Èíôîðìàöèÿ 

 
Online Êàòàëîãè 


 

Àâòîð: Schneier Íàçâàíèå: Applied Cryptography ISBN: 0471117099 ISBN13(EAN): 9780471117094 Èçäàòåëüñòâî: Wiley Öåíà: 4208 ð. Íàëè÷èå íà ñêëàäå: Ïîñòàâêà ïîä çàêàç. Îïèñàíèå: This revised text offers programmers and systems designers a guide to the practical applications of modern cryptography. New features of this edition include details of the Clipper Chip encryption program, new encryption algorithms and research on message authentication and digital cash. Êóïèòü
 

Àâòîð: Revesz Peter Íàçâàíèå: Introduction to Constraint Databases ISBN: 0387987290 ISBN13(EAN): 9780387987293 Èçäàòåëüñòâî: Springer Öåíà: 6156 ð. Íàëè÷èå íà ñêëàäå: Íåò â íàëè÷èè. Îïèñàíèå: Presents the theory and applications of "constraint database" systems, which provide methods for the design of data models and query languages. This resource is useful for advanced students, practitioners, and professionals in computer science, database systems, and information systems. Êóïèòü
 

Àâòîð: Nello Cristianini Íàçâàíèå: An Introduction to Support Vector Machines and Other Kernelbased Learning Methods ISBN: 0521780195 ISBN13(EAN): 9780521780193 Èçäàòåëüñòâî: Cambridge Academ Öåíà: 4141 ð. Íàëè÷èå íà ñêëàäå: Ïîñòàâêà ïîä çàêàç. Îïèñàíèå: This is the first comprehensive introduction to Support Vector Machines (SVMs), a new generation learning system based on recent advances in statistical learning theory. SVMs deliver stateoftheart performance in realworld applications such as text categorisation, handwritten character recognition, image classification, biosequences analysis, etc., and are now established as one of the standard tools for machine learning and data mining. Students will find the book both stimulating and accessible, while practitioners will be guided smoothly through the material required for a good grasp of the theory and its applications. The concepts are introduced gradually in accessible and selfcontained stages, while the presentation is rigorous and thorough. Pointers to relevant literature and web sites containing software ensure that it forms an ideal starting point for further study. Equally, the book and its associated web site will guide practitioners to updated literature, new applications, and online software. Êóïèòü
 

Àâòîð: Oded Goldreich Íàçâàíèå: Foundations of Cryptography ISBN: 0521035368 ISBN13(EAN): 9780521035361 Èçäàòåëüñòâî: Cambridge Academ Öåíà: 3156 ð. Íàëè÷èå íà ñêëàäå: Ïîñòàâêà ïîä çàêàç. Îïèñàíèå: Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (oneway functions), pseudorandomness and zeroknowledge proofs. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving cryptographic problems, rather than on describing adhoc approaches. The book is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful. Êóïèòü
 

Àâòîð: Jacob Kogan Íàçâàíèå: Introduction to Clustering Large and HighDimensional Data ISBN: 0521617936 ISBN13(EAN): 9780521617932 Èçäàòåëüñòâî: Cambridge Academ Öåíà: 1873 ð. Íàëè÷èå íà ñêëàäå: Ïîñòàâêà ïîä çàêàç. Îïèñàíèå: There is a growing need for a more automated system of partitioning data sets into groups, or clusters. For example, digital libraries and the World Wide Web continue to grow exponentially, the ability to find useful information increasingly depends on the indexing infrastructure or search engine. Clustering techniques can be used to discover natural groups in data sets and to identify abstract structures that might reside there, without having any background knowledge of the characteristics of the data. Clustering has been used in a variety of areas, including computer vision, VLSI design, data mining, bioinformatics (gene expression analysis), and information retrieval, to name just a few. This book focuses on a few of the most important clustering algorithms, providing a detailed account of these major models in an information retrieval context. The beginning chapters introduce the classic algorithms in detail, while the later chapters describe clustering through divergences and show recent research for more advanced audiences. Êóïèòü
 

Àâòîð: Di Crescenzo Giovanni, Rubin Avi Íàçâàíèå: Financial Cryptography and Data Security / 10th International Conference, FC 2006 Anguilla, British West Indies, February 27  March 2, 2006, Revised Selected Papers ISBN: 3540462554 ISBN13(EAN): 9783540462552 Èçäàòåëüñòâî: Springer Öåíà: 6599 ð. Íàëè÷èå íà ñêëàäå: Íåò â íàëè÷èè. Îïèñàíèå: This book constitutes the thoroughly refereed postproceedings of the 10th International Conference on Financial Cryptography and Data Security, FC 2006, held in Anguilla, British West Indies in February/March 2006.The 19 revised full papers and 6 revised short papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on authentication and fraud detection, privacy, reputation and mixnets, conditional financial cryptography, payment systems, and efficient protocols. Êóïèòü
 

