0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (93)
  • R500+ (1,938)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Reflections on Artificial Intelligence for Humanity (Paperback, 1st ed. 2021): Bertrand Braunschweig, Malik Ghallab Reflections on Artificial Intelligence for Humanity (Paperback, 1st ed. 2021)
Bertrand Braunschweig, Malik Ghallab
R2,296 Discovery Miles 22 960 Ships in 10 - 15 working days

We already observe the positive effects of AI in almost every field, and foresee its potential to help address our sustainable development goals and the urgent challenges for the preservation of the environment. We also perceive that the risks related to the safety, security, confidentiality, and fairness of AI systems, the threats to free will of possibly manipulative systems, as well as the impact of AI on the economy, employment, human rights, equality, diversity, inclusion, and social cohesion need to be better assessed. The development and use of AI must be guided by principles of social cohesion, environmental sustainability, resource sharing, and inclusion. It has to integrate human rights, and social, cultural, and ethical values of democracy. It requires continued education and training as well as continual assessment of its effects through social deliberation. The "Reflections on AI for Humanity" proposed in this book develop the following issues and sketch approaches for addressing them: How can we ensure the security requirements of critical applications and the safety and confidentiality of data communication and processing? What techniques and regulations for the validation, certification, and audit of AI tools are needed to develop confidence in AI? How can we identify and overcome biases in algorithms? How do we design systems that respect essential human values, ensuring moral equality and inclusion? What kinds of governance mechanisms are needed for personal data, metadata, and aggregated data at various levels? What are the effects of AI and automation on the transformation and social division of labor? What are the impacts on economic structures? What proactive and accommodation measures will be required? How will people benefit from decision support systems and personal digital assistants without the risk of manipulation? How do we design transparent and intelligible procedures and ensure that their functions reflect our values and criteria? How can we anticipate failure and restore human control over an AI system when it operates outside its intended scope? How can we devote a substantial part of our research and development resources to the major challenges of our time such as climate, environment, health, and education?

Ada Lovelace Cracks the Code (Hardcover): Rebel Girls Ada Lovelace Cracks the Code (Hardcover)
Rebel Girls; Edited by Jestine Ware; Illustrated by Marina Muun 1
R303 R254 Discovery Miles 2 540 Save R49 (16%) Ships in 9 - 15 working days

In Ada Lovelace Cracks the Code, Ada uses her incredible imagination to dream up technology that could have jump-started the digital age nearly two hundred years ago. In fact, she writes what will become the world's first programming language. As a child, Ada is curious about everything. She is obsessed with machines and creatures that fly, even going so far as to write her own book about them called "Flyology." Along with her cat, Mistress Puff, Ada gets into all sorts of trouble. According to her mother, Ada is a bit too wild and her imagination could benefit from some discipline, so she puts Ada into a rigorous syllabus of mathematics, languages, and geography. When Ada comes out in London's high society, she is invited to the most popular soiree in town, hosted by the renowned inventor Charles Babbage. It is there that she encounters a mysterious machine which unlocks a future full of possibilities. But she can't escape marriage forever, and soon finds herself a wife with three children. She aches to study math again, to stand on the same ground as the eccentric inventor she met so many years ago. She hires tutors to teach her absolutely everything about math and numbers, before joining Babbage in his mechanical world. This is the story of a pioneer in the computer sciences, which is now a multibillion-dollar industry, but it's also proof that women have the intellectual capacity to make invaluable contributions to the Science Technology Engineering & Math world. Also included is further information on Ada's legacy today and activities based on simple coding and mathematical concepts.

Information and Cyber Security - 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25-26, 2020, Revised... Information and Cyber Security - 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25-26, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, …
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information Security, ISSA 2020, which was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic.The 10 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers deal with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; and distributed systems security.

Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December... Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December 17-21, 2020, Proceedings (Paperback, 1st ed. 2020)
Lejla Batina, Stjepan Picek, Mainack Mondal
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020. Due to COVID-19 pandemic, the conference was held virtual. The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Data and Applications Security and Privacy XXXV - 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20,... Data and Applications Security and Privacy XXXV - 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings (Paperback, 1st ed. 2021)
Ken Barker, Kambiz Ghazinour
R1,577 Discovery Miles 15 770 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2021, held in Calgary, Canada, in July 2021.*The 15 full papers and 8 short papers presented were carefully reviewed and selected from 45 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named differential privacy, cryptology, machine learning, access control and others. *The conference was held virtually due to the COVID-19 pandemic.

Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020,... Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Sokratis Katsikas, Frederic Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, …
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in Guildford, UK, in September 2020 in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. Due to COVID-19 pandemic the conference was held virtually The CyberICPS Workshop received 21 submissions from which 5 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyberattacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 4 full papers out of 7 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. From the ADIoT Workshop 2 full papers and 2 short papers out of 12 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part I... Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Rafael Pass, Krzysztof Pietrzak
R1,668 Discovery Miles 16 680 Ships in 10 - 15 working days

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.

Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA,... Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part III... Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part III (Paperback, 1st ed. 2020)
Rafael Pass, Krzysztof Pietrzak
R3,045 Discovery Miles 30 450 Ships in 10 - 15 working days

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.

Information Security Applications - 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26-28, 2020,... Information Security Applications - 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Ilsun You
R1,581 Discovery Miles 15 810 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, WISA 2020, held in Jeju Island, South Korea, in August 2020. The 30 full research papers included in this book were carefully reviewed and selected from 89 submissions. They are organized in the following topical sections: AI Security and Intrusion Detection; Steganography and Malware; Application, System, and Hardware Security; Cryptography; Advances in Network Security and Attack Defense; and Cyber Security.

Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Shiho Moriai, Huaxiong Wang
R3,089 Discovery Miles 30 890 Ships in 10 - 15 working days

The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

Applications and Techniques in Information Security - 11th International Conference, ATIS 2020, Brisbane, QLD, Australia,... Applications and Techniques in Information Security - 11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings (Paperback, 1st ed. 2020)
Lejla Batina, Gang Li
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research.

Electronic Governance and Open Society: Challenges in Eurasia - 7th International Conference, EGOSE 2020, St. Petersburg,... Electronic Governance and Open Society: Challenges in Eurasia - 7th International Conference, EGOSE 2020, St. Petersburg, Russia, November 18-19, 2020, Proceedings (Paperback, 1st ed. 2020)
Andrei Chugunov, Igor Khodachek, Yuri Misnikov, Dmitrii Trutnev
R1,558 Discovery Miles 15 580 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th Conference on Electronic Governance and Open Society: Challenges in Eurasia, EGOSE 2020, held in St. Petersburg, Russia, in November 2020. The 35 full papers and 5 short papers were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on digital government: services, policies, laws, practices, surveillance; digital society: openness, participation, trust, competences; digital data: data science, methods, modelling, AI, NLP.

Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18,... Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, …
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy, DETIPS 2020; the First International Workshop on Dependability and Safety of Emerging Cloud and Fog Systems, DeSECSys 2020; Third International Workshop on Multimedia Privacy and Security, MPS 2020; and the Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2020; held in Guildford, UK, in September 2020, in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. A total of 42 papers was submitted. For the DETIPS Workshop 8 regular papers were selected for presentation. Topics of interest address various aspect of the core areas in relation to digital economy. For the DeSECSys Workshop 4 regular papers are included. The workshop had the objective of fostering collaboration and discussion among cyber-security researchers and practitioners to discuss the various facets and trade-o s of cyber security. In particular, applications, opportunities and possible shortcomings of novel security technologies and their integration in emerging application domains. For the MPS Workshop 4 regular papers are presented which cover topics related to the security and privacy of multimedia systems of Internet-based video conferencing systems (e.g., Zoom, Microsoft Teams, Google Meet), online chatrooms (e.g., Slack), as well as other services to support telework capabilities. For the SPOSE Workshop 3 full papers were accepted for publication. They reflect the discussion, exchange, and development of ideas and questions regarding the design and engineering of technical security and privacy mechanisms with particular reference to organizational contexts.

Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020,... Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings (Paperback, 1st ed. 2020)
Miroslaw Kutylowski, Jun Zhang, Chao Chen
R2,725 Discovery Miles 27 250 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020. The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions. The selected papers are devoted to topics such as secure operating system architectures, applications programming and security testing, intrusion and attack detection, cybersecurity intelligence, access control, cryptographic techniques, cryptocurrencies, ransomware, anonymity, trust, recommendation systems, as well machine learning problems. Due to the Corona pandemic the event was held virtually.

Communication Technologies for Vehicles - 15th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2020, Bordeaux,... Communication Technologies for Vehicles - 15th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2020, Bordeaux, France, November 16-17, 2020, Proceedings (Paperback, 1st ed. 2020)
Francine Krief, Hasnaa Aniss, Leo Mendiboure, Serge Chaumette, Marion Berbineau
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2020, held in Bordeaux, France, in November 2020. The 18 full papers were carefully reviewed and selected from 22 submissions. The selected papers present orig-inal research results in areas related to the physical layer, communication protocols and standards, mobility and traffic models, experimental and field operational testing, and performance analysis.

Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected... Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Harley Eades III, Olga Gadyatskaya
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the proceedings of the 7th International Workshop on Graphical Models for Security, GramSec 2020, which took place on June 22, 2020. The workshop was planned to take place in Boston, MA, USA but changed to a virtual format due to the COVID-19 pandemic. The 7 full and 3 short papers presented in this volume were carefully reviewed and selected from 14 submissions. The papers were organized in topical sections named: attack trees; attacks and risks modelling and visualization; and models for reasoning about security.

Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020,... Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang
R3,530 Discovery Miles 35 300 Ships in 10 - 15 working days

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.

Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020,... Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang
R3,042 Discovery Miles 30 420 Ships in 10 - 15 working days

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.

Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 20th International Conference, NEW2AN 2020, and... Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 20th International Conference, NEW2AN 2020, and 13th Conference, ruSMART 2020, St. Petersburg, Russia, August 26-28, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Olga Galinina, Sergey Andreev, Sergey Balandin, Yevgeni Koucheryavy
R1,593 Discovery Miles 15 930 Ships in 10 - 15 working days

This book constitutes the joint refereed proceedings of the 20th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2020, and the 13th Conference on Internet of Things and Smart Spaces, ruSMART 2020. The conference was held virtually due to the COVID-19 pandemic.The 79 revised full papers presented were carefully reviewed and selected from 225 submissions. The papers of NEW2AN address various aspects of next-generation data networks, with special attention to advanced wireless networking and applications. In particular, they deal with novel and innovative approaches to performance and efficiency analysis of 5G and beyond systems, employed game-theoretical formulations, advanced queuing theory, and stochastic geometry, while also covering the Internet of Things, cyber security, optics, signal processing, as well as business aspects. ruSMART 2020, provides a forum for academic and industrial researchers to discuss new ideas and trends in the emerging areas.

Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 20th International Conference, NEW2AN 2020, and... Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 20th International Conference, NEW2AN 2020, and 13th Conference, ruSMART 2020, St. Petersburg, Russia, August 26-28, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Olga Galinina, Sergey Andreev, Sergey Balandin, Yevgeni Koucheryavy
R1,591 Discovery Miles 15 910 Ships in 10 - 15 working days

This book constitutes the joint refereed proceedings of the 20th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2020, and the 13th Conference on Internet of Things and Smart Spaces, ruSMART 2020. The conference was held virtually due to the COVID-19 pandemic.The 79 revised full papers presented were carefully reviewed and selected from 225 submissions. The papers of NEW2AN address various aspects of next-generation data networks, with special attention to advanced wireless networking and applications. In particular, they deal with novel and innovative approaches to performance and efficiency analysis of 5G and beyond systems, employed game-theoretical formulations, advanced queuing theory, and stochastic geometry, while also covering the Internet of Things, cyber security, optics, signal processing, as well as business aspects. ruSMART 2020, provides a forum for academic and industrial researchers to discuss new ideas and trends in the emerging areas.

Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II... Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Rafael Pass, Krzysztof Pietrzak
R1,669 Discovery Miles 16 690 Ships in 10 - 15 working days

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.

Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings... Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings (Paperback, 1st ed. 2020)
Salil Kanhere, Vishwas T Patil, Shamik Sural, Manoj S Gaur
R2,301 Discovery Miles 23 010 Ships in 10 - 15 working days

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020.The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.

Progress in Cryptology -  INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December... Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings (Paperback, 1st ed. 2020)
Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran
R3,117 Discovery Miles 31 170 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 21st International Conference on Cryptology in India, INDOCRYPT 2020, held in Bangalore, India, in December 2020.The 39 full papers presented together with 3 invited abstracts in this book were carefully reviewed and selected from 84 submissions. Apart from its traditional focus on areas in applied and theoretical cryptology, this year INDOCRYPT solicited papers in the area of Formal Methods for Cryptographic Systems as well and much more.

LATIN 2020: Theoretical Informatics - 14th Latin American Symposium, Sao Paulo, Brazil, January 5-8, 2021, Proceedings... LATIN 2020: Theoretical Informatics - 14th Latin American Symposium, Sao Paulo, Brazil, January 5-8, 2021, Proceedings (Paperback, 1st ed. 2020)
Yoshiharu Kohayakawa, Flavio Keidi Miyazawa
R3,040 Discovery Miles 30 400 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th Latin American Symposium on Theoretical Informatics, LATIN 2020, held in Sao Paulo, Brazil, in January 2021. The 50 full papers presented in this book were carefully reviewed and selected from 136 submissions. The papers are grouped into these topics: approximation algorithms; parameterized algorithms; algorithms and data structures; computational geometry; complexity theory; quantum computing; neural networks and biologically inspired computing; randomization; combinatorics; analytic and enumerative combinatorics; graph theory. Due to the Corona pandemic the event was postponed from May 2020 to January 2021.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
New Research on the Voynich Manuscript…
National Security Agency Hardcover R526 Discovery Miles 5 260
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
Bitcoin and Cryptocurrency Technologies…
Keizer Soeze Hardcover R2,020 R1,631 Discovery Miles 16 310
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R777 R668 Discovery Miles 6 680
Coding Strategies in Vertebrate Acoustic…
Thierry Aubin, Nicolas Mathevon Hardcover R5,155 Discovery Miles 51 550
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R969 Discovery Miles 9 690
Ransomware Revolution: The Rise of a…
Matthew Ryan Hardcover R5,138 Discovery Miles 51 380
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R867 R731 Discovery Miles 7 310
The Economics of Blockchain and…
James L. Caton Hardcover R2,965 Discovery Miles 29 650
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,596 Discovery Miles 25 960

 

Partners