0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (87)
  • R500+ (1,898)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

The Truth Machine - The Blockchain and the Future of Everything (Paperback): Paul Vigna, Michael J. Casey The Truth Machine - The Blockchain and the Future of Everything (Paperback)
Paul Vigna, Michael J. Casey 1
R421 R396 Discovery Miles 3 960 Save R25 (6%) Ships in 18 - 22 working days
ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September... ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings (Hardcover, 1st ed. 2020)
Marko Hoelbl, Kai Rannenberg, Tatjana Welzer
R3,179 Discovery Miles 31 790 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 29 full papers presented were carefully reviewed and selected from 149 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on channel attacks; connection security; human aspects of security and privacy; detecting malware and software weaknesses; system security; network security and privacy; access control and authentication; crypto currencies; privacy and security management; and machine learning and security.

Protocols for Authentication and Key Establishment (Hardcover, 2003 ed.): Colin Boyd, Anish Mathuria Protocols for Authentication and Key Establishment (Hardcover, 2003 ed.)
Colin Boyd, Anish Mathuria
R2,685 Discovery Miles 26 850 Ships in 18 - 22 working days

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Compressed Sensing and its Applications - Second International MATHEON Conference 2015 (Hardcover, 1st ed. 2017): Holger Boche,... Compressed Sensing and its Applications - Second International MATHEON Conference 2015 (Hardcover, 1st ed. 2017)
Holger Boche, Giuseppe Caire, Robert Calderbank, Maximilian Marz, Gitta Kutyniok, …
R2,743 Discovery Miles 27 430 Ships in 18 - 22 working days

This contributed volume contains articles written by the plenary and invited speakers from the second international MATHEON Workshop 2015 that focus on applications of compressed sensing. Article authors address their techniques for solving the problems of compressed sensing, as well as connections to related areas like detecting community-like structures in graphs, curbatures on Grassmanians, and randomized tensor train singular value decompositions. Some of the novel applications covered include dimensionality reduction, information theory, random matrices, sparse approximation, and sparse recovery. This book is aimed at both graduate students and researchers in the areas of applied mathematics, computer science, and engineering, as well as other applied scientists exploring the potential applications for the novel methodology of compressed sensing. An introduction to the subject of compressed sensing is also provided for researchers interested in the field who are not as familiar with it.

Adaptive Inventories - A Practical Guide for Applied Researchers (Paperback): Jacob M. Montgomery, Erin L. Rossiter Adaptive Inventories - A Practical Guide for Applied Researchers (Paperback)
Jacob M. Montgomery, Erin L. Rossiter
R585 Discovery Miles 5 850 Ships in 10 - 15 working days

The goal of this Element is to provide a detailed introduction to adaptive inventories, an approach to making surveys adjust to respondents' answers dynamically. This method can help survey researchers measure important latent traits or attitudes accurately while minimizing the number of questions respondents must answer. The Element provides both a theoretical overview of the method and a suite of tools and tricks for integrating it into the normal survey process. It also provides practical advice and direction on how to calibrate, evaluate, and field adaptive batteries using example batteries that measure variety of latent traits of interest to survey researchers across the social sciences.

Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D -... Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D - 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1-3, 2019, Proceedings, Part I (Hardcover, 1st ed. 2019)
Petter Nielsen, Honest Christopher Kimaro
R2,820 Discovery Miles 28 200 Ships in 18 - 22 working days

The two volumes IFIP AICT 551 and 552 constitute the refereed proceedings of the 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, held in Dar es Salaam, Tanzania, in May 2019. The 97 revised full papers and 2 short papers presented were carefully reviewed and selected from 185 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: communities, ICT-enabled networks, and development; digital platforms for development; ICT for displaced population and refugees. How it helps? How it hurts?; ICT4D for the indigenous, by the indigenous and of the indigenous; local technical papers; pushing the boundaries - new research methods, theory and philosophy in ICT4D; southern-driven human-computer interaction; sustainable ICT, informatics, education and learning in a turbulent world - "doing the safari way".

