0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (85)
  • R500+ (1,905)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Blockchain and Trustworthy Systems - Third International Conference, BlockSys 2021, Guangzhou, China, August 5-6, 2021, Revised... Blockchain and Trustworthy Systems - Third International Conference, BlockSys 2021, Guangzhou, China, August 5-6, 2021, Revised Selected Papers (Paperback, 1st ed. 2021)
Hong-Ning Dai, Xuanzhe Liu, Daniel Xiapu Luo, Jiang,Xiao, Xiangping Chen
R2,980 Discovery Miles 29 800 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference papers of the Third International Conference on Blockchain and Trustworthy Systems, Blocksys 2021, held in Guangzhou, China, in August 2021.*The 38 full papers and the 12 short papers were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections: Contents Blockchain and Data Mining; Performance Optimization of Blockchain; Blockchain Security and Privacy; Theories and Algorithms for Blockchain; Blockchain and Internet of Things; Blockchain and Smart Contracts; Blockchain Services and Applications; Trustworthy System Development.*

AI Approaches to the Complexity of Legal Systems XI-XII - AICOL International Workshops 2018 and 2020: AICOL-XI@JURIX 2018,... AI Approaches to the Complexity of Legal Systems XI-XII - AICOL International Workshops 2018 and 2020: AICOL-XI@JURIX 2018, AICOL-XII@JURIX 2020, XAILA@JURIX 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Victor Rodriguez Doncel, Monica Palmirani, Michal Araszkiewicz, Pompeu Casanovas, Ugo Pagallo, …
R2,215 Discovery Miles 22 150 Ships in 18 - 22 working days

This book includes revised selected papers from the International Workshops on AI Approaches to the Complexity of Legal Systems, AICOL-XI@JURIX2018, held in Groningen, The Netherlands, on December 12, 2018; AICOL-XII@JURIX 2020, held in Brno, Czechia, on December 9, 2020; XAILA@JURIX 2020, held in in Brno, Czechia, on December 9, 2020.*The 17 full and 4 short papers included in this volume were carefully reviewed and selected form 39 submissions. They represent a comprehensive picture of the state of the art in legal informatics. The papers are logically organized in 5 blocks: Knowledge Representation; Logic, rules, and reasoning; Explainable AI in Law and Ethics; Law as Web of linked Data and the Rule of Law; Data protection and Privacy Modelling and Reasoning. *Due to the Covid-19 pandemic AICOL-XII@JURIX 2020 and XAILA@JURIX 2020 were held virtually.

Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Mehdi Tibouchi, Huaxiong Wang
R2,768 Discovery Miles 27 680 Ships in 18 - 22 working days

The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptoanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.

Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part IV (Paperback, 1st ed. 2021)
Mehdi Tibouchi, Huaxiong Wang
R3,013 Discovery Miles 30 130 Ships in 18 - 22 working days

The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.

Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II (Paperback, 1st ed. 2021)
Mehdi Tibouchi, Huaxiong Wang
R3,228 Discovery Miles 32 280 Ships in 18 - 22 working days

The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.

Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part III (Paperback, 1st ed. 2021)
Mehdi Tibouchi, Huaxiong Wang
R2,994 Discovery Miles 29 940 Ships in 18 - 22 working days

The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.

Cryptography and Coding - 18th IMA International Conference, IMACC 2021, Virtual Event, December 14-15, 2021, Proceedings... Cryptography and Coding - 18th IMA International Conference, IMACC 2021, Virtual Event, December 14-15, 2021, Proceedings (Paperback, 1st ed. 2021)
Maura B. Paterson
R2,099 Discovery Miles 20 990 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 18th IMA International Conference on Cryptography and Coding, IMACC 2021, held in December 2021. Due to COVID 19 pandemic the conference was held virtually. The 14 papers presented were carefully reviewed and selected from 30 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.

Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Paperback, 1st ed. 2021): Matthew Ryan Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Paperback, 1st ed. 2021)
Matthew Ryan
R4,658 Discovery Miles 46 580 Ships in 18 - 22 working days

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the 'ransomware revolution' after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks. Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.

Sustainable ICT, Education and Learning - IFIP WG 3.4 International Conference, SUZA 2019, Zanzibar, Tanzania, April 25-27,... Sustainable ICT, Education and Learning - IFIP WG 3.4 International Conference, SUZA 2019, Zanzibar, Tanzania, April 25-27, 2019, Revised Selected Papers (Paperback, 1st ed. 2019)
Arthur Tatnall, Nicholas Mavengere
R1,521 Discovery Miles 15 210 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the First IFIP WG 3.4 International Conference on Sustainable ICT, Education, and Learning, SUZA 2019, held in Zanzibar, Tanzania, in April 2019, in conjunction with the 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries. The 27 revised full papers presented in this volume were carefully reviewed and selected from 41 submissions. The papers cover topics such as peer and collaborative learning in informatics; pedagogical approaches to teaching specific informatics courses; workplace learning related to information systems; e-learning; ICTs for development; mobile solutions in learning in the North and South; lifelong learning; applications for disabled students; traversal skills and computational thinking; and teacher education in the global South.

Contact Tracing in Post-Covid World - A Cryptologic Approach (Paperback, 1st ed. 2020): Pranab Chakraborty, Subhamoy Maitra,... Contact Tracing in Post-Covid World - A Cryptologic Approach (Paperback, 1st ed. 2020)
Pranab Chakraborty, Subhamoy Maitra, Mridul Nandi, Suprita Talnikar
R3,294 Discovery Miles 32 940 Ships in 18 - 22 working days

This book is a timely document of state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this topic has recently received attention from governments, industries and academic communities due to the COVID-19 pandemic. This book provides a link between new proposals related to contact tracing applications and a contextual literature review primarily from the cryptologic viewpoint. As these applications are related to security and privacy of individuals, analyzing them from cryptologic viewpoint is of utmost importance. Therefore, present developments from cryptologic aspects of most proposals around the world, including Singapore, Europe, USA, Australia and India, have been discussed. Providing an in-depth study on the design rationale of each protocol, this book is of value to researchers, students and professionals alike.

Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings (Paperback, 1st ed.... Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings (Paperback, 1st ed. 2021)
Nicola Tuveri, Antonis Michalas, Billy Bob Brumley
R1,729 Discovery Miles 17 290 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 26th Nordic Conference on Secure IT Systems, NordSec 2021, which was held online during November 2021.The 11 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: Applied Cryptography, Security in Internet of Things, Machine Learning and Security, Network Security, and Trust.

Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday (Paperback, 1st ed.... Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday (Paperback, 1st ed. 2021)
Daniel Dougherty, Jose Meseguer, Sebastian Alexander Moedersheim, Paul Rowe
R2,012 Discovery Miles 20 120 Ships in 18 - 22 working days

This Festschrift was published in honor of Joshua Guttman on the occasion of his 66.66 birthday. The impact of his work is reflected in the 23 contributions enclosed in this volume. Joshua's most influential and enduring contribution to the field has been the development of the strand space formalism for analyzing cryptographic protocols. It is one of several "symbolic approaches" to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants. His attention to the underlying logic of strand spaces has also allowed him to merge domain-specific reasoning about protocols with general purpose, first-order logical theories. The identification of clear principles in a domain paves the way to automated reasoning, and Joshua has been a leader in the development and distribution of several tools for security analysis.

Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part I... Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Kobbi NIssim, Brent Waters
R3,016 Discovery Miles 30 160 Ships in 18 - 22 working days

The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.

Ubiquitous Networking - 7th International Symposium, UNet 2021, Virtual Event, May 19-22, 2021, Revised Selected Papers... Ubiquitous Networking - 7th International Symposium, UNet 2021, Virtual Event, May 19-22, 2021, Revised Selected Papers (Paperback, 1st ed. 2021)
Halima Elbiaze, Essaid Sabir, Francisco Falcone, Mohamed Sadik, Samson Lasaulce, …
R2,101 Discovery Miles 21 010 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Symposium on Ubiquitous Networking, UNet 2021, held in May 2021. Due to COVID-19 pandemic the conference was held virtually. The 16 revised full papers presented together with 6 invited papers and 3 special sessions were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections: ubiquitous communication technologies and networking; tactile internet and internet of things; mobile edge networking and fog-cloud computing; artificial intelligence-driven communications; and data engineering, cyber security and pervasive services.

Coding Theory - A First Course (Paperback): San Ling, Chaoping Xing Coding Theory - A First Course (Paperback)
San Ling, Chaoping Xing
R1,594 Discovery Miles 15 940 Ships in 10 - 15 working days

Concerned with successfully transmitting data through a noisy channel, coding theory can be applied to electronic engineering and communications. Based on the authors' extensive teaching experience, this text provides a completely modern and accessible course on the subject. It includes sections on linear programming and decoding methods essential for contemporary mathematics. Numerous examples and exercises make the volume ideal for students and instructors.

Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I (Paperback, 1st ed. 2019)
Dongdai Lin, Kazue Sako
R1,962 R1,845 Discovery Miles 18 450 Save R117 (6%) Ships in 9 - 17 working days

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.

