0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (86)
  • R500+ (1,946)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Autonomic Computing in Cloud Resource Management in Industry 4.0 (Paperback, 1st ed. 2021): Tanupriya Choudhury, Bhupesh Kumar... Autonomic Computing in Cloud Resource Management in Industry 4.0 (Paperback, 1st ed. 2021)
Tanupriya Choudhury, Bhupesh Kumar Dewangan, Ravi Tomar, Bhupesh Kumar Singh, Teoh Teik Toe, …
R5,125 Discovery Miles 51 250 Ships in 10 - 15 working days

This book describes the next generation of industry-Industry 4.0-and how it holds the promise of increased flexibility in manufacturing, along with automation, better quality, and improved productivity. The authors discuss how it thus enables companies to cope with the challenges of producing increasingly individualized products with a short lead-time to market and higher quality. The authors posit that intelligent cloud services and resource sharing play an important role in Industry 4.0 anticipated Fourth Industrial Revolution. This book serves the different issues and challenges in cloud resource management CRM techniques with proper propped solution for IT organizations. The book features chapters based on the characteristics of autonomic computing with its applicability in CRM. Each chapter features the techniques and analysis of each mechanism to make better resource management in cloud.

Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach (Paperback, 1st ed. 2021): Maamar Ouladj, Sylvain... Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach (Paperback, 1st ed. 2021)
Maamar Ouladj, Sylvain Guilley
R1,486 Discovery Miles 14 860 Ships in 10 - 15 working days

It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting approaches. It will be useful as a graduate level introduction, also for self-study by researchers and professionals, and the examples are taken from real-world datasets.

Guide to Data Privacy - Models, Technologies, Solutions (Paperback, 1st ed. 2022): Vicenc Torra Guide to Data Privacy - Models, Technologies, Solutions (Paperback, 1st ed. 2022)
Vicenc Torra
R1,287 Discovery Miles 12 870 Ships in 10 - 15 working days

Data privacy technologies are essential for implementing information systems with privacy by design.Privacy technologies clearly are needed for ensuring that data does not lead to disclosure, but also that statistics or even data-driven machine learning models do not lead to disclosure. For example, can a deep-learning model be attacked to discover that sensitive data has been used for its training? This accessible textbook presents privacy models, computational definitions of privacy, and methods to implement them. Additionally, the book explains and gives plentiful examples of how to implement-among other models-differential privacy, k-anonymity, and secure multiparty computation. Topics and features: Provides integrated presentation of data privacy (including tools from statistical disclosure control, privacy-preserving data mining, and privacy for communications) Discusses privacy requirements and tools for different types of scenarios, including privacy for data, for computations, and for users Offers characterization of privacy models, comparing their differences, advantages, and disadvantages Describes some of the most relevant algorithms to implement privacy models Includes examples of data protection mechanisms This unique textbook/guide contains numerous examples and succinctly and comprehensively gathers the relevant information. As such, it will be eminently suitable for undergraduate and graduate students interested in data privacy, as well as professionals wanting a concise overview. Vicenc Torra is Professor with the Department of Computing Science at Umea University, Umea, Sweden.

Personalized Privacy Protection in Big Data (Paperback, 1st ed. 2021): Youyang Qu, Mohammad  Reza Nosouhi, Lei Cui, Shui Yu Personalized Privacy Protection in Big Data (Paperback, 1st ed. 2021)
Youyang Qu, Mohammad Reza Nosouhi, Lei Cui, Shui Yu
R1,849 Discovery Miles 18 490 Ships in 10 - 15 working days

This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.

Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected... Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Ittay Eyal, Juan Garay
R3,249 Discovery Miles 32 490 Ships in 10 - 15 working days

This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.

Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Orr Dunkelman, Stefan Dziembowski
R4,779 Discovery Miles 47 790 Ships in 10 - 15 working days

The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.

Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Orr Dunkelman, Stefan Dziembowski
R3,529 Discovery Miles 35 290 Ships in 10 - 15 working days

The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.

Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Orr Dunkelman, Stefan Dziembowski
R4,757 Discovery Miles 47 570 Ships in 10 - 15 working days

The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.

Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA,... Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Yevgeniy Dodis, Thomas Shrimpton
R1,678 Discovery Miles 16 780 Ships in 10 - 15 working days

The 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures.

Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA,... Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part IV (Paperback, 1st ed. 2022)
Yevgeniy Dodis, Thomas Shrimpton
R1,612 Discovery Miles 16 120 Ships in 10 - 15 working days

The 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures.

Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021,... Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Peter Y. A. Ryan, Cristian Toma
R1,537 Discovery Miles 15 370 Ships in 10 - 15 working days

This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, which was held virtually in November 2021. The 22 full papers included in this book were carefully reviewed and selected from 40 submissions. They deal with emergent topics in security and privacy from different communities.

Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October... Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings (Paperback, 1st ed. 2022)
Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski
R1,546 Discovery Miles 15 460 Ships in 10 - 15 working days

This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022. The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field's foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications.

Human Aspects of IT for the Aged Population. Design, Interaction and Technology Acceptance - 8th International Conference, ITAP... Human Aspects of IT for the Aged Population. Design, Interaction and Technology Acceptance - 8th International Conference, ITAP 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Qin Gao, Jia Zhou
R3,239 Discovery Miles 32 390 Ships in 10 - 15 working days

This two-volume set constitutes the refereed proceedings of the 8th International Conference on Human Aspects of IT for the Aged Population, ITAP 2022, held as part of the 24th International Conference, HCI International 2022, held as a virtual event, during June-July 2022. ITAP 2022 includes a total of 75 papers, which focus on topics related to designing for and with older users, technology acceptance and user experience of older users, use of social media and games by the aging population, as well as applications supporting health, wellbeing, communication, social participation and everyday activities. The papers are divided into the following topical sub-headings. Part I: Aging, Design and Gamification; Mobile, Wearable and Multimodal Interaction for Aging; Aging, Social Media and Digital Literacy; and Technology Acceptance and Adoption: Barriers and Facilitators for Older Adults Part II: Intelligent Environment for Daily Activities Support; Health and Wellbeing Technologies for the Elderly; and Aging, Communication and Social Interaction.

Security in Computer and Information Sciences - Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26,... Security in Computer and Information Sciences - Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Erol Gelenbe, Marija Jankovic, Dionysios Kehagias, Anna Marton, Andras Vilmos
R1,356 Discovery Miles 13 560 Ships in 10 - 15 working days

This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures. This is an open access book.

Partially Homomorphic Encryption (Paperback, 1st ed. 2021): Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger Partially Homomorphic Encryption (Paperback, 1st ed. 2021)
Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger
R3,571 Discovery Miles 35 710 Ships in 10 - 15 working days

This monograph describes and implements partially homomorphic encryption functions using a unified notation. After introducing the appropriate mathematical background, the authors offer a systematic examination of the following known algorithms: Rivest-Shamir-Adleman; Goldwasser-Micali; ElGamal; Benaloh; Naccache-Stern; Okamoto-Uchiyama; Paillier; Damgaard-Jurik; Boneh-Goh-Nissim; and Sander-Young-Yung. Over recent years partially and fully homomorphic encryption algorithms have been proposed and researchers have addressed issues related to their formulation, arithmetic, efficiency and security. Formidable efficiency barriers remain, but we now have a variety of algorithms that can be applied to various private computation problems in healthcare, finance and national security, and studying these functions may help us to understand the difficulties ahead. The book is valuable for researchers and graduate students in Computer Science, Engineering, and Mathematics who are engaged with Cryptology.

