0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (100)
  • R500+ (1,923)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Complexity and Cryptography - An Introduction (Paperback): John Talbot, Dominic Welsh Complexity and Cryptography - An Introduction (Paperback)
John Talbot, Dominic Welsh
R1,391 Discovery Miles 13 910 Ships in 12 - 17 working days

Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics. This book provides that knowledge, combining an informal style with rigorous proofs of the key results to give an accessible introduction. It comes with plenty of examples and exercises (many with hints and solutions), and is based on a highly successful course developed and taught over many years to undergraduate and graduate students in mathematics and computer science.

Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Paperback, 1st ed. 2020): Tuan D. Pham Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Paperback, 1st ed. 2020)
Tuan D. Pham
R2,549 Discovery Miles 25 490 Ships in 10 - 15 working days

This book presents an original combination of three well-known methodological approaches for nonlinear data analysis: recurrence, networks, and fuzzy logic. After basic concepts of these three approaches are introduced, this book presents recently developed methods known as fuzzy recurrence plots and fuzzy recurrence networks. Computer programs written in MATLAB, which implement the basic algorithms, are included to facilitate the understanding of the developed ideas. Several applications of these techniques to biomedical problems, ranging from cancer and neurodegenerative disease to depression, are illustrated to show the potential of fuzzy recurrence methods. This book opens a new door to theorists in complex systems science as well as specialists in medicine, biology, engineering, physics, computer science, geosciences, and social economics to address issues in experimental nonlinear signal and data processing.

Arithmetic of Finite Fields - 8th International Workshop, WAIFI 2020, Rennes, France, July 6-8, 2020, Revised Selected and... Arithmetic of Finite Fields - 8th International Workshop, WAIFI 2020, Rennes, France, July 6-8, 2020, Revised Selected and Invited Papers (Paperback, 1st ed. 2021)
Jean Claude Bajard, Alev Topuzoglu
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2020, held in Rennes, France in July 2020. Due to the COVID-19, the workshop was held online. The 12 revised full papers and 3 invited talks presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on invited talks, Finite Field Arithmetic, Coding Theory, Network Security and much more.

Digital Forensics and Watermarking - 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25-27, 2020,... Digital Forensics and Watermarking - 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Xianfeng Zhao, Yun Qing Shi, Alessandro Piva, Hyoung Joong Kim
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 19th International Workshop on Digital Forensics and Watermarking, IWDW 2020, held in Melbourne, VIC, Australia, in November 2020.The 20 full papers in this volume were carefully reviewed and selected from 43 submissions. They cover topics such as: novel research, development and application of digital watermarking and forensics techniques for multimedia security.

PRIMA 2020: Principles and Practice of Multi-Agent Systems - 23rd International Conference, Nagoya, Japan, November 18-20,... PRIMA 2020: Principles and Practice of Multi-Agent Systems - 23rd International Conference, Nagoya, Japan, November 18-20, 2020, Proceedings (Paperback, 1st ed. 2021)
Takahiro Uchiya, Quan Bai, Ivan Marsa-Maestre
R1,513 Discovery Miles 15 130 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 23rd International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2020, held in Nagoya, Japan, in November 2020. The 19 full papers presented and 13 short papers were carefully reviewed and selected from 50 submissions.Due to COVID-19, the conference was held online. The conference covers a wide range of ranging from foundations of agent theory and engineering aspects of agent systems, to emerging interdisciplinary areas of agent-based research.

Big Data Analytics - 8th International Conference, BDA 2020, Sonepat, India, December 15-18, 2020, Proceedings (Paperback, 1st... Big Data Analytics - 8th International Conference, BDA 2020, Sonepat, India, December 15-18, 2020, Proceedings (Paperback, 1st ed. 2020)
Ladjel Bellatreche, Vikram Goyal, Hamido Fujita, Anirban Mondal, P. Krishna Reddy
R1,488 Discovery Miles 14 880 Ships in 10 - 15 working days

This book constitutes the proceedings of the 8th International Conference on Big Data Analytics, BDA 2020, which took place during December 15-18, 2020, in Sonepat, India. The 11 full and 3 short papers included in this volume were carefully reviewed and selected from 48 submissions; the book also contains 4 invited and 3 tutorial papers. The contributions were organized in topical sections named as follows: data science systems; data science architectures; big data analytics in healthcare; information interchange of Web data resources; and business analytics.

