0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (86)
  • R500+ (1,899)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Blockchain - ICBC 2019 - Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San... Blockchain - ICBC 2019 - Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings (Paperback, 1st ed. 2019)
James Joshi, Surya Nepal, Q.I. Zhang, Liang-Jie Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Blockchain, ICBC 2019, held as part of the Services Conference Federation, SCF 2019, in San Diego, CA, USA, in June 2019. The 13 full papers and 2 short papers presented were carefully reviewed and selected from 29 submissions. The papers cover a wide range of topics in blockchain technologies, platforms, solutions and business models such as new blockchain architecture, platform constructions, blockchain development and blockchain services technologies, as well as standards, and blockchain services innovation lifecycle including enterprise modeling, business consulting, solution creation, services orchestration, services optimization, services management, services marketing, business process integration and management.

Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part I... Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Amos Beimel, Stefan Dziembowski
R1,528 Discovery Miles 15 280 Ships in 18 - 22 working days

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,512 Discovery Miles 15 120 Ships in 18 - 22 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Provable Security - 12th International Conference, ProvSec 2018,  Jeju, South Korea, October 25-28, 2018, Proceedings... Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings (Paperback, 1st ed. 2018)
Joonsang Baek, Willy Susilo, Jong-Kil Kim
R1,446 Discovery Miles 14 460 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications.

Soft Computing Systems - Second International Conference, ICSCS 2018, Kollam, India, April 19-20, 2018, Revised Selected Papers... Soft Computing Systems - Second International Conference, ICSCS 2018, Kollam, India, April 19-20, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Ivan Zelinka, Roman Senkerik, Ganapati Panda, Padma Suresh Lekshmi Kanthan
R2,813 Discovery Miles 28 130 Ships in 18 - 22 working days

This book (CCIS 837) constitutes the refereed proceedings of the Second International Conference on Soft Computing Systems, ICSCS 2018, held in Sasthamcotta, India, in April 2018. The 87 full papers were carefully reviewed and selected from 439 submissions. The papers are organized in topical sections on soft computing, evolutionary algorithms, image processing, deep learning, artificial intelligence, big data analytics, data minimg, machine learning, VLSI, cloud computing, network communication, power electronics, green energy.

Internet of Things - ICIOT 2019 - 4th International Conference, Held as Part of the Services Conference Federation, SCF 2019,... Internet of Things - ICIOT 2019 - 4th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings (Paperback, 1st ed. 2019)
Valerie Issarny, Balaji Palanisamy, Liang-Jie Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the International Conference on Internet of Things, ICIOT 2019, held as part of SCF 2019, in San Diego, CA, USA, in June 2019. The 8 full and 3 short papers presented in this volume were carefully reviewed and selected from 16 submissions. With the rapid advancements of mobile Internet, cloud computing and big data, device-centric traditional Internet of Things (IoT) is now moving into a new era which is termed as Internet of Things Services (IOTS). In this era, sensors and other types of sensing devices, wired and wireless networks, platforms and tools, data processing/visualization/analysis and integration engines, and other components of traditional IoT are interconnected through innovative services to realize the value of connected things, people, and virtual Internet spaces.

Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Paperback, Expanded... Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Paperback, Expanded edition)
Wouter de Nooy, Andrej Mrvar, Vladimir Batagelj
R1,253 Discovery Miles 12 530 Ships in 10 - 15 working days

An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.

Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Hardcover, Expanded... Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Hardcover, Expanded edition)
Wouter de Nooy, Andrej Mrvar, Vladimir Batagelj
R3,244 Discovery Miles 32 440 Ships in 10 - 15 working days

An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.

Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017,... Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Gregorio D'Agostino, Antonio Scala
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 12th International Conference on Critical Information Infrastructures Security, CRITIS 201, held in Lucca, Italy, in October 2017. The 21 full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. They present innovative research and explore new challenges in the field of critical information infrastructures protection (C(I)IP) and deal with multi-disciplinary approaches to relevant C(I)IP problems.

Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7,... Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Javier Lopez, Jianying Zhou, Miguel Soriano
R1,488 Discovery Miles 14 880 Ships in 18 - 22 working days

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January... Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papers (Hardcover)
Gilbert Peterson, Sujeet Shenoi
R1,439 Discovery Miles 14 390 Ships in 18 - 22 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics VII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Fraud and Malware Investigations, Network Forensics, and Advanced Forensic Techniques. This book is the 7th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of 21 edited papers from the 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2011. Advances in Digital Forensics VII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.

Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018,... Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings (Paperback, 1st ed. 2018)
Willy Susilo, Guomin Yang
R2,803 Discovery Miles 28 030 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.

Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9,... Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings (Paperback, 1st ed. 2018)
Antoine Joux, Abderrahmane Nitaj, Tajjeeddine Rachidi
R2,086 Discovery Miles 20 860 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018, held in Marrakesh, Morocco, in May 2018. The 19 papers presented in this book were carefully reviewed and selected from 54 submissions. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,540 Discovery Miles 15 400 Ships in 18 - 22 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018,... Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings (Paperback, 1st ed. 2018)
Tanja Lange, Rainer Steinwandt
R1,475 Discovery Miles 14 750 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on Code-based Cryptography; Cryptanalysis; Hash-based Cryptography; Isogenies in Cryptography; Lattice-based Cryptography; Multivariate Cryptography; Protocols; Quantum Algorithms.

