0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (101)
  • R500+ (1,926)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology... Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings (Paperback, 2010 ed.)
Dominik Slezak
R1,478 Discovery Miles 14 780 Ships in 10 - 15 working days

As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009 was the first mega-conference that attempted to follow the above idea of hybridization in FGIT in a form of multiple events related to particular disciplines of IT, conducted by separate scientific committees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D- aster Recovery and Business Continuity (DRBC; published independently), Future G- eration Communication and Networking (FGCN) that was combined with Advanced Communication and Networking (ACN), Grid and Distributed Computing (GDC), M- timedia, Computer Graphics and Broadcasting (MulGraB), Security Technology (SecTech), Signal Processing, Image Processing and Pattern Recognition (SIP), and- and e-Service, Science and Technology (UNESST).

Combinatorial Algorithms - 20th International Workshop, IWOCA 2009, Hradec nad Moravici, Czech Republic, June 28--July 2, 2009,... Combinatorial Algorithms - 20th International Workshop, IWOCA 2009, Hradec nad Moravici, Czech Republic, June 28--July 2, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Jiri Fiala, Jan Kratochvil, Mirka Miller
R1,528 Discovery Miles 15 280 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the 20th International Workshop on Combinatorial Algorithms, held in June/July 2009 in the castle of Hradec nad Moravici, Czech Republic.

The 41 papers included in this volume together with 5 invited papers were carefully reviewed and selected from over 100 submissions. The topics dealt with are algorithms and data structures, applications, combinatorial enumeration, combinatorial optimization, complexity theory, computational biology, databases, decompositions and combinatorial designs, discrete and computational geometry, including graph drawing, and graph theory and combinatorics.

Selected Areas in Cryptography - 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised... Selected Areas in Cryptography - 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Michael J. Jacobson, Vincent Rijmen, Rei Safavi-Naini
R1,524 Discovery Miles 15 240 Ships in 10 - 15 working days

The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary,in Calgary, Alberta, Canada, during August 13-14, 2009. There were 74 participants from 19 countries. Previous workshops in this series were held at Queens University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of - terloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), Concordia University in Montreal (2006), University of Ottawa (2007), and Mount Allison University in Sackville (2008). The themes for SAC 2009 were: 1. Design and analysis of symmetric key primitives and cryptosystems, incl- ing block and stream ciphers, hash functions, and MAC algorithms 2. E?cient implementations of symmetric and public key algorithms 3. Mathematical and algorithmic aspects of applied cryptology 4. Privacy enhancing cryptographic systems This included the traditional themes (the ?rst three) together with a special theme for 2009 workshop (fourth theme).

Protecting Persons While Protecting the People - Second Annual Workshop on Information Privacy and National Security, ISIPS... Protecting Persons While Protecting the People - Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers (Paperback, 2009 ed.)
Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of C- munication and Information at Rutgers University, was held on May 12, 2008 at the Hyatt Regency, New Brunswick, New Jersey, USA. A few of the papers in this volume were produced through a multi-step process. First, we recorded the talk given by each author at the workshop in May 2008. Next, we transcribed the recording. The authors then produced a draft of their paper from these transcriptions, refining each draft until the final version. Although the papers are not verbatim transcriptions of the talks given, some do retain the informal and conv- sational quality of the presentations. In one instance we have included some material from the question-and-answer period after the talk, since the material covered proved to be relevant and interesting. The majority of authors, however, preferred to include a more formal paper based on the material presented at the workshop.

Information and Communications Security - 11th International Conference, ICICS 2009 (Paperback, 2009 ed.): Sihan Qing, Chris J.... Information and Communications Security - 11th International Conference, ICICS 2009 (Paperback, 2009 ed.)
Sihan Qing, Chris J. Mitchell, Guilin Wang
R2,853 Discovery Miles 28 530 Ships in 10 - 15 working days

