0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (87)
  • R500+ (1,898)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019,... Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings (Paperback, 1st ed. 2019)
Julian Jang-Jaccard, Fuchun Guo
R2,537 Discovery Miles 25 370 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019. The 32 revised full papers and 8 short papers presented were carefully revised and selected from 129 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as encryption; post-quantum security; cryptocurrency related; foundations; system and network security; and symmetric cryptography.

How to Prove It - A Structured Approach (Hardcover, 3rd Revised edition): Daniel J. Velleman How to Prove It - A Structured Approach (Hardcover, 3rd Revised edition)
Daniel J. Velleman
R2,759 Discovery Miles 27 590 Ships in 10 - 15 working days

Proofs play a central role in advanced mathematics and theoretical computer science, yet many students struggle the first time they take a course in which proofs play a significant role. This bestselling text's third edition helps students transition from solving problems to proving theorems by teaching them the techniques needed to read and write proofs. Featuring over 150 new exercises and a new chapter on number theory, this new edition introduces students to the world of advanced mathematics through the mastery of proofs. The book begins with the basic concepts of logic and set theory to familiarize students with the language of mathematics and how it is interpreted. These concepts are used as the basis for an analysis of techniques that can be used to build up complex proofs step by step, using detailed 'scratch work' sections to expose the machinery of proofs about numbers, sets, relations, and functions. Assuming no background beyond standard high school mathematics, this book will be useful to anyone interested in logic and proofs: computer scientists, philosophers, linguists, and, of course, mathematicians.

Algebraic Informatics - 8th International Conference, CAI 2019, Nis, Serbia, June 30-July 4, 2019, Proceedings (Paperback, 1st... Algebraic Informatics - 8th International Conference, CAI 2019, Nis, Serbia, June 30-July 4, 2019, Proceedings (Paperback, 1st ed. 2019)
Miroslav Ciric, Manfred Droste, Jean-Eric Pin
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Algebraic Informatics, CAI 2019, held in Nis, Serbia, in June/July 2019. The 20 revised papers presented were carefully reviewed and selected from 35 submissions. The papers present research at the intersection of theoretical computer science, algebra, and related areas. They report original unpublished research and cover a broad range of topics from automata theory and logic, cryptography and coding theory, computer algebra, design theory, natural and quantum computation, and related areas.

Street Coder (Paperback): Sedat Kapanoglu Street Coder (Paperback)
Sedat Kapanoglu
R1,246 Discovery Miles 12 460 Ships in 10 - 15 working days

Software development isn't an "ivory tower" exercise.Street coders get the job done by prioritizing tasks, making quick decisions, and knowing which rules to break. Street Coder: Rules to break and how to break themis a programmer's survival guide, full of tips, tricks, and hacks that will make you a more efficient programmer. This book's rebel mindset challenges status quo thinking and exposes the important skills you need on the job. You'll learnthe crucial importance of algorithms and data structures, turn programming chores into programming pleasures, and shatter dogmatic principles keeping you from your full potential. Every new coder starts out with a lot of theory; the "streetsmarts" come with experience. To be successful, you need to know how toput theory into action, understand why "best practices" are the best, and know when to go rogue and break the unbreakable rules.

The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno,... The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers (Hardcover, 2009 ed.)
Vashek Matyas, Simone Fischer-Hubner, Daniel Cvrcek, Petr Svenda
R2,682 Discovery Miles 26 820 Ships in 18 - 22 working days

What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 1-7, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.

Information Systems Security and Privacy - 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January... Information Systems Security and Privacy - 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Paolo Mori, Steven Furnell, Olivier Camp
R1,413 Discovery Miles 14 130 Ships in 18 - 22 working days

This book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.

Locally Relevant ICT Research - 10th International Development Informatics Association Conference, IDIA 2018, Tshwane, South... Locally Relevant ICT Research - 10th International Development Informatics Association Conference, IDIA 2018, Tshwane, South Africa, August 23-24, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Kirstin Krauss, Marita Turpin, Filistea Naude
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Development Informatics Association Conference, IDIA 2018, held in Tshwane, South Africa, in August 2018. The 20 revised full papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on ICT adoption and impact; mobile education; e-education; community development; design; innovation and maturity; data.

Blockchain - ICBC 2019 - Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San... Blockchain - ICBC 2019 - Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings (Paperback, 1st ed. 2019)
James Joshi, Surya Nepal, Q.I. Zhang, Liang-Jie Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Blockchain, ICBC 2019, held as part of the Services Conference Federation, SCF 2019, in San Diego, CA, USA, in June 2019. The 13 full papers and 2 short papers presented were carefully reviewed and selected from 29 submissions. The papers cover a wide range of topics in blockchain technologies, platforms, solutions and business models such as new blockchain architecture, platform constructions, blockchain development and blockchain services technologies, as well as standards, and blockchain services innovation lifecycle including enterprise modeling, business consulting, solution creation, services orchestration, services optimization, services management, services marketing, business process integration and management.

Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part I... Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Amos Beimel, Stefan Dziembowski
R1,528 Discovery Miles 15 280 Ships in 18 - 22 working days

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,512 Discovery Miles 15 120 Ships in 18 - 22 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Provable Security - 12th International Conference, ProvSec 2018,  Jeju, South Korea, October 25-28, 2018, Proceedings... Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings (Paperback, 1st ed. 2018)
Joonsang Baek, Willy Susilo, Jong-Kil Kim
R1,446 Discovery Miles 14 460 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications.