Delusions of Intelligence - Enigma, Ultra, and the End of Secure Ciphers (Paperback): R.A. Ratcliff Delusions of Intelligence - Enigma, Ultra, and the End of Secure Ciphers (Paperback)
R.A. Ratcliff
R797 Discovery Miles 7 970 Ships in 10 - 15 working days

In 1974, the British government admitted that its WWII secret intelligence organization had read Germany's ciphers on a massive scale. The intelligence from these decrypts influenced the Atlantic, the Eastern Front and Normandy. Why did the Germans never realize the Allies had so thoroughly penetrated their communications? As German intelligence experts conducted numerous internal investigations that all certified their ciphers' security, the Allies continued to break more ciphers and plugged their own communication leaks. How were the Allies able to so thoroughly exploit Germany's secret messages? How did they keep their tremendous success a secret? What flaws in Germany's organization allowed this counterintelligence failure and how can today's organizations learn to avoid similar disasters? This book, the first comparative study of WWII SIGINT (Signals Intelligence), analyzes the characteristics that allowed the Allies SIGINT success and that fostered the German blindness to Enigma's compromise.

Cryptology - Classical and Modern (Paperback, 2nd edition): Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon Cryptology - Classical and Modern (Paperback, 2nd edition)
Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill

Cryptology For Engineers: An Application-oriented Mathematical Introduction (Hardcover): Robert Schmied Cryptology For Engineers: An Application-oriented Mathematical Introduction (Hardcover)
Robert Schmied
R2,426 Discovery Miles 24 260 Ships in 18 - 22 working days

Cryptology is increasingly becoming one of the most essential topics of interest in everyday life. Digital communication happens by transferring data between at least two participants - But do we want to disclose private information while executing a sensitive bank transfer? How about allowing third-party entities to eavesdrop on private calls while performing an important secret business discussion? Do we want to allow ambient communication concerning us to be manipulated while control software is driving our autonomous car along a steep slope? Questions like these make it clear why issues of security are a great concern in our increasingly augmented world.Cryptology for Engineers is a study of digital security in communications systems. The book covers the cryptographical functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' requirements on the other. Numerous examples computable by hand or with a small additional cost in most cases are provided inside.

Strongly Regular Graphs (Hardcover, New Ed): Andries E. Brouwer, H. van Maldeghem Strongly Regular Graphs (Hardcover, New Ed)
Andries E. Brouwer, H. van Maldeghem
R4,050 R3,610 Discovery Miles 36 100 Save R440 (11%) Ships in 10 - 15 working days

Strongly regular graphs lie at the intersection of statistical design, group theory, finite geometry, information and coding theory, and extremal combinatorics. This monograph collects all the major known results together for the first time in book form, creating an invaluable text that researchers in algebraic combinatorics and related areas will refer to for years to come. The book covers the theory of strongly regular graphs, polar graphs, rank 3 graphs associated to buildings and Fischer groups, cyclotomic graphs, two-weight codes and graphs related to combinatorial configurations such as Latin squares, quasi-symmetric designs and spherical designs. It gives the complete classification of rank 3 graphs, including some new constructions. More than 100 graphs are treated individually. Some unified and streamlined proofs are featured, along with original material including a new approach to the (affine) half spin graphs of rank 5 hyperbolic polar spaces.

Computational Cryptography - Algorithmic Aspects of Cryptology (Paperback): Joppe Bos, Martijn Stam Computational Cryptography - Algorithmic Aspects of Cryptology (Paperback)
Joppe Bos, Martijn Stam
R2,338 Discovery Miles 23 380 Ships in 10 - 15 working days

The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra-Lenstra-Lovasz lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.