The11thInternationalConferenceonInformationandCommunicationsSecurity (ICICS 2009) was held in Beijing, China during December 14-17, 2009. The ICICS conferenceseriesis anestablished forum that bringstogether people from universities,researchinstitutes, industry and governmentinstitutions, who work in a range of ?elds within information and communications security. The ICICS conferencesgiveattendeestheopportunitytoexchangenewideasandinvestigate developments in the state of the art. In previous years, ICICS has taken place in the UK (2008), China (2007, 2005, 2003, 2001 and 1997), USA (2006), Spain (2004), Singapore (2002), and Australia (1999). On each occasion, as on this one, the proceedings have been published in the Springer LNCS series. In total, 162 manuscripts from 20 countries and districts were submitted to ICICS 2009, and a total of 37 (31 regular papers plus 6 short papers) from 13 countries and districts were accepted (an acceptance rate of 23%). The accepted papers cover a wide range of disciplines within information security and applied cryptography. Each submission to ICICS 2009 was anonymously reviewed by three or four reviewers. We are very grateful to members of the Program C- mittee, which was composed of 44 members from 14 countries; we would like to thank them, as well as all the external referees, for their time and their valuable contributions to the tough and time-consuming reviewing process.

Progress in Cryptology -  INDOCRYPT 2009 - 10th International Conference on Cryptology in India, New Delhi, India, December... Progress in Cryptology - INDOCRYPT 2009 - 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings (Paperback, 2009 ed.)
Bimal Kumar Roy, Nicolas Sendrier
R1,516 Discovery Miles 15 160 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.

The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.

Safety and Security in Multiagent Systems - Research Results from 2004-2006 (Paperback, 2009 ed.): Mike Barley, Haris... Safety and Security in Multiagent Systems - Research Results from 2004-2006 (Paperback, 2009 ed.)
Mike Barley, Haris Mouratidis, Amy Unruh, Diana F. Gordon-Spears, Paul Scerri, …
R1,486 Discovery Miles 14 860 Ships in 10 - 15 working days

As intelligent autonomous agents and multiagent system applications become more pervasive, it becomes increasingly important to understand the risks associated with using these systems. Incorrect or inappropriate agent behavior can have harmful - fects, including financial cost, loss of data, and injury to humans or systems. For - ample, NASA has proposed missions where multiagent systems, working in space or on other planets, will need to do their own reasoning about safety issues that concern not only themselves but also that of their mission. Likewise, industry is interested in agent systems that can search for new supply opportunities and engage in (semi-) automated negotiations over new supply contracts. These systems should be able to securely negotiate such arrangements and decide which credentials can be requested and which credentials may be disclosed. Such systems may encounter environments that are only partially understood and where they must learn for themselves which aspects of their environment are safe and which are dangerous. Thus, security and safety are two central issues when developing and deploying such systems. We refer to a multiagent system's security as the ability of the system to deal with threats that are intentionally caused by other intelligent agents and/or s- tems, and the system's safety as its ability to deal with any other threats to its goals.

Information Theoretic Security - Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected... Information Theoretic Security - Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers (Paperback, 2009 ed.)
Yvo Desmedt
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Information Theoretic Security, ICITS 2007, held in Madrid, Spain, in May 2007.

The 13 revised full papers presented in this volume were carefully reviewed and selected from 26 submissions. There were one invited keynote speech and 3 invited talks to the conference. The topics covered are authentication, group cryptography, private and reliable message transmission, secret sharing, and applications of information theory.

Digital Watermarking - 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers (Paperback,... Digital Watermarking - 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers (Paperback, 2009 ed.)
Hyoung Joong Kim, Stefan Katzenbeisser, Anthony T.S. Ho
R1,525 Discovery Miles 15 250 Ships in 10 - 15 working days

th It is our great pleasure to present in this volume the proceedings of the 7 Inter- tional Workshop on Digital Watermarking (IWDW) which was held in Busan, Korea, during November 10-12, 2008. The workshop was hosted by the by Korea Institute of Information Security and Cryptology (KIISC) and sponsored by MarkAny, BK21 CIST (Korea University), ETRI. Since its birth in the early 1990s, digital watermarking has become a mature e- bling technology for solving security problems associated with multimedia distri- tion schemes. Digital watermarks are now used in applications like broadcast mo- toring, movie fingerprinting, digital rights management, and document authentication, to name but a few. Still, many research challenges remain open, among them security and robustness issues, reversibility, and authentication. Continuing the tradition of previous workshops, IWDW 2008 also featured besides papers dealing with digital watermarking contributions from other related fields, such as steganography, ste- nalysis, and digital forensics. The selection of the program was a challenging task. From more than 62 subm- sions (received from authors in 15 different countries) the Program Committee - lected 36 as regular papers. At this point we would like to thank all the authors who submitted their latest research results to IWDW 2008 and all members of the Program Committee who put significant effort into the review process, assuring a balanced program. In addition to the contributed papers, the workshop featured three invited lectures delivered by Y. Q. Shi, C. -C."

Software and Data Technolgoies - Third International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008 (Paperback,... Software and Data Technolgoies - Third International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008 (Paperback, 2009 ed.)
Jose Cordeiro, Boris Shishkov, Alpesh Kumar Ranchordas, Markus Helfert
R1,454 Discovery Miles 14 540 Ships in 10 - 15 working days

This book contains the best papers of the Third International Conference on Software and Data Technologies (ICSOFT 2008), held in Porto, Portugal, which was organized by the Institute for Systems and Technologies of Information, Communication and Control (INSTICC), co-sponsored by the Workflow Management Coalition (WfMC), in cooperation with the Interdisciplinary Institute for Collaboration and Research on Enterprise Systems and Technology (IICREST). The purpose of ICSOFT 2008 was to bring together researchers, engineers and practitioners interested in information technology and software development. The conference tracks were "Software Engineering", "Information Systems and Data Management", "Programming Languages", "Distributed and Parallel Systems" and "Knowledge Engineering". Being crucial for the development of information systems, software and data te- nologies encompass a large number of research topics and applications: from imp- mentation-related issues to more abstract theoretical aspects of software engineering; from databases and data-warehouses to management information systems and kno- edge-base systems; next to that, distributed systems, pervasive computing, data qu- ity and other related topics are included in the scope of this conference.

Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September... Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers (Paperback, 2010 ed.)
Yan Chen, Tassos D. Dimitriou, Jianying Zhou
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece.

The 19 revised full papers and 7 revised short papers were carefully reviewed and selected from 76 submissions.

The papers cover various topics such as wireless network security, network intrusion detection, security and privacy for the general internet, malware and misbehavior, sensor networks, key management, credentials and authentications, as well as secure multicast and emerging technologies.

e-Business and Telecommunications - International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected... e-Business and Telecommunications - International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers (Paperback, 2009 ed.)
Joaquim Filipe, Mohammad S. Obaidat
R2,848 Discovery Miles 28 480 Ships in 10 - 15 working days

th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and te- communications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (- ternational Conf. on e-Business), SECRYPT (International Conf. on Security and Cryptography), SIGMAP (Int'l Conf. on Signal Processing and Multimedia) and WINSYS (International Conf. on Wireless Information Systems). The program of this joint conference included several outstanding keynote lectures presented by internationally renowned distinguished researchers who are experts in the various ICETE areas. Their keynote speeches have contributed to heightening the overall quality of the program and significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of e-business and telecommunications. This wide-view reporting made ICETE appealing to a global au- ence of engineers, scientists, business practitioners and policy experts. The papers - cepted and presented at the conference demonstrated a number of new and innovative solutions for e-business and telecommunication networks and systems, showing that the technical problems in these closely related fields are challenging and worthwhile - proaching an interdisciplinary perspective such as that promoted by ICETE.

Recent Advances in Intrusion Detection - 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009,... Recent Advances in Intrusion Detection - 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009, Proceedings (Paperback, 2009 ed.)
Engin Kirda, Somesh Jha, Davide Balzarotti
R1,500 Discovery Miles 15 000 Ships in 10 - 15 working days

On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 12th International Symposium on Recent Advances in Intrusion Detection systems (RAID 2009),which took place in Saint-Malo,France, during September 23-25. As in the past, the symposium brought together leading - searchers and practitioners from academia, government, and industry to discuss intrusion detection research and practice. There were six main sessions prese- ingfullresearchpapersonanomalyandspeci?cation-basedapproaches,malware detection and prevention, network and host intrusion detection and prevention, intrusion detection for mobile devices, and high-performance intrusion det- tion. Furthermore, there was a poster session on emerging research areas and case studies. The RAID 2009ProgramCommittee received59 full paper submissionsfrom all over the world. All submissions were carefully reviewed by independent - viewers on the basis of space, topic, technical assessment, and overall balance. The ?nal selection took place at the Program Committee meeting on May 21 in Oakland, California. In all, 17 papers were selected for presentation and p- lication in the conference proceedings. As a continued feature, the symposium accepted submissions for poster presentations which have been published as - tended abstracts, reporting early-stage research, demonstration of applications, or case studies. Thirty posters were submitted for a numerical review by an independent, three-person sub-committee of the Program Committee based on novelty, description, and evaluation. The sub-committee recommended the - ceptance of 16 of these posters for presentation and publication. The success of RAID 2009 depended on the joint e?ort of many people.

Personal Satellite Services - International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers... Personal Satellite Services - International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Kandeepan Sithamparanathan, Mario Marchese
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the proceedings of the International Conference on Personal Satellite Services (PSATS 2009) in Rome, Italy in March 2009.

The 17 papers papers demonstrate recent advances in Internet applications over satellites, satellites technologies, and future satellite location-based systems.

E-Voting and Identity - Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings (Paperback,... E-Voting and Identity - Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings (Paperback, 2009 ed.)
Peter Y. A. Ryan, Berry Schoenmakers
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

These proceedings contain the papers presented at VoteID 2009, the Second - ternationalConferenceonE-votingandIdentity.TheconferencewasheldinL- embourgduring September 7-8,2009, hostedbythe Universityof Luxembourg. VoteID 2009 built on the success of the 2007 edition held in Bochum. Events have moved on dramatically in the intervening two years: at the time of writing, people are in the streets of Tehran protesting against the claimed outcome of the June12thpresidentialelectionin Iran.Banners bearingthe words"Whereis my vote?" bear testimony to the strength of feeling and the need for elections to be trusted. These events show that the search for high-assurance voting is not a purely academic pursuit but one of very real importance. We hope that VoteID 2009 will help contribute to our understanding of the foundations of democracy. TheProgramCommitteeselected11papersforpresentationattheconference out of a total of 24 submissions. Each submission was reviewed by at least four Program Committee members. The EasyChair conference management system proved instrumental in the reviewing process as well as in the preparation of these proceedings. The selected papers cover a wide range of aspects of voting: proposals for high-assurancevotingsystems, evaluationofexistingsystems, assessmentofp- lic response to electronic voting and legal aspects. The program also included a keynote by Mark Ryan.

Smart Spaces and Next Generation Wired/Wireless Networking - 9th International Conference, NEW2AN 2009 and Second Conference on... Smart Spaces and Next Generation Wired/Wireless Networking - 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009, Proceedings (Paperback, 2009 ed.)
Sergey Balandin, Dmitri Moltchanov, Yevgeni Koucheryavy
R1,499 Discovery Miles 14 990 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN 2009, held in conjunction with the Second Conference on Smart Spaces, ruSMART 2009 in St. Petersburg, Russia, in September 2009.

The 32 revised full papers presented were carefully reviewed and selected from a total of 82 submissions. The NEW2AN papers are organized in topical sections on teletraffic issues; traffic measurements, modeling, and control; peer-to-peer systems; security issues; wireless networks: ad hoc and mesh; and wireless networks: capacity and mobility. The ruSMART papers start with an invited talk followed by 10 papers on smart spaces.

Information Security - 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings (Paperback, 2009... Information Security - 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings (Paperback, 2009 ed.)
Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
R2,856 Discovery Miles 28 560 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009.

The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services.

Identity and Privacy in the Internet Age - 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16... Identity and Privacy in the Internet Age - 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings (Paperback, 2009 ed.)
Audun Josang, Torleiv Maseng, Svein J. Knapskog
R1,475 Discovery Miles 14 750 Ships in 10 - 15 working days

The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within computer security in the Nordic countries - thereby establishing a forum for discussions and co-operation between universities, industry and computer societies. Since then, the workshop has developed into a fully fledged inter- tional information security conference, held in the Nordic countries on a round robin basis. The 14th Nordic Conference on Secure IT Systems was held in Oslo on 14-16 October 2009. Under the theme Identity and Privacy in the Internet Age, this year's conference explored policies, strategies and technologies for protecting identities and the growing flow of personal information passing through the Internet and mobile n- works under an increasingly serious threat picture. Among the contemporary security issues discussed were security services modeling, Petri nets, attack graphs, electronic voting schemes, anonymous payment schemes, mobile ID-protocols, SIM cards, n- work embedded systems, trust, wireless sensor networks, privacy, privacy disclosure regulations, financial cryptography, PIN verification, temporal access control, random number generators, and some more. As a pre-cursor to the conference proper, the Nordic Security Day on Wednesday 14 October hosted talks by leading representatives from industry, academia and the g- ernment sector, and a press conference was given.

Security and Privacy in Mobile Information and Communication Systems - First International ICST Conference, MobiSec 2009,... Security and Privacy in Mobile Information and Communication Systems - First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Shiguo Lian
R1,470 Discovery Miles 14 700 Ships in 10 - 15 working days

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.

The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications

Ad-Hoc, Mobile and Wireless Networks - 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009,... Ad-Hoc, Mobile and Wireless Networks - 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009, Proceedings (Paperback, 2009 ed.)
Pedro M. Ruiz, J.J. Garcia-Luna-Aceves
R1,505 Discovery Miles 15 050 Ships in 10 - 15 working days

The 8th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW 2009) was held September 22-25, 2009 in Murcia, Spain. Since ADHOCNOW started as a workshop in 2002, it has become a well-established and well-known international conference dedicated to wireless and mobile c- puting. During the last few years it has been held in Toronto, Canada (2002), Montreal, Canada (2003), Vancouver, Canada (2004), Cancun, Mexico (2005), Ottawa, Canada (2006), Morelia, Mexico (2007) and Sophia Antipolis, France (2008). The conference serves as a forum for interesting discussions on ongoing research and new contributions addressing both experimental and theoretical research in the area of ad hoc networks, mesh networks, sensor networks and vehicular networks. In 2009, we recived 92 submissions from 28 di?erent countries around the globe: Algeria, Australia, Brazil, Canada, China, Egypt, Finland, France, G- many, Greece, India, Iran, Ireland, Italy, Japan, Korea, Luxembourg, Malaysia, Mexico,Norway,Poland,Portugal,Serbia,SouthAfrica,Spain,Tunisia,UKand USA. Of the submitted papers, we selected 24 full papers and 10 short papers for publication in the proceedings and presentation in the conference.

Selected Areas in Cryptography - 15th Annual International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15,... Selected Areas in Cryptography - 15th Annual International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, 2008 (Paperback, 2009 ed.)
Roberto Avanzi, Liam Keliher, Francesco Sica
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

The book in front of you contains the proceedings of SAC 2008, the 15th - nual Workshop on Selected Areas in Cryptography. SAC 2008 took place during August 14-15 at Mount Allison University, Sackville, New Brunswick, Canada. This was the ?rst time that SAC was hosted in New Brunswick, and the second time in an Atlantic Canadian province. Previous SAC workshops were held at Queen's University in Kingston (1994, 1996, 1998, 1999, and 2005), at Carleton University in Ottawa (1995, 1997, 2003), at the University of Waterloo (2000, 2004), at the Fields Institute in Toronto (2001), at Memorial University of N- foundland at St. John's (2002), at Concordia University in Montreal (2006) and at the University of Ottawa (2007). The intent ofthe workshopseriesis to provide a relaxedatmospherein which researchers in cryptography can present and discuss new work on selected areas of current interest. The SAC workshop series has ?rmly established itself as an international forum for intellectual exchange in cryptological research. Theresponsibilityforchoosingthe venueofeachSACworkshopandappoi- ingtheCo-chairslieswiththeSACOrganizingBoard.TheCo-chairsthenchoose the Program Committee in consultation with the Board. Hence, we would like to expressour gratitudeto the SAC OrganizingBoardfor giving usthe mandate to organize SAC 2008, and for their invaluable feedback while assembling the Program Committee.