Distributed Computing for Emerging Smart Networks - Second International Workshop, DiCES-N 2020, Bizerte, Tunisia, December 18,... Distributed Computing for Emerging Smart Networks - Second International Workshop, DiCES-N 2020, Bizerte, Tunisia, December 18, 2020, Proceedings (Paperback, 1st ed. 2020)
Imen Jemili, Mohamed Mosbah
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2020, held in Bizerte, Tunisia, in December 2020. Due to the COVID-19 pandemic the conference was held online. The 8 full papers included in this volume were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: intelligent transportation systems; emerging networking technologies; artificial intelligence and internet of things.

Reflections on Artificial Intelligence for Humanity (Paperback, 1st ed. 2021): Bertrand Braunschweig, Malik Ghallab Reflections on Artificial Intelligence for Humanity (Paperback, 1st ed. 2021)
Bertrand Braunschweig, Malik Ghallab
R2,189 Discovery Miles 21 890 Ships in 10 - 15 working days

We already observe the positive effects of AI in almost every field, and foresee its potential to help address our sustainable development goals and the urgent challenges for the preservation of the environment. We also perceive that the risks related to the safety, security, confidentiality, and fairness of AI systems, the threats to free will of possibly manipulative systems, as well as the impact of AI on the economy, employment, human rights, equality, diversity, inclusion, and social cohesion need to be better assessed. The development and use of AI must be guided by principles of social cohesion, environmental sustainability, resource sharing, and inclusion. It has to integrate human rights, and social, cultural, and ethical values of democracy. It requires continued education and training as well as continual assessment of its effects through social deliberation. The "Reflections on AI for Humanity" proposed in this book develop the following issues and sketch approaches for addressing them: How can we ensure the security requirements of critical applications and the safety and confidentiality of data communication and processing? What techniques and regulations for the validation, certification, and audit of AI tools are needed to develop confidence in AI? How can we identify and overcome biases in algorithms? How do we design systems that respect essential human values, ensuring moral equality and inclusion? What kinds of governance mechanisms are needed for personal data, metadata, and aggregated data at various levels? What are the effects of AI and automation on the transformation and social division of labor? What are the impacts on economic structures? What proactive and accommodation measures will be required? How will people benefit from decision support systems and personal digital assistants without the risk of manipulation? How do we design transparent and intelligible procedures and ensure that their functions reflect our values and criteria? How can we anticipate failure and restore human control over an AI system when it operates outside its intended scope? How can we devote a substantial part of our research and development resources to the major challenges of our time such as climate, environment, health, and education?

Cryptography Arithmetic - Algorithms and Hardware Architectures (Paperback, 1st ed. 2020): Amos R. Omondi Cryptography Arithmetic - Algorithms and Hardware Architectures (Paperback, 1st ed. 2020)
Amos R. Omondi
R2,805 Discovery Miles 28 050 Ships in 10 - 15 working days

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic operations: addition, subtraction, multiplication, and division. The second part is on the arithmetic of prime fields. And the third part is on the arithmetic of binary fields. The mathematical fundamentals necessary for the latter two parts are included, as are descriptions of various types of cryptosystems, to provide appropriate context. This book is intended for advanced-level students in Computer Science, Computer Engineering, and Electrical and Electronic Engineering. Practitioners too will find it useful, as will those with a general interest in "hard" applications of mathematics.

Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020,... Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Diana Maimut, Andrei-George Oprina, Damien Sauveron
R1,475 Discovery Miles 14 750 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020.The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more.

Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December... Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December 17-21, 2020, Proceedings (Paperback, 1st ed. 2020)
Lejla Batina, Stjepan Picek, Mainack Mondal
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020. Due to COVID-19 pandemic, the conference was held virtual. The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020,... Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Sokratis Katsikas, Frederic Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, …
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in Guildford, UK, in September 2020 in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. Due to COVID-19 pandemic the conference was held virtually The CyberICPS Workshop received 21 submissions from which 5 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyberattacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 4 full papers out of 7 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. From the ADIoT Workshop 2 full papers and 2 short papers out of 12 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part I... Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Rafael Pass, Krzysztof Pietrzak
R1,594 Discovery Miles 15 940 Ships in 10 - 15 working days

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.

Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II... Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Rafael Pass, Krzysztof Pietrzak
R1,596 Discovery Miles 15 960 Ships in 10 - 15 working days

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.

Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part III... Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part III (Paperback, 1st ed. 2020)
Rafael Pass, Krzysztof Pietrzak
R2,903 Discovery Miles 29 030 Ships in 10 - 15 working days

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.

Information Security Applications - 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26-28, 2020,... Information Security Applications - 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Ilsun You
R1,509 Discovery Miles 15 090 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, WISA 2020, held in Jeju Island, South Korea, in August 2020. The 30 full research papers included in this book were carefully reviewed and selected from 89 submissions. They are organized in the following topical sections: AI Security and Intrusion Detection; Steganography and Malware; Application, System, and Hardware Security; Cryptography; Advances in Network Security and Attack Defense; and Cyber Security.

Advances in Elliptic Curve Cryptography (Paperback, 2Rev ed): Ian F. Blake, Gadiel Seroussi, Nigel P. Smart Advances in Elliptic Curve Cryptography (Paperback, 2Rev ed)
Ian F. Blake, Gadiel Seroussi, Nigel P. Smart
R1,839 Discovery Miles 18 390 Ships in 12 - 17 working days

Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.

Applications and Techniques in Information Security - 11th International Conference, ATIS 2020, Brisbane, QLD, Australia,... Applications and Techniques in Information Security - 11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings (Paperback, 1st ed. 2020)
Lejla Batina, Gang Li
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research.

LATIN 2020: Theoretical Informatics - 14th Latin American Symposium, Sao Paulo, Brazil, January 5-8, 2021, Proceedings... LATIN 2020: Theoretical Informatics - 14th Latin American Symposium, Sao Paulo, Brazil, January 5-8, 2021, Proceedings (Paperback, 1st ed. 2020)
Yoshiharu Kohayakawa, Flavio Keidi Miyazawa
R2,899 Discovery Miles 28 990 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th Latin American Symposium on Theoretical Informatics, LATIN 2020, held in Sao Paulo, Brazil, in January 2021. The 50 full papers presented in this book were carefully reviewed and selected from 136 submissions. The papers are grouped into these topics: approximation algorithms; parameterized algorithms; algorithms and data structures; computational geometry; complexity theory; quantum computing; neural networks and biologically inspired computing; randomization; combinatorics; analytic and enumerative combinatorics; graph theory. Due to the Corona pandemic the event was postponed from May 2020 to January 2021.

Electronic Governance and Open Society: Challenges in Eurasia - 7th International Conference, EGOSE 2020, St. Petersburg,... Electronic Governance and Open Society: Challenges in Eurasia - 7th International Conference, EGOSE 2020, St. Petersburg, Russia, November 18-19, 2020, Proceedings (Paperback, 1st ed. 2020)
Andrei Chugunov, Igor Khodachek, Yuri Misnikov, Dmitrii Trutnev
R1,487 Discovery Miles 14 870 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th Conference on Electronic Governance and Open Society: Challenges in Eurasia, EGOSE 2020, held in St. Petersburg, Russia, in November 2020. The 35 full papers and 5 short papers were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on digital government: services, policies, laws, practices, surveillance; digital society: openness, participation, trust, competences; digital data: data science, methods, modelling, AI, NLP.

Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020,... Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings (Paperback, 1st ed. 2020)
Miroslaw Kutylowski, Jun Zhang, Chao Chen
R2,598 Discovery Miles 25 980 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020. The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions. The selected papers are devoted to topics such as secure operating system architectures, applications programming and security testing, intrusion and attack detection, cybersecurity intelligence, access control, cryptographic techniques, cryptocurrencies, ransomware, anonymity, trust, recommendation systems, as well machine learning problems. Due to the Corona pandemic the event was held virtually.

Information and Cyber Security - 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25-26, 2020, Revised... Information and Cyber Security - 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25-26, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, …
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information Security, ISSA 2020, which was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic.The 10 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers deal with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; and distributed systems security.

Trends in Computational Intelligence, Security and Internet of Things - Third International Conference, ICCISIoT 2020, Tripura,... Trends in Computational Intelligence, Security and Internet of Things - Third International Conference, ICCISIoT 2020, Tripura, India, December 29-30, 2020, Proceedings (Paperback, 1st ed. 2020)
Nirmalya Kar, Ashim Saha, Suman Deb
R1,484 Discovery Miles 14 840 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the Third International Conference on Computational Intelligence, Security and Internet of Things, ICCISIoT 2020, held in Agartala, India, in December 2020. Due to the COVID-19 pandemic the conference was held online. The 23 full papers and 4 short papers were carefully reviewed and selected from 113 submissions. The papers are organised according to the following topics: computational intelligence, security, and internet of things.

Machine Translation - 16th China Conference, CCMT 2020, Hohhot, China, October 10-12, 2020, Revised Selected Papers (Paperback,... Machine Translation - 16th China Conference, CCMT 2020, Hohhot, China, October 10-12, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Junhui Li, Andy Way
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th China Conference on Machine Translation, CCMT 2020, held in Hohhot, China, in October 2020. The 13 papers presented in this volume were carefully reviewed and selected from 78 submissions and focus on all aspects of machine translation, including preprocessing, neural machine translation models, hybrid model, evaluation method, and post-editing.

Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18,... Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, …
R1,488 Discovery Miles 14 880 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy, DETIPS 2020; the First International Workshop on Dependability and Safety of Emerging Cloud and Fog Systems, DeSECSys 2020; Third International Workshop on Multimedia Privacy and Security, MPS 2020; and the Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2020; held in Guildford, UK, in September 2020, in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. A total of 42 papers was submitted. For the DETIPS Workshop 8 regular papers were selected for presentation. Topics of interest address various aspect of the core areas in relation to digital economy. For the DeSECSys Workshop 4 regular papers are included. The workshop had the objective of fostering collaboration and discussion among cyber-security researchers and practitioners to discuss the various facets and trade-o s of cyber security. In particular, applications, opportunities and possible shortcomings of novel security technologies and their integration in emerging application domains. For the MPS Workshop 4 regular papers are presented which cover topics related to the security and privacy of multimedia systems of Internet-based video conferencing systems (e.g., Zoom, Microsoft Teams, Google Meet), online chatrooms (e.g., Slack), as well as other services to support telework capabilities. For the SPOSE Workshop 3 full papers were accepted for publication. They reflect the discussion, exchange, and development of ideas and questions regarding the design and engineering of technical security and privacy mechanisms with particular reference to organizational contexts.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,178 Discovery Miles 11 780
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R639 Discovery Miles 6 390
Bitcoin and Cryptocurrency Technologies…
Keizer Soeze Hardcover R1,968 R1,559 Discovery Miles 15 590
Introduction to Bitcoin
David Ricardo Hardcover R733 Discovery Miles 7 330
Advances in Production Management…
Bojan Lalic, Vidosav Majstorovic, … Hardcover R2,944 Discovery Miles 29 440
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R844 R699 Discovery Miles 6 990
Blockchain 2035 - The Digital DNA of…
Andrew D Knapp, Jared C Tate Hardcover R1,410 Discovery Miles 14 100
Bitcoin - Guide Book for Beginners
Keizer Soeze Hardcover R1,151 R928 Discovery Miles 9 280
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,473 Discovery Miles 24 730
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940

 

Partners