Àâòîð: De Prisco Roberto, Yung Moti Íàçâàíèå: Security and Cryptography for Networks / 5th International Conference, SCN 2006, Maiori, Italy, September 68, 2006, Proceedings ISBN: 3540380809 ISBN13(EAN): 9783540380801 Èçäàòåëüñòâî: Springer Öåíà: 4836 ð. Íàëè÷èå íà ñêëàäå: Íåò â íàëè÷èè. Îïèñàíèå: This book constitutes the refereed proceedings of the 5th International Conference on Security and Cryptology for Networks, SCN 2006, held in Maiori, Italy in September 2006.The 24 revised full papers presented together with the abstract of an invited talk were carefully revised and selected from 81 submissions. The papers are organized in topical sections on distributed systems security, signature schemes variants, block cipher analysis, anonymity and ecommerce, public key encryption and key exchange, secret sharing, symmetric key cryptanalisis and randomness, applied authentication, and public key related cryptanalisis. Êóïèòü
 

Àâòîð: Garcia Arnaldo, Stichtenoth Henning Íàçâàíèå: Topics in Geometry, Coding Theory and Cryptography ISBN: 1402053339 ISBN13(EAN): 9781402053337 Èçäàòåëüñòâî: Springer Öåíà: 8799 ð. Íàëè÷èå íà ñêëàäå: Íåò â íàëè÷èè. Îïèñàíèå: The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppa`s discovery of algebraic geometry codes around 1980, many applications of function fields were found in different areas of mathematics and information theory, such as coding theory, sphere packings and lattices, sequence design, and cryptography. The use of function fields often led to better results than those of classical approaches.This book presents survey articles on some of these new developments. Most of the material is directly related to the interaction between function fields and their various applications; in particular the structure and the number of rational places of function fields are of great significance. The topics focus on material which has not yet been presented in other books or survey articles. Wherever applications are pointed out, a special effort has been made to present some background concerning their use. Êóïèòü
 

Àâòîð: Ytrehus Ã˜yvind Íàçâàíèå: Coding and Cryptography / International Workshop, WCC 2005, Bergen, Norway, March 1418, 2005, Revised Selected Papers ISBN: 3540354816 ISBN13(EAN): 9783540354819 Èçäàòåëüñòâî: Springer Öåíà: 7919 ð. Íàëè÷èå íà ñêëàäå: Íåò â íàëè÷èè. Îïèñàíèå: This book constitutes the thoroughly refereed postproceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005.The 33 revised full papers were carefully reviewed and selected during two rounds of reviewing and improvement from 118 submissions. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied. Topics covered are: coding theory, i.e., errorcorrecting codes, decoding algorithms, and related combinatorial problems; cryptology, i.e., block and stream ciphers, hash functions, public key cryptography, secret sharing, authentication, and intellectual property protection; and discrete mathematics and algorithmic tools arising from these two areas, such as boolean functions, sequences, finite fields, algebraic systems and related polynomial properties. Êóïèòü
 

Àâòîð: Zhou Jianying, Yung Moti, Bao Feng Íàçâàíèå: Applied Cryptography and Network Security / 4th International Conference, ACNS 2006, Singapore, June 69, 2006, Proceedings ISBN: 3540347038 ISBN13(EAN): 9783540347033 Èçäàòåëüñòâî: Springer Öåíà: 9239 ð. Íàëè÷èå íà ñêëàäå: Íåò â íàëè÷èè. Îïèñàíèå: This book constitutes the refereed proceedings of the 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, held in Singapore in June 2006.The 33 revised full papers presented were carefully reviewed and selected from 218 submissions. The papers are organized in topical sections on intrusion detection and avoidance, cryptographic applications, DoS attacks and countermeasures, key management, cryptanalysis, security of limited devices, cryptography, authentication and Web security, adhoc and sensor network security, cryptographic constructions, and security and privacy. Êóïèòü
 

Àâòîð: Preneel Bart, Tavares Stafford Íàçâàíèå: Selected Areas in Cryptography / 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 1112, 2005, Revised Selected Papers ISBN: 3540331085 ISBN13(EAN): 9783540331087 Èçäàòåëüñòâî: Springer Öåíà: 6599 ð. Íàëè÷èå íà ñêëàäå: Íåò â íàëè÷èè. Îïèñàíèå: This book constitutes the thoroughly refereed postproceedings of the 12th International Workshop on Selected Areas in Cryptography, SAC 2005, held in Kingston, Ontario, Canada, in August 2005.The 25 revised full papers presented were carefully reviewed and selected from 96 submissions for inclusione in the book. The papers are organized in topical sections on stream ciphers, block ciphers, modes of operation, public key cryptography, key establishment protocols and access control, hash functions, protocols for RFID tags, and efficient implementations. Êóïèòü
 

Àâòîð: Delfs Íàçâàíèå: Introduction to Cryptography ISBN: 3540492437 ISBN13(EAN): 9783540492436 Èçäàòåëüñòâî: Springer Öåíà: 3956 ð. Íàëè÷èå íà ñêëàäå: Íåò â íàëè÷èè. Îïèñàíèå: Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of oneway functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on publickey encryption schemes that are provably secure against adaptivelychosenciphertext attacks. Êóïèòü
 