Communications and Networking - 12th International Conference, ChinaCom 2017, Xi'an, China, October 10-12, 2017,... Communications and Networking - 12th International Conference, ChinaCom 2017, Xi'an, China, October 10-12, 2017, Proceedings, Part II (Paperback, 1st ed. 2018)
Bo Li, Lei Shu, Deze Zeng
R1,491 Discovery Miles 14 910 Ships in 18 - 22 working days

The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017. The total of 112 contributions presented in these volumes are carefully reviewed and selected from 178 submissions. The papers are organized in topical sections on wireless communications and networking, satellite and space communications and networking, big data network track, multimedia communications and smart networking, signal processing and communications, network and information security, advances and trends of V2X networks.

Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1,... Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Howon Kim, Dong-Chan Kim
R2,375 Discovery Miles 23 750 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security.

Communications and Networking - 12th International Conference, ChinaCom 2017, Xi'an, China, October 10-12, 2017,... Communications and Networking - 12th International Conference, ChinaCom 2017, Xi'an, China, October 10-12, 2017, Proceedings, Part I (Paperback, 1st ed. 2018)
Bo Li, Lei Shu, Deze Zeng
R2,925 Discovery Miles 29 250 Ships in 18 - 22 working days

The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017. The total of 112 contributions presented in these volumes are carefully reviewed and selected from 178 submissions. Aside from the technical paper sessions the book is organized in topical sections on wireless communications and networking, satellite and space communications and networking, big data network track, multimedia communications and smart networking, signal processing and communications, network and information security, advances and trends of V2X networks.

Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January... Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers (Hardcover, Edition.)
Kam-Pui Chow, Sujeet Shenoi
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days

Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-one edited papers from the Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the University of Hong Kong, Hong Kong, China, in January 2010.

Progress in Cryptology - AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11,... Progress in Cryptology - AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings (Paperback, 1st ed. 2019)
Johannes Buchmann, Abderrahmane Nitaj, Tajjeeddine Rachidi
R1,454 Discovery Miles 14 540 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2019, held in Rabat, Morocco, in July 2019. The 22 papers presented in this book were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on protocols; post-quantum cryptography; zero-knowledge; lattice based cryptography; new schemes and analysis; block ciphers; side-channel attacks and countermeasures; signatures. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).

Services Computing - SCC 2019 - 16th International Conference, Held as Part of the Services Conference Federation, SCF 2019,... Services Computing - SCC 2019 - 16th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings (Paperback, 1st ed. 2019)
Joao Eduardo Ferreira, Aibek Musaev, Liang-Jie Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This volume constitutes the proceedings of the 16th International Conference on Services Computing 2019, held as Part of SCF 2019 in San Diego, CA, USA in June 2019. The 9 full papers presented in this volume were carefully reviewed and selected from 15 submissions. They cover topics such as: foundations of services computing; scientific workflows; business process integration and management; microservices; modeling of services systems; service security and privacy; SOA service applications; and service lifecycle management.

Mobile, Secure, and Programmable Networking - 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23-24, 2019,... Mobile, Secure, and Programmable Networking - 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23-24, 2019, Revised Selected Papers (Paperback, 1st ed. 2019)
Eric Renault, Selma Boumerdassi, Cherkaoui Leghris, Samia Bouzefrane
R1,634 Discovery Miles 16 340 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Mobile, Secure and Programmable Networking, held in Mohammedia, Morocco, in April 2019. The 23 papers presented in this volume were carefully reviewed and selected from 48 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Cyber Security Cryptography and Machine Learning - Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28,... Cyber Security Cryptography and Machine Learning - Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings (Paperback, 1st ed. 2019)
Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung
R1,874 Discovery Miles 18 740 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Frontiers in Cyber Security - First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings... Frontiers in Cyber Security - First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings (Paperback, 1st ed. 2018)
Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang
R1,415 Discovery Miles 14 150 Ships in 18 - 22 working days

This book constitutes the proceedings of the First International Conference on Frontiers in Cyber Security, held in Chengdu, China, in November 2018. The 18 full papers along with the3 short papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections, namely: symmetric key cryptography, public key cryptography, post-quantum cryptography, cloud security and data deduplication, access control, attack and behavior detection, system and network security, security design.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Made by James - The Honest Guide to…
James Martin, Made By James Hardcover R665 Discovery Miles 6 650
The Other Side - An Emotional Map of…
Lucienne Roberts Rebecca Wright Paperback R791 Discovery Miles 7 910
Death and Mortality - An Image Archive…
Kale James Paperback R561 Discovery Miles 5 610
HANDSTYLE LETTERING: 20th Anniversary…
Paperback R981 R909 Discovery Miles 9 090
Printed landscape
Colin Sackett Paperback R396 Discovery Miles 3 960
Brand Culture and Identity - Concepts…
Information Reso Management Association Hardcover R8,431 Discovery Miles 84 310
Extra Bold - A Feminist, Inclusive…
Ellen Lupton, Jennifer Tobias Paperback R714 R550 Discovery Miles 5 500
Alphabet Logo: Trademarks & Symbols 2015
Paperback R452 Discovery Miles 4 520
Fading Ads of Detroit
Robert C. Allen Paperback R520 R479 Discovery Miles 4 790
Angularity - A Wandering in Abstraction
Joost Vanommeslaeghe Hardcover R1,064 Discovery Miles 10 640

 

Partners