Progress in Cryptology - AFRICACRYPT 2022 - 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Fes,... Progress in Cryptology - AFRICACRYPT 2022 - 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18-20, 2022, Proceedings (Paperback, 1st ed. 2022)
Lejla Batina, Joan Daemen
R1,615 Discovery Miles 16 150 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Progress in Cryptology in Africa, AFRICACRYPT 2022, held in Fes, Morocco, from July 18th - 20th, 2022. The 25 papers presented in this book were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on symmetric cryptography; attribute and identity based encryption; symmetric cryptanalysis; post-quantum cryptography; post-quantum (crypt)analysis; side-channel attacks; protocols and foundations; public key (crypt) analysis.

Methods and Applications for Modeling and Simulation of Complex Systems - 20th Asian Simulation Conference, AsiaSim 2021,... Methods and Applications for Modeling and Simulation of Complex Systems - 20th Asian Simulation Conference, AsiaSim 2021, Virtual Event, November 17-20, 2021, Proceedings (Paperback, 1st ed. 2022)
Byeong-Yun Chang, Changbeom Choi
R1,470 Discovery Miles 14 700 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 20th Asian Simulation Conference, AsiaSim 2021, held as a virtual event in November 2021. The 9 full papers presented in this volume were carefully reviewed and selected from 23 submissions. The papers are organized in topical sections on simulation and visualization; modeling and simulation of systems.

Design, User Experience, and Usability: Design for Emotion, Well-being and Health, Learning, and Culture - 11th International... Design, User Experience, and Usability: Design for Emotion, Well-being and Health, Learning, and Culture - 11th International Conference, DUXU 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Marcelo M. Soares, Elizabeth Rosenzweig, Aaron Marcus
R2,696 Discovery Miles 26 960 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Design, User Experience, and Usability, DUXU 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022.The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The DUXU 2022 proceedings comprise three volumes; they were organized in the following topical sections: Part I: Processes, Methods, and Tools for UX Design and Evaluation; User Requirements, Preferences, and UX Influential Factors; Usability, Acceptance, and User Experience Assessment. Part II: Emotion, Motivation, and Persuasion Design; Design for Well-being and Health.- Learning Experience Design; Globalization, Localization, and Culture Issues. Part III: Design Thinking and Philosophy; DUXU Case Studies; Design and User Experience in Emerging Technologies.

Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P,... Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings (Paperback, 1st ed. 2022)
Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, …
R1,623 Discovery Miles 16 230 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops: - AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security - AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security - AIoTS: 4th ACNS Workshop on Artificial Intelligence and Industrial IoT Security - CIMSS: 2nd ACNS Workshop on Critical Infrastructure and Manufacturing System Security - Cloud S&P: 4th ACNS Workshop on Cloud Security and Privacy - SCI: 3rd ACNS Workshop on Secure Cryptographic Implementation - SecMT: 3rd ACNS Workshop on Security in Mobile Technologies - SiMLA: 4th ACNS Workshop on Security in Machine Learning and its Applications

Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September... Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng
R2,765 Discovery Miles 27 650 Ships in 10 - 15 working days

The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.

Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings... Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings (Paperback, 1st ed. 2022)
Jung Hee Cheon, Thomas Johansson
R1,592 Discovery Miles 15 920 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 13th International Conference on post-quantum cryptography, PQCrypto 2022, held in as a Virtual Event in September 2022. The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis. The papers are categorized in the following topical sub-headings: Code-Based Cryptography; Multivariate Cryptography and the MinRank Problem; Quantum Algorithims, Attacks and Models; Implementation and Side Channel Attacks; Isogeny; Lattice-based Cryptography; Cryptanalysis.

Networked Systems - 10th International Conference, NETYS 2022, Virtual Event, May 17-19, 2022, Proceedings (Paperback, 1st ed.... Networked Systems - 10th International Conference, NETYS 2022, Virtual Event, May 17-19, 2022, Proceedings (Paperback, 1st ed. 2022)
Mohammed-Amine Koulali, Mira Mezini
R1,531 Discovery Miles 15 310 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the 10th International Conference on Networked Systems, NETYS 2022, held as virtual event, in May 17-19, 2022. The conference was held virtually due to the COVID-19 crisis.The 18 full papers and 2 short papers presented were carefully reviewed and selected from 100 submissions. The scope of the conference covers all aspects related to the design and the development of these systems, including multi-core architectures, Concurrent and distributed algorithms, parallel/concurrent/distributed programming, distributed databases, big data applications and systems, cloud systems, networks, security, and formal verification. They were organized in topical sections as follows: Distributed System; Networking; Verification; Security.

Digital Business and Intelligent Systems - 15th International Baltic Conference, Baltic DB&IS 2022, Riga, Latvia, July 4-6,... Digital Business and Intelligent Systems - 15th International Baltic Conference, Baltic DB&IS 2022, Riga, Latvia, July 4-6, 2022, Proceedings (Paperback, 1st ed. 2022)
Mirjana Ivanovic, Marite Kirikova, Laila Niedrite
R2,378 Discovery Miles 23 780 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Baltic Conference on Digital Business and Intelligent Systems, Baltic DB&IS 2022, held in Riga, Latvia, in July 2022. The 16 revised full papers and 1 short paper presented were carefully reviewed and selected from 42 submissions. The papers are centered around topics like architectures and quality of information systems, artificial intelligence in information systems, data and knowledge engineering, enterprise and information systems engineering, security of information systems.

Handbook for CTFers (Paperback, 1st ed. 2022): Nu1L Team Handbook for CTFers (Paperback, 1st ed. 2022)
Nu1L Team
R2,781 Discovery Miles 27 810 Ships in 10 - 15 working days

"Handbook for CTFers: Zero to One" was written by the Nu1L team, one of China's top CTF teams. As for Jeopardy-style CTFs, the content in the first 10 chapters of this book not only covers traditional categories of tasks like WEB, PWN and Crypto, but also includes some of the latest hot topics and techniques, such as blockchain. Case studies are provided for all of these types. Onsite Attack-Defend-style CTFs and penetration testing are introduced in Chapter 11 and Chapter 12. In order to help readers gain the most from the book, we have developed the N1Book platform, which addresses practical questions for different task categories. The book offers beginners a reliable, systematic tutorial on CTF competition. At the same time, it includes real case studies and a wealth of our competition experience, making it a valuable asset for experienced CTF players.

Applied Cryptography  and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022,... Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings (Paperback, 1st ed. 2022)
Giuseppe Ateniese, Daniele Venturi
R3,797 Discovery Miles 37 970 Ships in 10 - 15 working days

The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ultra-Wideband, Short-Pulse…
Frank Sabath, Eric L. Mokole Hardcover R7,628 Discovery Miles 76 280
M Programming: A Comprehensive Guide
Richard Walters Paperback R2,252 Discovery Miles 22 520
Recent Advances in Formal Languages and…
Zoltan Esik, Carlos Martin-Vide, … Hardcover R4,418 Discovery Miles 44 180
Problem Solving with C++ - Global…
Walter Savitch Paperback R2,551 Discovery Miles 25 510
The Economics of Public Private…
Darrin Grimsey, Mervyn K. Lewis Hardcover R8,974 Discovery Miles 89 740
Minecraft: Guide to Redstone (Updated)
Mojang AB, The Official Minecraft Team Hardcover R347 R329 Discovery Miles 3 290
A Practical Introduction to Fuzzy Logic…
Luis Arguelles Mendez Hardcover R4,571 R3,715 Discovery Miles 37 150
MEL Scripting for Maya Animators
Mark R. Wilkins, Chris Kazmier Paperback R1,475 Discovery Miles 14 750
Parallel Programming with OpenACC
Rob Farber Paperback R1,183 Discovery Miles 11 830
Dynamics for Engineers
Bichara B. Muvdi, Amir W. Al-Khafaji, … Hardcover R3,205 Discovery Miles 32 050

 

Partners