0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (85)
  • R500+ (1,909)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Engineering Psychology and Cognitive Ergonomics - 19th International Conference, EPCE 2022, Held as Part of the 24th HCI... Engineering Psychology and Cognitive Ergonomics - 19th International Conference, EPCE 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, June 26 - July 1, 2022, Proceedings (Paperback, 1st ed. 2022)
Don Harris, Wen-Chin Li
R2,489 Discovery Miles 24 890 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 19th International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022. The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The EPCE 2022 proceedings covers subjects such as advances in applied cognitive psychology that underpin the theory, measurement and methodologies behind the development of human-machine systems. Cognitive Ergonomics describes advances in the design and development of user interfaces.

Human-Computer Interaction. User Experience and Behavior - Thematic Area, HCI 2022, Held as Part of the 24th HCI International... Human-Computer Interaction. User Experience and Behavior - Thematic Area, HCI 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Masaaki Kurosu
R2,750 Discovery Miles 27 500 Ships in 18 - 22 working days

The three-volume set LNCS 13302, 13303 and 13304 constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 24th International Conference on Human-Computer Interaction, HCII 2022, which took place virtually in June-July 2022. The 132 papers included in this HCI 2022 proceedings were organized in topical sections as follows: Part I: Theoretical and Multidisciplinary Approaches in HCI; Design and Evaluation Methods, Techniques and Tools; Emotions and Design; and Children-Computer Interaction, Part II: Novel Interaction Devices, Methods and Techniques; Text, Speech and Image Processing in HCI; Emotion and Physiological Reactions Recognition; and Human-Robot Interaction, Part III: Design and User Experience Case Studies, Persuasive Design and Behavioral Change; and Interacting with Chatbots and Virtual Agents.

Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2... Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Michael Friedewald, Melek OEnen, Eva Lievens, Stephan Krenn, Samuel Fricker
R1,687 Discovery Miles 16 870 Ships in 18 - 22 working days

This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.

Handbook for CTFers (Paperback, 1st ed. 2022): Nu1L Team Handbook for CTFers (Paperback, 1st ed. 2022)
Nu1L Team
R2,568 Discovery Miles 25 680 Ships in 18 - 22 working days

"Handbook for CTFers: Zero to One" was written by the Nu1L team, one of China's top CTF teams. As for Jeopardy-style CTFs, the content in the first 10 chapters of this book not only covers traditional categories of tasks like WEB, PWN and Crypto, but also includes some of the latest hot topics and techniques, such as blockchain. Case studies are provided for all of these types. Onsite Attack-Defend-style CTFs and penetration testing are introduced in Chapter 11 and Chapter 12. In order to help readers gain the most from the book, we have developed the N1Book platform, which addresses practical questions for different task categories. The book offers beginners a reliable, systematic tutorial on CTF competition. At the same time, it includes real case studies and a wealth of our competition experience, making it a valuable asset for experienced CTF players.

Blockchain Gaps - From Myth to Real Life (Paperback, 1st ed. 2021): Shin'ichiro Matsuo, Nat Sakimura Blockchain Gaps - From Myth to Real Life (Paperback, 1st ed. 2021)
Shin'ichiro Matsuo, Nat Sakimura
R1,589 Discovery Miles 15 890 Ships in 18 - 22 working days

This book analyzes the fundamental issues faced when blockchain technology is applied to real-life applications. These concerns, not only in the realm of computer science, are caused by the nature of technological design. Blockchain is considered the foundation of a wide range of flexible ecosystems; its technology is an excellent mixture of mathematics, cryptography, incentive mechanisms, economics, and pertinent regulations. The book provides an essential understanding of why such fundamental issues arise, by revising the underlying theories. Blockchain theory is thus presented in an easy-to-understand, useful manner. Also explained is the reason why blockchain is hard to adopt for real-life problems but is valuable as a foundation for flexible ecosystems. Included are directions for solving those problems and finding suitable areas for blockchain applications in the future. The authors of this work are experts from a wide range of backgrounds such as cryptography, distributed computing, computer science, trust, identity, regulation, and standardization. Their contributions collected here will appeal to all who are interested in blockchain and the elements surrounding it.

Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Paperback, 1st ed. 2020): Tuan D. Pham Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Paperback, 1st ed. 2020)
Tuan D. Pham
R2,427 Discovery Miles 24 270 Ships in 18 - 22 working days

This book presents an original combination of three well-known methodological approaches for nonlinear data analysis: recurrence, networks, and fuzzy logic. After basic concepts of these three approaches are introduced, this book presents recently developed methods known as fuzzy recurrence plots and fuzzy recurrence networks. Computer programs written in MATLAB, which implement the basic algorithms, are included to facilitate the understanding of the developed ideas. Several applications of these techniques to biomedical problems, ranging from cancer and neurodegenerative disease to depression, are illustrated to show the potential of fuzzy recurrence methods. This book opens a new door to theorists in complex systems science as well as specialists in medicine, biology, engineering, physics, computer science, geosciences, and social economics to address issues in experimental nonlinear signal and data processing.

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques... Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques (Paperback, 1st ed. 2021)
Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari
R4,687 Discovery Miles 46 870 Ships in 18 - 22 working days

Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.

The Personal Finance Guide for Tech Professionals - Building, Protecting, and Transferring Your Wealth (Paperback, 1st ed.):... The Personal Finance Guide for Tech Professionals - Building, Protecting, and Transferring Your Wealth (Paperback, 1st ed.)
Tom Taulli
R1,178 R981 Discovery Miles 9 810 Save R197 (17%) Ships in 18 - 22 working days

Gain a basic foundation of essential personal finance issues and strategies, specifically geared towards tech professionals. The book will build on the concepts, such as going from the basics of investments to more advanced topics like alternative investments and tax strategies. In the U.S., about 6 million tech startup employees have stock options. The result is that this can often be the biggest source of wealth, sometimes reaching into the millions. Yet there are many financial and tax complications that have been aggravated with the transition to remote work. This can mean lower returns and missed opportunities, and in some cases, employees may even be subject to actions from the IRS and local tax agencies. The Personal Finance Guide For Tech Professionals is packed with actionable advice and covers the main areas that any tech professional will face. What You'll Learn Track and analyze investments with fintech apps Improve the results of freelance work, such as with strategies to lower taxes Protect your hard-earned assets with insurance and the establishment of entities like LLCs Who This Book Is For The main focus will be on tech employees who get equity compensation. This spans from entry level people to senior executives.

Guide to Differential Privacy Modifications - A Taxonomy of Variants and Extensions (Paperback, 1st ed. 2022): Balazs Pejo,... Guide to Differential Privacy Modifications - A Taxonomy of Variants and Extensions (Paperback, 1st ed. 2022)
Balazs Pejo, Damien Desfontaines
R1,469 Discovery Miles 14 690 Ships in 18 - 22 working days

Shortly after it was first introduced in 2006, differential privacy became the flagship data privacy definition. Since then, numerous variants and extensions were proposed to adapt it to different scenarios and attacker models. In this work, we propose a systematic taxonomy of these variants and extensions. We list all data privacy definitions based on differential privacy, and partition them into seven categories, depending on which aspect of the original definition is modified. These categories act like dimensions: Variants from the same category cannot be combined, but variants from different categories can be combined to form new definitions. We also establish a partial ordering of relative strength between these notions by summarizing existing results. Furthermore, we list which of these definitions satisfy some desirable properties, like composition, post-processing, and convexity by either providing a novel proof or collecting existing ones.

Risks and Security of Internet and Systems - 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November... Risks and Security of Internet and Systems - 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12-13, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Bo Luo, Mohamed Mosbah, Frederic Cuppens, Lotfi Ben Othmane, Nora Cuppens, …
R1,494 Discovery Miles 14 940 Ships in 18 - 22 working days

This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2021, which took place during November 11-13, 2021. The conference was originally planned to take place in Ames, IA, USA, but had to change to an online format due to the COVID-19 pandemic. The 9 full and 3 short papers included in this volume were carefully reviewed and selected from 23 submissions. The papers were organized in topical sections named: CPS and hardware security; attacks, responses, and security management; network and data security.

Electronic Governance and Open Society: Challenges in Eurasia - 8th International Conference, EGOSE 2021, Saint Petersburg,... Electronic Governance and Open Society: Challenges in Eurasia - 8th International Conference, EGOSE 2021, Saint Petersburg, Russia, November 24-25, 2021, Proceedings (Paperback, 1st ed. 2022)
Andrei V. Chugunov, Marijn Janssen, Igor Khodachek, Yuri Misnikov, Dmitrii Trutnev
R2,211 Discovery Miles 22 110 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th Conference on Electronic Governance and Open Society: Challenges in Eurasia, EGOSE 2021, held in St. Petersburg, Russia, in November 2021. The 21 full papers were carefully reviewed and selected from 69 submissions, additionally one invited paper has been included in this volume. The papers are organized in topical sections on digital technology and design; digital Society; digital government and economy.

Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Orr Dunkelman, Stefan Dziembowski
R3,257 Discovery Miles 32 570 Ships in 18 - 22 working days

The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.

Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Orr Dunkelman, Stefan Dziembowski
R4,408 Discovery Miles 44 080 Ships in 18 - 22 working days

The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.

Let's Calculate Bach - Applying Information Theory and Statistics to Numbers in Music (Paperback, 1st ed. 2021): Alan... Let's Calculate Bach - Applying Information Theory and Statistics to Numbers in Music (Paperback, 1st ed. 2021)
Alan Shepherd
R3,810 Discovery Miles 38 100 Ships in 18 - 22 working days

This book shows how information theory, probability, statistics, mathematics and personal computers can be applied to the exploration of numbers and proportions in music. It brings the methods of scientific and quantitative thinking to questions like: What are the ways of encoding a message in music and how can we be sure of the correct decoding? How do claims of names hidden in the notes of a score stand up to scientific analysis? How many ways are there of obtaining proportions and are they due to chance? After thoroughly exploring the ways of encoding information in music, the ambiguities of numerical alphabets and the words to be found "hidden" in a score, the book presents a novel way of exploring the proportions in a composition with a purpose-built computer program and gives example results from the application of the techniques. These include information theory, combinatorics, probability, hypothesis testing, Monte Carlo simulation and Bayesian networks, presented in an easily understandable form including their development from ancient history through the life and times of J. S. Bach, making connections between science, philosophy, art, architecture, particle physics, calculating machines and artificial intelligence. For the practitioner the book points out the pitfalls of various psychological fallacies and biases and includes succinct points of guidance for anyone involved in this type of research. This book will be useful to anyone who intends to use a scientific approach to the humanities, particularly music, and will appeal to anyone who is interested in the intersection between the arts and science.With a foreword by Ruth Tatlow (Uppsala University), award winning author of Bach's Numbers: Compositional Proportion and Significance and Bach and the Riddle of the Number Alphabet."With this study Alan Shepherd opens a much-needed examination of the wide range of mathematical claims that have been made about J. S. Bach's music, offering both tools and methodological cautions with the potential to help clarify old problems." Daniel R. Melamed, Professor of Music in Musicology, Indiana University

Security and Privacy - Select Proceedings of ICSP 2020 (Paperback, 1st ed. 2021): Pantelimon Stanica, Sugata Gangopadhyay,... Security and Privacy - Select Proceedings of ICSP 2020 (Paperback, 1st ed. 2021)
Pantelimon Stanica, Sugata Gangopadhyay, Sumit Kumar Debnath
R2,625 Discovery Miles 26 250 Ships in 18 - 22 working days

This book consists of refereed selected papers from the International Conference on Security & Privacy - ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.

Distributed Computing for Emerging Smart Networks - Third International Workshop, DiCES-N 2022, Bizerte, Tunisia, February 11,... Distributed Computing for Emerging Smart Networks - Third International Workshop, DiCES-N 2022, Bizerte, Tunisia, February 11, 2022, Proceedings (Paperback, 1st ed. 2022)
Imen Jemili, Mohamed Mosbah
R1,707 Discovery Miles 17 070 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2022, held in Bizerte, Tunisia, in February 2022. Due to the COVID-19 pandemic the conference was held online. The 5 full papers included in this volume were carefully reviewed and selected from 14 submissions. The volume also presents one invited paper. The papers are organized in topical sections on emerging networks and communications; cyber security of connected objects.

Concurrent Crash-Prone Shared Memory Systems - A Few Theoretical Notions (Paperback): Raynal Michel Concurrent Crash-Prone Shared Memory Systems - A Few Theoretical Notions (Paperback)
Raynal Michel
R1,602 Discovery Miles 16 020 Ships in 18 - 22 working days

Theory is what remains true when technology is changing. So, it is important to know and master the basic concepts and the theoretical tools that underlie the design of the systems we are using today and the systems we will use tomorrow. This means that, given a computing model, we need to know what can be done and what cannot be done in that model. Considering systems built on top of an asynchronous read/write shared memory prone to process crashes, this monograph presents and develops the fundamental notions that are universal constructions, consensus numbers, distributed recursivity, power of the BG simulation, and what can be done when one has to cope with process anonymity and/or memory anonymity. Numerous distributed algorithms are presented, the aim of which is being to help the reader better understand the power and the subtleties of the notions that are presented. In addition, the reader can appreciate the simplicity and beauty of some of these algorithms.

Code-Based Cryptography - 9th International Workshop, CBCrypto 2021 Munich, Germany, June 21-22, 2021 Revised Selected Papers... Code-Based Cryptography - 9th International Workshop, CBCrypto 2021 Munich, Germany, June 21-22, 2021 Revised Selected Papers (Paperback, 1st ed. 2022)
Antonia Wachter-Zeh, Hannes Bartz, Gianluigi Liva
R1,479 Discovery Miles 14 790 Ships in 18 - 22 working days

This book constitutes the proceedings of the 9th International Workshop on Code-Based Cryptography, CBCrypto 2021, which was held during June 21-22, 2021. The workshop was initially planned to take place in Munich, Germany, but changed to an online event due to the COVID-19 pandemic. The 6 papers presented in this volume were carefully reviewed and selected from 14 submissions. These contributions span all aspects of code-based cryptography, from design to implementation, and including studies of security, new systems, and improved decoding algorithms.

Progress in Information Geometry - Theory and Applications (Paperback, 1st ed. 2021): Frank Nielsen Progress in Information Geometry - Theory and Applications (Paperback, 1st ed. 2021)
Frank Nielsen
R3,783 Discovery Miles 37 830 Ships in 18 - 22 working days

This book focuses on information-geometric manifolds of structured data and models and related applied mathematics. It features new and fruitful interactions between several branches of science: Advanced Signal/Image/Video Processing, Complex Data Modeling and Analysis, Statistics on Manifolds, Topology/Machine/Deep Learning and Artificial Intelligence. The selection of applications makes the book a substantial information source, not only for academic scientist but it is also highly relevant for industry. The book project was initiated following discussions at the international conference GSI'2019 - Geometric Science of Information that was held at ENAC, Toulouse (France).

Intelligence Science III - 4th IFIP TC 12 International Conference, ICIS 2020, Durgapur, India, February 24-27, 2021, Revised... Intelligence Science III - 4th IFIP TC 12 International Conference, ICIS 2020, Durgapur, India, February 24-27, 2021, Revised Selected Papers (Paperback, 1st ed. 2021)
Zhongzhi Shi, Mihir Chakraborty, Samarjit Kar
R1,418 Discovery Miles 14 180 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 4th International Conference on Intelligence Science, ICIS 2020, held in Durgapur, India, in February 2021 (originally November 2020). The 23 full papers and 4 short papers presented were carefully reviewed and selected from 42 submissions. One extended abstract is also included. They deal with key issues in brain cognition; uncertain theory; machine learning; data intelligence; language cognition; vision cognition; perceptual intelligence; intelligent robot; and medical artificial intelligence.

Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected... Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Guojun Wang, Kim-Kwang Raymond Choo, Ryan K.l. Ko, Yang Xu, Bruno Crispo
R2,228 Discovery Miles 22 280 Ships in 18 - 22 working days

This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks.

Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
R2,752 Discovery Miles 27 520 Ships in 18 - 22 working days

The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022. The conference was originally planned to take place in Yokohama, Japan, but had to change to an online format due to the COVID-19 pandemic.The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.

Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
R2,494 Discovery Miles 24 940 Ships in 18 - 22 working days

The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022. The conference was originally planned to take place in Yokohama, Japan, but had to change to an online format due to the COVID-19 pandemic.The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.

Big Data - BigData 2021 - 10th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual... Big Data - BigData 2021 - 10th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10-14, 2021, Proceedings (Paperback, 1st ed. 2022)
Jinpeng Wei, Liang-Jie Zhang
R1,366 Discovery Miles 13 660 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Big Data, BigData 2021, held online as part of SCF 2021, during December 10-14, 2021.The 6 full and 2 short papers presented were carefully reviewed and selected from 53 submissions. The topics covered are Big Data Architecture, Big Data Modeling, Big Data As A Service, Big Data for Vertical Industries (Government, Healthcare, etc.), Big Data Analytics, Big Data Toolkits, Big Data Open Platforms, Economic Analysis, Big Data for Enterprise Transformation, Big Data in Business Performance Management, Big Data for Business Model Innovations and Analytics, Big Data in Enterprise Management Models and Practices, Big Data in Government Management Models and Practices, and Big Data in Smart Planet Solutions.

Services - SERVICES 2021 - 17th World Congress, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event,... Services - SERVICES 2021 - 17th World Congress, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10-14, 2021, Proceedings (Paperback, 1st ed. 2022)
Mohamed Adel Serhani, Liang-Jie Zhang
R1,476 Discovery Miles 14 760 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 17th World Congress on Services, SERVICES 2021, held as part of the Services Conference Federation, SCF 2021, in December 2021. The conference was held virtually due to the COVID-19 pandemic. The 7 full papers and 2 short papers presented were carefully reviewed and selected from 43 submissions. The papers cover topics in the field of Advertising Services, Banking Services, Broadcasting & Cable TV Service, Business Services, Communications Services, Government Services, Real Estate Operations Services, Schools and Education Services, Healthcare Services, and much more.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,356 Discovery Miles 23 560
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R952 Discovery Miles 9 520
Blockchain - An Essential Beginner's…
Herbert Jones Hardcover R656 R585 Discovery Miles 5 850
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Trust Management III - Third IFIP WG…
Elena Ferrari, Ninghui Li, … Hardcover R2,692 Discovery Miles 26 920
Designs From Linear Codes
Cunsheng Ding Hardcover R3,986 Discovery Miles 39 860
Identity-Based Encryption
Sanjit Chatterjee, Palash Sarkar Hardcover R2,652 Discovery Miles 26 520

 

Partners