Fast Software Encryption - 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers... Fast Software Encryption - 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers (Paperback, 2009 ed.)
Orr Dunkelman
R1,508 Discovery Miles 15 080 Ships in 10 - 15 working days

FastSoftwareEncryption2009wasthe16thin a seriesofworkshopsonsymm- ric key cryptography. Starting from 2002, it is sponsored by the International Association for Cryptologic Research (IACR). FSE 2009 was held in Leuven, Belgium, after previous venues held in Cambridge, UK (1993, 1996), Leuven, Belgium (1994, 2002), Haifa, Israel (1997), Paris, France (1998, 2005), Rome, Italy (1999), New York, USA (2000), Yokohama, Japan (2001), Lund, Sweden (2003), New Delhi, India (2004), Graz, Austria (2006), Luxembourg, Lux- bourg (2007), and Lausanne, Switzerland (2008). The workshop's main topic is symmetric key cryptography, including the designoffast andsecuresymmetrickeyprimitives,suchas block ciphers,stream ciphers, hash functions, message authentication codes, modes of operation and iteration, as well as the theoretical foundations of these primitives. This year, 76 papers were submitted to FSE including a large portion of papers on hash functions, following the NIST SHA-3 competition, whose wo- shop was held just after FSE in the same location. From the 76 papers, 24 were accepted for presentation. It is my pleasure to thank all the authors of all s- missions for the high-quality research, which is the base for the scienti?c value of the workshop. The review process was thorough (each submission received the attention of at least three reviewers), and at the end, besides the accepted papers, the Committee decided that the merits of the paper "Blockcipher-Based Hashing Revisited" entitled the authors to receive the best paper award. I wish to thank all Committee members and the referees for their hard and dedicated work.

Pairing-Based Cryptography - Pairing 2009 - Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings... Pairing-Based Cryptography - Pairing 2009 - Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings (Paperback, 2009 ed.)
Hovav Shacham, Brent Waters
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Pairing-Based Cryptography, Pairing 2009, held in Palo Alto, CA, USA, in August 2009.

The 16 full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on signature security, curves, pairing computation, non-interactive zero-knowledge systems and applications, group signatures, and protocols.

Global Security, Safety, and Sustainability - 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009,... Global Security, Safety, and Sustainability - 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009, Proceedings (Paperback, 2009 ed.)
Hamid Jahankhani, Ali G. Hessami, Feng Hsu
R1,457 Discovery Miles 14 570 Ships in 10 - 15 working days

The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The 2009 two-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, s- cial events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors. The conference provided an opportunity for systems scientists, assurance researchers, owners, ope- tors and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in these challenging domains while networking with the leading researchers and solution providers. ICGS3 2009 received paper submissions from more than 20 different countries around the world. Only 28 papers were selected and were presented as full papers. The program also included three keynote lectures by leading researchers, security professionals and government representatives. June 2009 Hamid Jahankhani Ali Hessami Feng Hsu

Rough Sets and Knowledge Technology - 4th International Conference, RSKT 2009, Gold Coast, Australia, July 14-16, 2009,... Rough Sets and Knowledge Technology - 4th International Conference, RSKT 2009, Gold Coast, Australia, July 14-16, 2009, Proceedings (Paperback, 2009 ed.)
Peng Wen, Yuefeng Li, Lech Polkowski, Yiyu Y. Yao, Shusaku Tsumoto
R2,913 Discovery Miles 29 130 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Fourth International Conference on Rough Sets and Knowledge Technology, RSKT 2009, held in Gold Coast, Australia, in July 2009. The 85 revised full papers presented together with 3 keynote papers and 2 special sessions were carefully reviewed and selected from 229 submissions. The papers are organized in topical sections on rough sets and computing, rough sets and data reduction, data mining and knowledge discovery, granular computing and cognitive computing, fuzzy sets and computing, knowledge technology and intelligent systems, computational intelligence and applications, image processing and understanding, and formal concept analysis.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,473 Discovery Miles 24 730
Introduction to Bitcoin
David Ricardo Hardcover R733 Discovery Miles 7 330
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R844 R699 Discovery Miles 6 990
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,178 Discovery Miles 11 780
Bitcoin - Guide Book for Beginners
Keizer Soeze Hardcover R1,151 R928 Discovery Miles 9 280
Technical Articles about the Voynich…
National Security Agency Hardcover R568 Discovery Miles 5 680
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940
Blockchain 2035 - The Digital DNA of…
Andrew D Knapp, Jared C Tate Hardcover R1,410 Discovery Miles 14 100
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030

 

Partners