена: 158380.00 T
Наличие на складе: Поставка под заказ.
Описание: Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM).

Practical Cryptography

Название: Practical Cryptography
ISBN: 0367378159 ISBN-13(EAN): 9780367378158
Издательство: Taylor&Francis
Рейтинг:
Цена: 60220.00 T
Наличие на складе: Невозможна поставка.
Описание:

Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language.

Written for programmers and engineers, Practical Cryptography explains how you can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems.

Covering the latest developments in practical cryptographic techniques, this book shows you how to build security into your computer applications, networks, and storage. Suitable for undergraduate and postgraduate students in cryptography, network security, and other security-related courses, this book will also help anyone involved in computer and network security who wants to learn the nuts and bolts of practical cryptography.


Cyber Security Cryptography and Machine Learning: Fourth International Symposium, Cscml 2020, Be`er Sheva, Israel, July 2-3, 2020, Proceedings

Автор: Dolev Shlomi, Kolesnikov Vladimir, Lodha Sachin
Название: Cyber Security Cryptography and Machine Learning: Fourth International Symposium, Cscml 2020, Be`er Sheva, Israel, July 2-3, 2020, Proceedings
ISBN: 3030497844 ISBN-13(EAN): 9783030497842
Издательство: Springer
Рейтинг:
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be`er Sheva, Israel, in July 2020.The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions.

Financial Cryptography and Data Security: FC 2020 International Workshops, Asiausec, Codefi, Voting, and Wtsc, Kota Kinabalu, Malaysia, February 14, 2

Автор: Bernhard Matthew, Bracciali Andrea, Camp L. Jean
Название: Financial Cryptography and Data Security: FC 2020 International Workshops, Asiausec, Codefi, Voting, and Wtsc, Kota Kinabalu, Malaysia, February 14, 2
ISBN: 3030544540 ISBN-13(EAN): 9783030544546
Издательство: Springer
Рейтинг:
Цена: 102480.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea.- User-Centered Risk Communication for Safer Browsing.- The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails.- Cue Utilization, Phishing Feature and Phishing Email Detection.- Dis-Empowerment Online- An Investigation of Privacy & Sharing Perceptions & Method Preferences.- Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation.- Understanding Perceptions of Smart Devices.- In Our Employer We Trust: Mental Models of Office Worker's Privacy Perceptions.- Behaviour of Outsourced Employees as Sources of Information System Security Threats.- Exploring Effects of Auditory Stimuli on CAPTCHA Performance.- PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records.- Empathy as a Response to Frustration in Password Choice.- Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage.- Incorporating Psychology into Cyber Security Education: A Pedagogical Approach.- Effectiveness of multi-stakeholder discussions for decentralized finance: a conference report of CoDeFi 2020.- Multistakeholder Governance for the Internet.- Future of Finance: From G20 to practical implementation of multi-stakeholder governance on blockchain based finance.- Securing Cryptocurrency Exchange: Building up Standard from Huge Failures.- Origami voting: a non-cryptographic approach to transparent ballot verification.- Towards Improving the Efficacy of Code-Based Verification in Internet Voting.- Mechanized Proofs of Verifiability and Privacy in a paper-based e-voting Scheme.- Sets of Half-Average Nulls Generate Risk-Limiting Audits: SHANGRLA.- A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate Elections.- Vote selling resistant voting.- An Update on Marked Mix-Nets: An Attack, A Fix and PQ Possibilities.- Performance of Shuffling: Taking it to the Limits.- Characterizing Types of Smart Contracts in the Ethereum Landscape.- Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social Media.- Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts.- Scalable Open-Vote Network on Ethereum.- How to Dynamically Incentivize Sufficient Level of IoT Securitx.- Confidential and auditable payments.- MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network.- Marlowe: implementing and analysing financial contracts on blockchain.- Load Balancing for Sharded Blockchains.- The Extended UTXO Model.- Privacy-Preserving Cross-Chain Atomic Swaps.- A Blockchain Based Approach to Resource Sharing in Smart Neighbourhoods.- Enforcing Determinism of Java Smart Contracts.- Albert, an intermediate smart-contract language for the Tezos blockchain.- A Formally Verified Static Analysis Framework for Compositional Contracts.


Financial Cryptography and Data Security

Автор: Gene Tsudik
Название: Financial Cryptography and Data Security
ISBN: 3540852298 ISBN-13(EAN): 9783540852292
Издательство: Springer
Рейтинг:
Цена: 65210.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the refereed post-conference proceedings of the 12th International Conference on Financial Cryptography and Data Security, FC 2008, held in Cozumel, Mexico. This title covers papers organized in topical sections on attacks and counter measures, protocols, theory, hardware, chips and tags, signatures and encryption, as well as e-cash.

Post-Quantum Cryptography

Автор: Johannes Buchmann; Jintai Ding
Название: Post-Quantum Cryptography
ISBN: 3540884025 ISBN-13(EAN): 9783540884026
Издательство: Springer
Рейтинг:
Цена: 65210.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. This book contains the papers that present four families of public key cryptosystems that have the potential to resist quantum computers.


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия