0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (90)
  • R500+ (1,936)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Intelligent Human Computer Interaction - 12th International Conference, IHCI 2020, Daegu, South Korea, November 24-26, 2020,... Intelligent Human Computer Interaction - 12th International Conference, IHCI 2020, Daegu, South Korea, November 24-26, 2020, Proceedings, Part II (Paperback, 1st ed. 2021)
Madhusudan Singh, Dae-Ki Kang, Jong-Ha Lee, Uma Shanker Tiwary, Dhananjay Singh, …
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

The two-volume set LNCS 12615 + 12616 constitutes the refereed proceedings of the 12th International Conference on Intelligent Human Computer Interaction, IHCI 2020, which took place in Daegu, South Korea, during November 24-26, 2020.The 75 full and 18 short papers included in these proceedings were carefully reviewed and selected from a total of 185 submissions. The papers were organized in topical sections named: cognitive modeling and systems; biomedical signal processing and complex problem solving; natural language, speech, voice and study; algorithms and related applications; crowd sourcing and information analysis; intelligent usability and test system; assistive living; image processing and deep learning; and human-centered AI applications.

Smart Card Research and Advanced Applications - 19th International Conference, CARDIS 2020, Virtual Event, November 18-19,... Smart Card Research and Advanced Applications - 19th International Conference, CARDIS 2020, Virtual Event, November 18-19, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Pierre-Yvan Liardet, Nele Mentens
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lubeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.

Security and Privacy in New Computing Environments - Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August... Security and Privacy in New Computing Environments - Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings (Paperback, 1st ed. 2021)
Ding Wang, Weizhi Meng, Jinguang Han
R1,594 Discovery Miles 15 940 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.

Intrusion Detection - A Data Mining Approach (Paperback, 1st ed. 2020): Nandita Sengupta, Jaya Sil Intrusion Detection - A Data Mining Approach (Paperback, 1st ed. 2020)
Nandita Sengupta, Jaya Sil
R4,441 Discovery Miles 44 410 Ships in 10 - 15 working days

This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.

Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2... Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Michael Friedewald, Melek OEnen, Eva Lievens, Stephan Krenn, Samuel Fricker
R1,851 Discovery Miles 18 510 Ships in 10 - 15 working days

This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.

Cyber Security - 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers... Cyber Security - 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, …
R1,413 Discovery Miles 14 130 Ships in 10 - 15 working days

This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.

Multi-Agent-Based Simulation XXI - 21st International Workshop, MABS 2020, Auckland, New Zealand, May 10, 2020,  Revised... Multi-Agent-Based Simulation XXI - 21st International Workshop, MABS 2020, Auckland, New Zealand, May 10, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Samarth Swarup, Bastin Tony Roy Savarimuthu
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Multi-Agent-Based Simulation, MABS 2020, held in Auckland, New Zealand, in May 2020 collocated with 19th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2020). Due to COVID-19 the workshop has been held online. The 9 revised full papers included in this volume were carefully selected from 11 submissions. The workshop focused on finding efficient solutions to model complex social systems, in such areas as economics, management, organizational and social sciences in general and much more.

Cybersecurity in Emerging Digital Era - First International Conference, ICCEDE 2020, Greater Noida, India, October 9-10, 2020,... Cybersecurity in Emerging Digital Era - First International Conference, ICCEDE 2020, Greater Noida, India, October 9-10, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Rajeev Agrawal, Goutam Sanyal, Kevin Curran, Valentina Emilia Balas, Madhu Sharma Gaur
R1,505 Discovery Miles 15 050 Ships in 10 - 15 working days

This book constitutes selected and revised papers from the First International Conference on Cybersecurity in Emerging Digital Era, ICCEDE 2020, held in Greater Noida, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 9 full papers and 2 short papers presented in this volume were thoroughly reviewed and selected from 193 submissions. The papers are organized in topical sections on cyber security issues and challenges in emerging digital era; security resilience in contemporary applications.

Responsible AI and Analytics for an Ethical and Inclusive Digitized Society - 20th IFIP WG 6.11 Conference on e-Business,... Responsible AI and Analytics for an Ethical and Inclusive Digitized Society - 20th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2021, Galway, Ireland, September 1-3, 2021, Proceedings (Paperback, 1st ed. 2021)
Denis Dennehy, Anastasia Griva, Nancy Pouloudi, Yogesh K. Dwivedi, Ilias Pappas, …
R4,848 Discovery Miles 48 480 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 20th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2021, held in Galway, Ireland, in September 2021.* The total of 57 full and 8 short papers presented in these volumes were carefully reviewed and selected from 141 submissions. The papers are organized in the following topical sections: AI for Digital Transformation and Public Good; AI & Analytics Decision Making; AI Philosophy, Ethics & Governance; Privacy & Transparency in a Digitized Society; Digital Enabled Sustainable Organizations and Societies; Digital Technologies and Organizational Capabilities; Digitized Supply Chains; Customer Behavior and E-business; Blockchain; Information Systems Development; Social Media & Analytics; and Teaching & Learning. *The conference was held virtually due to the COVID-19 pandemic.

Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Paperback, 1st ed. 2020): Tuan D. Pham Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Paperback, 1st ed. 2020)
Tuan D. Pham
R2,675 Discovery Miles 26 750 Ships in 10 - 15 working days

This book presents an original combination of three well-known methodological approaches for nonlinear data analysis: recurrence, networks, and fuzzy logic. After basic concepts of these three approaches are introduced, this book presents recently developed methods known as fuzzy recurrence plots and fuzzy recurrence networks. Computer programs written in MATLAB, which implement the basic algorithms, are included to facilitate the understanding of the developed ideas. Several applications of these techniques to biomedical problems, ranging from cancer and neurodegenerative disease to depression, are illustrated to show the potential of fuzzy recurrence methods. This book opens a new door to theorists in complex systems science as well as specialists in medicine, biology, engineering, physics, computer science, geosciences, and social economics to address issues in experimental nonlinear signal and data processing.

Modern Dimension Reduction (Paperback): Philip D. Waggoner Modern Dimension Reduction (Paperback)
Philip D. Waggoner
R548 Discovery Miles 5 480 Ships in 12 - 17 working days

Data are not only ubiquitous in society, but are increasingly complex both in size and dimensionality. Dimension reduction offers researchers and scholars the ability to make such complex, high dimensional data spaces simpler and more manageable. This Element offers readers a suite of modern unsupervised dimension reduction techniques along with hundreds of lines of R code, to efficiently represent the original high dimensional data space in a simplified, lower dimensional subspace. Launching from the earliest dimension reduction technique principal components analysis and using real social science data, I introduce and walk readers through application of the following techniques: locally linear embedding, t-distributed stochastic neighbor embedding (t-SNE), uniform manifold approximation and projection, self-organizing maps, and deep autoencoders. The result is a well-stocked toolbox of unsupervised algorithms for tackling the complexities of high dimensional data so common in modern society. All code is publicly accessible on Github.

Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August... Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Tal Malkin, Chris Peikert
R3,338 Discovery Miles 33 380 Ships in 10 - 15 working days

The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it was an online event in 2021.The 103 full papers presented in the proceedings were carefully reviewed and selected from a total of 426 submissions. The papers are organized in the following topical sections: Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments. Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis. Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing. Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols.

Distributed Computing for Emerging Smart Networks - Second International Workshop, DiCES-N 2020, Bizerte, Tunisia, December 18,... Distributed Computing for Emerging Smart Networks - Second International Workshop, DiCES-N 2020, Bizerte, Tunisia, December 18, 2020, Proceedings (Paperback, 1st ed. 2020)
Imen Jemili, Mohamed Mosbah
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2020, held in Bizerte, Tunisia, in December 2020. Due to the COVID-19 pandemic the conference was held online. The 8 full papers included in this volume were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: intelligent transportation systems; emerging networking technologies; artificial intelligence and internet of things.

Big Data Analytics - 8th International Conference, BDA 2020, Sonepat, India, December 15-18, 2020, Proceedings (Paperback, 1st... Big Data Analytics - 8th International Conference, BDA 2020, Sonepat, India, December 15-18, 2020, Proceedings (Paperback, 1st ed. 2020)
Ladjel Bellatreche, Vikram Goyal, Hamido Fujita, Anirban Mondal, P. Krishna Reddy
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

This book constitutes the proceedings of the 8th International Conference on Big Data Analytics, BDA 2020, which took place during December 15-18, 2020, in Sonepat, India. The 11 full and 3 short papers included in this volume were carefully reviewed and selected from 48 submissions; the book also contains 4 invited and 3 tutorial papers. The contributions were organized in topical sections named as follows: data science systems; data science architectures; big data analytics in healthcare; information interchange of Web data resources; and business analytics.

Digital Forensics and Watermarking - 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25-27, 2020,... Digital Forensics and Watermarking - 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Xianfeng Zhao, Yun Qing Shi, Alessandro Piva, Hyoung Joong Kim
R1,540 Discovery Miles 15 400 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 19th International Workshop on Digital Forensics and Watermarking, IWDW 2020, held in Melbourne, VIC, Australia, in November 2020.The 20 full papers in this volume were carefully reviewed and selected from 43 submissions. They cover topics such as: novel research, development and application of digital watermarking and forensics techniques for multimedia security.

Arithmetic of Finite Fields - 8th International Workshop, WAIFI 2020, Rennes, France, July 6-8, 2020, Revised Selected and... Arithmetic of Finite Fields - 8th International Workshop, WAIFI 2020, Rennes, France, July 6-8, 2020, Revised Selected and Invited Papers (Paperback, 1st ed. 2021)
Jean Claude Bajard, Alev Topuzoglu
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2020, held in Rennes, France in July 2020. Due to the COVID-19, the workshop was held online. The 12 revised full papers and 3 invited talks presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on invited talks, Finite Field Arithmetic, Coding Theory, Network Security and much more.

PRIMA 2020: Principles and Practice of Multi-Agent Systems - 23rd International Conference, Nagoya, Japan, November 18-20,... PRIMA 2020: Principles and Practice of Multi-Agent Systems - 23rd International Conference, Nagoya, Japan, November 18-20, 2020, Proceedings (Paperback, 1st ed. 2021)
Takahiro Uchiya, Quan Bai, Ivan Marsa-Maestre
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 23rd International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2020, held in Nagoya, Japan, in November 2020. The 19 full papers presented and 13 short papers were carefully reviewed and selected from 50 submissions.Due to COVID-19, the conference was held online. The conference covers a wide range of ranging from foundations of agent theory and engineering aspects of agent systems, to emerging interdisciplinary areas of agent-based research.

Cryptography Arithmetic - Algorithms and Hardware Architectures (Paperback, 1st ed. 2020): Amos R. Omondi Cryptography Arithmetic - Algorithms and Hardware Architectures (Paperback, 1st ed. 2020)
Amos R. Omondi
R2,944 Discovery Miles 29 440 Ships in 10 - 15 working days

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic operations: addition, subtraction, multiplication, and division. The second part is on the arithmetic of prime fields. And the third part is on the arithmetic of binary fields. The mathematical fundamentals necessary for the latter two parts are included, as are descriptions of various types of cryptosystems, to provide appropriate context. This book is intended for advanced-level students in Computer Science, Computer Engineering, and Electrical and Electronic Engineering. Practitioners too will find it useful, as will those with a general interest in "hard" applications of mathematics.

Reflections on Artificial Intelligence for Humanity (Paperback, 1st ed. 2021): Bertrand Braunschweig, Malik Ghallab Reflections on Artificial Intelligence for Humanity (Paperback, 1st ed. 2021)
Bertrand Braunschweig, Malik Ghallab
R2,296 Discovery Miles 22 960 Ships in 10 - 15 working days

We already observe the positive effects of AI in almost every field, and foresee its potential to help address our sustainable development goals and the urgent challenges for the preservation of the environment. We also perceive that the risks related to the safety, security, confidentiality, and fairness of AI systems, the threats to free will of possibly manipulative systems, as well as the impact of AI on the economy, employment, human rights, equality, diversity, inclusion, and social cohesion need to be better assessed. The development and use of AI must be guided by principles of social cohesion, environmental sustainability, resource sharing, and inclusion. It has to integrate human rights, and social, cultural, and ethical values of democracy. It requires continued education and training as well as continual assessment of its effects through social deliberation. The "Reflections on AI for Humanity" proposed in this book develop the following issues and sketch approaches for addressing them: How can we ensure the security requirements of critical applications and the safety and confidentiality of data communication and processing? What techniques and regulations for the validation, certification, and audit of AI tools are needed to develop confidence in AI? How can we identify and overcome biases in algorithms? How do we design systems that respect essential human values, ensuring moral equality and inclusion? What kinds of governance mechanisms are needed for personal data, metadata, and aggregated data at various levels? What are the effects of AI and automation on the transformation and social division of labor? What are the impacts on economic structures? What proactive and accommodation measures will be required? How will people benefit from decision support systems and personal digital assistants without the risk of manipulation? How do we design transparent and intelligible procedures and ensure that their functions reflect our values and criteria? How can we anticipate failure and restore human control over an AI system when it operates outside its intended scope? How can we devote a substantial part of our research and development resources to the major challenges of our time such as climate, environment, health, and education?

Ada Lovelace Cracks the Code (Hardcover): Rebel Girls Ada Lovelace Cracks the Code (Hardcover)
Rebel Girls; Edited by Jestine Ware; Illustrated by Marina Muun 1
R303 R254 Discovery Miles 2 540 Save R49 (16%) Ships in 9 - 15 working days

In Ada Lovelace Cracks the Code, Ada uses her incredible imagination to dream up technology that could have jump-started the digital age nearly two hundred years ago. In fact, she writes what will become the world's first programming language. As a child, Ada is curious about everything. She is obsessed with machines and creatures that fly, even going so far as to write her own book about them called "Flyology." Along with her cat, Mistress Puff, Ada gets into all sorts of trouble. According to her mother, Ada is a bit too wild and her imagination could benefit from some discipline, so she puts Ada into a rigorous syllabus of mathematics, languages, and geography. When Ada comes out in London's high society, she is invited to the most popular soiree in town, hosted by the renowned inventor Charles Babbage. It is there that she encounters a mysterious machine which unlocks a future full of possibilities. But she can't escape marriage forever, and soon finds herself a wife with three children. She aches to study math again, to stand on the same ground as the eccentric inventor she met so many years ago. She hires tutors to teach her absolutely everything about math and numbers, before joining Babbage in his mechanical world. This is the story of a pioneer in the computer sciences, which is now a multibillion-dollar industry, but it's also proof that women have the intellectual capacity to make invaluable contributions to the Science Technology Engineering & Math world. Also included is further information on Ada's legacy today and activities based on simple coding and mathematical concepts.

Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December... Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December 17-21, 2020, Proceedings (Paperback, 1st ed. 2020)
Lejla Batina, Stjepan Picek, Mainack Mondal
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020. Due to COVID-19 pandemic, the conference was held virtual. The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020,... Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Diana Maimut, Andrei-George Oprina, Damien Sauveron
R1,546 Discovery Miles 15 460 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020.The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more.

Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020,... Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Sokratis Katsikas, Frederic Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, …
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in Guildford, UK, in September 2020 in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. Due to COVID-19 pandemic the conference was held virtually The CyberICPS Workshop received 21 submissions from which 5 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyberattacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 4 full papers out of 7 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. From the ADIoT Workshop 2 full papers and 2 short papers out of 12 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part I... Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Rafael Pass, Krzysztof Pietrzak
R1,668 Discovery Miles 16 680 Ships in 10 - 15 working days

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.

Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II... Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Rafael Pass, Krzysztof Pietrzak
R1,669 Discovery Miles 16 690 Ships in 10 - 15 working days

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Technical Articles about the Voynich…
National Security Agency Hardcover R593 Discovery Miles 5 930
Bitcoin - Guide Book for Beginners
Keizer Soeze Hardcover R1,181 R970 Discovery Miles 9 700
New Research on the Voynich Manuscript…
National Security Agency Hardcover R526 Discovery Miles 5 260
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R611 R518 Discovery Miles 5 180
Advances in Production Management…
Bojan Lalic, Vidosav Majstorovic, … Hardcover R3,110 Discovery Miles 31 100
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,596 Discovery Miles 25 960
New Frontiers in Cryptography - Quantum…
Khaled Salah Mohamed Hardcover R3,684 Discovery Miles 36 840
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R777 R668 Discovery Miles 6 680
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
Introduction to Bitcoin
David Ricardo Hardcover R765 Discovery Miles 7 650

 

Partners