Introduction to Cryptography (Hardcover): Joey Holland Introduction to Cryptography (Hardcover)
Joey Holland
R3,047 R2,762 Discovery Miles 27 620 Save R285 (9%) Ships in 18 - 22 working days
Forward Error Correction via Channel Coding (Hardcover, 1st ed. 2020): Orhangazi Forward Error Correction via Channel Coding (Hardcover, 1st ed. 2020)
Orhangazi
R2,691 Discovery Miles 26 910 Ships in 18 - 22 working days

This book provides a comprehensive explanation of forward error correction, which is a vital part of communication systems. The book is written in such a way to make the subject easy and understandable for the reader. The book starts with a review of linear algebra to provide a basis for the text. The author then goes on to cover linear block codes, syndrome error correction, cyclic codes, Galois fields, BCH codes, Reed Solomon codes, and convolutional codes. Examples are provided throughout the text.

Blockchain - Una Guia Esencial Para Principiantes Para Comprender La Tecnologia Blockchain, Criptomonedas, Bitcoin y el Futuro... Blockchain - Una Guia Esencial Para Principiantes Para Comprender La Tecnologia Blockchain, Criptomonedas, Bitcoin y el Futuro del Dinero (Spanish Edition) (Spanish, Hardcover)
Herbert Jones
R657 R586 Discovery Miles 5 860 Save R71 (11%) Ships in 18 - 22 working days
Blockchain Technology - From Theory to Practice (Hardcover, 1st ed. 2022): Sudeep Tanwar Blockchain Technology - From Theory to Practice (Hardcover, 1st ed. 2022)
Sudeep Tanwar
R2,760 Discovery Miles 27 600 Ships in 10 - 15 working days

Blockchain is an emerging technology platform for developing decentralized applications and data storage, over and beyond its role as the technology underlying the cryptocurrencies. The basic tenet of this platform is that it allows one to create a distributed and replicated ledger of events, transactions, and data generated through various IT processes with strong cryptographic guarantees of tamper resistance, immutability, and verifiability. Public blockchain platforms allow us to guarantee these properties with overwhelming probabilities even when untrusted users are participants of distributed applications with the ability to transact on the platform. Even though, blockchain technology has become popularly known because of its use in the implementation of cryptocurrencies such as BitCoin, Ethereum, etc.; the technology itself holds much more promise in various areas such as time stamping, logging of critical events in a system, recording of transactions, trustworthy e-governance, etc. It introduces theoretical and practical aspects of blockchain technology. The book includes an in-depth insight into the need for decentralization, smart contracts, consensus both permissioned and permissionless, and various blockchain development frameworks, tools, and platforms. It can be used as a learning resource for various examinations and certifications related to cryptocurrency and blockchain technology. This book explained the nuts and bolts of blockchain technology in lucid language to make students more familiar with the implementation perspective of this much-needed technology.

Modern Dimension Reduction (Paperback): Philip D. Waggoner Modern Dimension Reduction (Paperback)
Philip D. Waggoner
R586 Discovery Miles 5 860 Ships in 10 - 15 working days

Data are not only ubiquitous in society, but are increasingly complex both in size and dimensionality. Dimension reduction offers researchers and scholars the ability to make such complex, high dimensional data spaces simpler and more manageable. This Element offers readers a suite of modern unsupervised dimension reduction techniques along with hundreds of lines of R code, to efficiently represent the original high dimensional data space in a simplified, lower dimensional subspace. Launching from the earliest dimension reduction technique principal components analysis and using real social science data, I introduce and walk readers through application of the following techniques: locally linear embedding, t-distributed stochastic neighbor embedding (t-SNE), uniform manifold approximation and projection, self-organizing maps, and deep autoencoders. The result is a well-stocked toolbox of unsupervised algorithms for tackling the complexities of high dimensional data so common in modern society. All code is publicly accessible on Github.