Introduction to Privacy Enhancing Technologies - A Classification-Based Approach to Understanding PETs (Paperback, 1st ed.... Introduction to Privacy Enhancing Technologies - A Classification-Based Approach to Understanding PETs (Paperback, 1st ed. 2021)
Carlisle Adams
R1,420 Discovery Miles 14 200 Ships in 18 - 22 working days

This textbook provides a unique lens through which the myriad of existing Privacy Enhancing Technologies (PETs) can be easily comprehended and appreciated. It answers key privacy-centered questions with clear and detailed explanations. Why is privacy important? How and why is your privacy being eroded and what risks can this pose for you? What are some tools for protecting your privacy in online environments? How can these tools be understood, compared, and evaluated? What steps can you take to gain more control over your personal data? This book addresses the above questions by focusing on three fundamental elements: It introduces a simple classification of PETs that allows their similarities and differences to be highlighted and analyzed; It describes several specific PETs in each class, including both foundational technologies and important recent additions to the field; It explains how to use this classification to determine which privacy goals are actually achievable in a given real-world environment. Once the goals are known, this allows the most appropriate PETs to be selected in order to add the desired privacy protection to the target environment. To illustrate, the book examines the use of PETs in conjunction with various security technologies, with the legal infrastructure, and with communication and computing technologies such as Software Defined Networking (SDN) and Machine Learning (ML). Designed as an introductory textbook on PETs, this book is essential reading for graduate-level students in computer science and related fields, prospective PETs researchers, privacy advocates, and anyone interested in technologies to protect privacy in online environments.

Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September... Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II (Paperback, 1st ed. 2021)
Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Herve Debar, Moti Yung
R2,721 Discovery Miles 27 210 Ships in 18 - 22 working days

This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Advanced Research in Technologies, Information, Innovation and Sustainability - First International Conference, ARTIIS 2021, La... Advanced Research in Technologies, Information, Innovation and Sustainability - First International Conference, ARTIIS 2021, La Libertad, Ecuador, November 25-27, 2021, Proceedings (Paperback, 1st ed. 2021)
Teresa Guarda, Filipe Portela, Manuel Filipe Santos
R3,457 Discovery Miles 34 570 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability, ARTIIS 2021, held in La Libertad, Ecuador, in November 2021. The 53 full papers and 2 short contributions were carefully reviewed and selected from 155 submissions. The volume covers a variety of topics, such as computer systems organization, software engineering, information storage and retrieval, computing methodologies, artificial intelligence, and others. The papers are logically organized in the following thematic blocks: Computing Solutions; Data Intelligence; Ethics, Security, and Privacy; Sustainability.

E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online... E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Mohammad S. Obaidat, Jalel Ben-Othman
R2,187 Discovery Miles 21 870 Ships in 18 - 22 working days

The present book includes extended and revised versions of a set of selected papers presented at the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020, held as an online web-based event (due to the COVID-19 pandemic) in July 2020.ICETE 2020 is a joint conference aimed at bringing together researchers, engineers and practitioners interested in information and communication technologies, including data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, and wireless networks and mobile systems.The 10 full papers included in the volume were carefully selected from the 30 submissions accepted to participate in the conference.

Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part II... Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part II (Paperback, 1st ed. 2021)
Kobbi NIssim, Brent Waters
R3,007 Discovery Miles 30 070 Ships in 18 - 22 working days

The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.

Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part III... Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part III (Paperback, 1st ed. 2021)
Kobbi NIssim, Brent Waters
R2,716 Discovery Miles 27 160 Ships in 18 - 22 working days

The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.

Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings... Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings (Paperback, 1st ed. 2021)
Joonsang Baek, Sushmita Ruj
R2,771 Discovery Miles 27 710 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021.The 35 full papers presented were carefully revised and selected from 157 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

Information and Communication Technologies - 9th Conference of Ecuador, TICEC 2021, Guayaquil, Ecuador, November 24-26, 2021,... Information and Communication Technologies - 9th Conference of Ecuador, TICEC 2021, Guayaquil, Ecuador, November 24-26, 2021, Proceedings (Paperback, 1st ed. 2021)
Juan Pablo Salgado Guerrero, Janneth Chicaiza Espinosa, Mariela Cerrada Lozada, Santiago Berrezueta-Guzman
R2,223 Discovery Miles 22 230 Ships in 18 - 22 working days

This book constitutes refereed proceedings of the 9th Conference on Information and Communication Technologies of Ecuador, TICEC 2021, held at the Universidad Politecnica Salesiana (UPS) campus in November 2021. The conference was organized in hybrid mode. The 24 full papers were carefully reviewed and selected from 126 qualified submissions. The papers cover a great variety of topics, such as data mining, neural networks, cyberphysical systems, telemedicine, traffic simulation, geospatial information, human-machine interaction, cloud computing, and others. The contributions are divided into the following thematic blocks: Data Science, ICTs Applications, Industry 4.0, Technology and Environment, Biomedical Sensors and Wearables Systems.

Provable and Practical Security - 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021,... Provable and Practical Security - 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings (Paperback, 1st ed. 2021)
Qiong Huang, Yu Yu
R2,117 Discovery Miles 21 170 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Python Programming For Beginners In 2020…
James Tudor Hardcover R701 Discovery Miles 7 010
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R952 Discovery Miles 9 520
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160

 

Partners