Soft Computing Systems - Second International Conference, ICSCS 2018, Kollam, India, April 19-20, 2018, Revised Selected Papers... Soft Computing Systems - Second International Conference, ICSCS 2018, Kollam, India, April 19-20, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Ivan Zelinka, Roman Senkerik, Ganapati Panda, Padma Suresh Lekshmi Kanthan
R2,813 Discovery Miles 28 130 Ships in 18 - 22 working days

This book (CCIS 837) constitutes the refereed proceedings of the Second International Conference on Soft Computing Systems, ICSCS 2018, held in Sasthamcotta, India, in April 2018. The 87 full papers were carefully reviewed and selected from 439 submissions. The papers are organized in topical sections on soft computing, evolutionary algorithms, image processing, deep learning, artificial intelligence, big data analytics, data minimg, machine learning, VLSI, cloud computing, network communication, power electronics, green energy.

Internet of Things - ICIOT 2019 - 4th International Conference, Held as Part of the Services Conference Federation, SCF 2019,... Internet of Things - ICIOT 2019 - 4th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings (Paperback, 1st ed. 2019)
Valerie Issarny, Balaji Palanisamy, Liang-Jie Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the International Conference on Internet of Things, ICIOT 2019, held as part of SCF 2019, in San Diego, CA, USA, in June 2019. The 8 full and 3 short papers presented in this volume were carefully reviewed and selected from 16 submissions. With the rapid advancements of mobile Internet, cloud computing and big data, device-centric traditional Internet of Things (IoT) is now moving into a new era which is termed as Internet of Things Services (IOTS). In this era, sensors and other types of sensing devices, wired and wireless networks, platforms and tools, data processing/visualization/analysis and integration engines, and other components of traditional IoT are interconnected through innovative services to realize the value of connected things, people, and virtual Internet spaces.

Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Paperback, Expanded... Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Paperback, Expanded edition)
Wouter de Nooy, Andrej Mrvar, Vladimir Batagelj
R1,253 Discovery Miles 12 530 Ships in 10 - 15 working days

An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.

Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Hardcover, Expanded... Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Hardcover, Expanded edition)
Wouter de Nooy, Andrej Mrvar, Vladimir Batagelj
R3,244 Discovery Miles 32 440 Ships in 10 - 15 working days

An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.

Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017,... Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Gregorio D'Agostino, Antonio Scala
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 12th International Conference on Critical Information Infrastructures Security, CRITIS 201, held in Lucca, Italy, in October 2017. The 21 full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. They present innovative research and explore new challenges in the field of critical information infrastructures protection (C(I)IP) and deal with multi-disciplinary approaches to relevant C(I)IP problems.

Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7,... Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Javier Lopez, Jianying Zhou, Miguel Soriano
R1,488 Discovery Miles 14 880 Ships in 18 - 22 working days

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January... Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papers (Hardcover)
Gilbert Peterson, Sujeet Shenoi
R1,439 Discovery Miles 14 390 Ships in 18 - 22 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics VII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Fraud and Malware Investigations, Network Forensics, and Advanced Forensic Techniques. This book is the 7th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of 21 edited papers from the 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2011. Advances in Digital Forensics VII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.

Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018,... Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings (Paperback, 1st ed. 2018)
Willy Susilo, Guomin Yang
R2,803 Discovery Miles 28 030 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.

Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9,... Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings (Paperback, 1st ed. 2018)
Antoine Joux, Abderrahmane Nitaj, Tajjeeddine Rachidi
R2,086 Discovery Miles 20 860 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018, held in Marrakesh, Morocco, in May 2018. The 19 papers presented in this book were carefully reviewed and selected from 54 submissions. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,540 Discovery Miles 15 400 Ships in 18 - 22 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018,... Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings (Paperback, 1st ed. 2018)
Tanja Lange, Rainer Steinwandt
R1,475 Discovery Miles 14 750 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on Code-based Cryptography; Cryptanalysis; Hash-based Cryptography; Isogenies in Cryptography; Lattice-based Cryptography; Multivariate Cryptography; Protocols; Quantum Algorithms.

Communications and Networking - 12th International Conference, ChinaCom 2017, Xi'an, China, October 10-12, 2017,... Communications and Networking - 12th International Conference, ChinaCom 2017, Xi'an, China, October 10-12, 2017, Proceedings, Part II (Paperback, 1st ed. 2018)
Bo Li, Lei Shu, Deze Zeng
R1,491 Discovery Miles 14 910 Ships in 18 - 22 working days

The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017. The total of 112 contributions presented in these volumes are carefully reviewed and selected from 178 submissions. The papers are organized in topical sections on wireless communications and networking, satellite and space communications and networking, big data network track, multimedia communications and smart networking, signal processing and communications, network and information security, advances and trends of V2X networks.

Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1,... Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Howon Kim, Dong-Chan Kim
R2,375 Discovery Miles 23 750 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
Stream Ciphers and Number Theory, Volume…
Thomas W Cusick, Cunsheng Ding, … Hardcover R2,957 Discovery Miles 29 570
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
Blockchain Applications
Arshdeep Bagha Hardcover R1,870 R1,522 Discovery Miles 15 220
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Construction and Analysis of…
Lilya Budaghyan Hardcover R3,268 Discovery Miles 32 680

 

Partners