Investigating Cryptocurrencies - Understanding, Extracting, and Analyzing Blockchain Evidence (Paperback): N Furneaux Investigating Cryptocurrencies - Understanding, Extracting, and Analyzing Blockchain Evidence (Paperback)
N Furneaux
R1,350 R1,113 Discovery Miles 11 130 Save R237 (18%) Ships in 18 - 22 working days

Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators. Investigating Cryptocurrencies is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum. Understand blockchain and transaction technologies Set up and run cryptocurrency accounts Build information about specific addresses Access raw data on blockchain ledgers Identify users of cryptocurrencies Extracting cryptocurrency data from live and imaged computers Following the money With nearly $150 billion in cryptocurrency circulating and $3 billion changing hands daily, crimes committed with or paid for with digital cash are a serious business. Luckily, Investigating Cryptocurrencies Forensics shows you how to detect it and, more importantly, stop it in its tracks.

Understanding Cryptography (Hardcover): Ethan Scott Understanding Cryptography (Hardcover)
Ethan Scott
R3,191 R2,889 Discovery Miles 28 890 Save R302 (9%) Ships in 18 - 22 working days
Communication Networks for Smart Grids - Making Smart Grid Real (Hardcover, 2014 ed.): Kenneth C. Budka, Jayant G. Deshpande,... Communication Networks for Smart Grids - Making Smart Grid Real (Hardcover, 2014 ed.)
Kenneth C. Budka, Jayant G. Deshpande, Marina Thottan
R2,713 Discovery Miles 27 130 Ships in 18 - 22 working days

A 21st century clean energy economy demands a 21st century electricity grid, yet the communication networks of many utilities today are ill-equipped for smart grid evolution.

This must-read text/reference presents an application-centric approach to the development of smart grid communication architecture and network transformation. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response, and synchrophasors as well as more traditional utility applications like SCADA systems. Providing detailed insights derived from the authors pivotal research on smart grid communications and extensive consulting experience, the book explains how electric power companies can transform their networks to best meet the challenges of tomorrow s smart grids.

Topics and features: examines a range of exciting utility applications made possible through smart grid evolution; describes the core-edge network architecture for smart grids, introducing the concept of wide area and field area networks (WANs and FANs); explains how the network design paradigm for smart grids differs from that for more established data networks, and discusses network security in smart grids; provides an overview of communication network technologies for WANs and FANs, covering OPGW, PLC, and LTE and MPLS technology; investigates secure data-centric data management and data analytics for smart grids; discusses the transformation of a network from conventional modes of utility operation to an integrated network based on the smart grid architecture framework.This comprehensive and practical guide will be of great interest to all professionals engaged in the planning, operation, and regulation of smart grids. Students studying courses on smart grids will also find the book to be an invaluable resource."

E-Government, E-Services and Global Processes - Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010,... E-Government, E-Services and Global Processes - Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, 2010 ed.)
Marijn Janssen, Winfried Lamersdorf, Jan Pries-Heje, Michael Rosemann
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

This book contains the proceedings of two of the IFIP conferences that took place at the IFIP World Computer Congress 2010 in Brisbane, Australia. The proceedings of each conference are allocated separate parts in this book each with their own editors. E-Government and E-Services (EGES) page 3 Marijn Janssen / Winfried Lamersdorf Global Information Systems Processes (GISP) page 183 Jan Pries-Heje / Michael Rosemann Organization E-Government and E-Services (EGES 2010) EGES Co-chairs Marijn Janssen Delft, The Netherlands Winfried Lamersdorf Hamburg, Germany Lalit Sawhney Bangalore, India Leon Strous Helmond, The Netherlands EGES Reviewers Agarwal Ashok ACS Technologies Ltd., Bhoopal, India Mark Borman University of Sydney, Australia Erwin Fielt Queensland University of Technology, Brisbane, Australia Ernest Foo Queensland University of Technology, Brisbane, Australia M.P. Gupta Indian Institute of Technology Delhi, India Paul Henman The University of Queensland, Australia Ralf Klischewski German University, Cairo, Egypt Christine Leitner Donau-Universit. at Krems, Austria Miriam Lips Victoria University of Wellington, New Zealand Zoran Milosevic Deontic, Brisbane, Australia Oystein Sabo University of Agder, Norway Jochen Scholl University of Washington, Seattle, USA Leif Skiftenes University of Agder, Norway Weerakoddy Vishanth Brunel University Business School, West London, UK Dirk Werth DFKI, Saarbruc . . ken, Germany Maria Wimmer University Koblenz-Landau, Germany EGES Subreviewers Alexandra Chapko, Andreas Emrich and Marc Graessle German Research Center for Arti?cial Intelligence, Saarbruc .. ken, Germany Kristof Hamann, Kai Jander, Ante Vilenica and Sonja Zaplata University of Hamburg, Germany Global Information Systems Processes (GISP 2010) GISP Co-chairs Jan Pries-Heje Roskilde University, Denmark

Competitive Programming in Python - 128 Algorithms to Develop your Coding Skills (Paperback): Christoph Durr, Jill-Jenn Vie Competitive Programming in Python - 128 Algorithms to Develop your Coding Skills (Paperback)
Christoph Durr, Jill-Jenn Vie; Translated by Greg Gibbons, Daniele Gibbons
R1,074 Discovery Miles 10 740 Ships in 10 - 15 working days

Want to kill it at your job interview in the tech industry? Want to win that coding competition? Learn all the algorithmic techniques and programming skills you need from two experienced coaches, problem setters, and jurors for coding competitions. The authors highlight the versatility of each algorithm by considering a variety of problems and show how to implement algorithms in simple and efficient code. Readers can expect to master 128 algorithms in Python and discover the right way to tackle a problem and quickly implement a solution of low complexity. Classic problems like Dijkstra's shortest path algorithm and Knuth-Morris-Pratt's string matching algorithm are featured alongside lesser known data structures like Fenwick trees and Knuth's dancing links. The book provides a framework to tackle algorithmic problem solving, including: Definition, Complexity, Applications, Algorithm, Key Information, Implementation, Variants, In Practice, and Problems. Python code included in the book and on the companion website.

Steganography Techniques for Digital Images (Paperback, Softcover reprint of the original 1st ed. 2019): Abid Yahya Steganography Techniques for Digital Images (Paperback, Softcover reprint of the original 1st ed. 2019)
Abid Yahya
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.

Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin... Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers (Paperback, 1st ed. 2019)
Tanja Lange, Orr Dunkelman
R1,897 Discovery Miles 18 970 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 5th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2017, held in Havana, Cuba, in September 2017. The 20 papers presented were carefully reviewed and selected from 64 submissions. They are organized in the following topical sections: security protocols; public-key implementation; cryptanalysis; theory of symmetric-key cryptography; multiparty computation and privacy; new constructions; and adversarial cryptography.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,511 Discovery Miles 15 110 Ships in 18 - 22 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Distributed Applications and Interoperable Systems - 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the... Distributed Applications and Interoperable Systems - 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17-21, 2019, Proceedings (Paperback, 1st ed. 2019)
Jose Pereira, Laura Ricci
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the 19th IFIP International Conference on Distributed Applications and Interoperable Systems, DAIS 2019, held in Kongens Lyngby, Denmark, in June 2019, as part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019. The 9 full papers presented together with 2 short papers were carefully reviewed and selected from 28 submissions. The papers addressed challenges in multiple application areas, such as the Internet-of-Things, cloud and edge computing, and mobile systems. Some papers focused on middleware for managing concurrency and consistency in distributed systems, including data replication and transactions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
Directed Information Measures in…
Michael Wibral, Raul Vicente, … Hardcover R4,138 R3,337 Discovery Miles 33 370
Radical transparency and digital…
Luke Heemsbergen Hardcover R2,676 Discovery Miles 26 760
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,356 Discovery Miles 23 560
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Performances of Peace: Utrecht 1713
Renger Bruin, Cornelis Haven, … Hardcover R4,490 Discovery Miles 44 900

 

Partners