0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (5)
  • R250 - R500 (19)
  • R500+ (4,502)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Proceedings of the 7th International Conference on Emerging Databases - Technologies, Applications, and Theory (Paperback,... Proceedings of the 7th International Conference on Emerging Databases - Technologies, Applications, and Theory (Paperback, Softcover reprint of the original 1st ed. 2018)
Wookey Lee, Wonik Choi, Sungwon Jung, Min Song
R4,244 Discovery Miles 42 440 Ships in 10 - 15 working days

This proceedings volume presents selected papers from the 7th International Conference on Emerging Databases: Technologies, Applications, and Theory (EDB 2017), which was held in Busan, Korea from 7 to 9 August, 2017. This conference series was launched by the Korean Institute of Information Scientists and Engineers (KIISE) Database Society of Korea as an annual forum for exploring novel technologies, applications, and research advances in the field of emerging databases. This forum has evolved into the premier international venue for researchers and practitioners to discuss current research issues, challenges, new technologies, and solutions.

Wireless Networking Principles: From Terrestrial to Underwater Acoustic (Paperback, Softcover reprint of the original 1st ed.... Wireless Networking Principles: From Terrestrial to Underwater Acoustic (Paperback, Softcover reprint of the original 1st ed. 2018)
Shengming Jiang
R4,034 Discovery Miles 40 340 Ships in 10 - 15 working days

This book systematically summarizes the fundamentals and various technologies in both terrestrial radio wireless networks and underwater acoustic networks (UWANs). It addresses the basic issues frequently investigated in terrestrial radio wireless networks and the key technologies suitable for the newly developing research area of UWANs. Starting with a review of our current understanding of wireless networks, it then introduces the principles of the main technologies, including error control, medium access control (MAC) protocols, routing protocols, end-to-end transmission control and mobility issues as well as network security for terrestrial radio wireless networks, and offers detailed surveys of these technologies for UWANs. Providing readers with the basic knowledge of terrestrial radio wireless networking technologies and raising readers' awareness of the developing topic of UWANs in ocean , it is a valuable resource for researchers and practitioners in terrestrial radio wireless networks and UWANs.

Innovations in Computational Intelligence - Best Selected Papers of the Third International Conference on REDSET 2016... Innovations in Computational Intelligence - Best Selected Papers of the Third International Conference on REDSET 2016 (Paperback, Softcover reprint of the original 1st ed. 2018)
Brajendra Panda, Sudeep Sharma, Usha Batra
R2,796 Discovery Miles 27 960 Ships in 10 - 15 working days

The present book includes a set of selected best papers from the 3rd International Conference on Recent Developments in Science, Engineering and Technology (REDSET 2016), held in Gurgaon, India, from 21 to 22 October 2016. The conference focused on the experimental, theoretical and application aspects of innovations in computational intelligence and provided a platform for the academicians and scientists. This book provides an insight into ongoing research and future directions in this novel, continuously evolving field. Many decades have been devoted to creating and refining methods and tools for computational intelligence such as Artificial Neural Networks, Evolutionary Computation, Fuzzy Logic, Computational Swarm Intelligence and Artificial Immune Systems. However, their applications have not yet been broadly disseminated. Computational intelligence can be used to provide solutions to many real-life problems, which could be translated into binary languages, allowing computers to process them. These problems, which involve various fields such as robotics, bioinformatics, computational biology, gene expression, cancer classification, protein function prediction, etc., could potentially be solved using computational intelligence techniques.

Handbook of Mobile Data Privacy (Paperback, Softcover reprint of the original 1st ed. 2018): Aris Gkoulalas-Divanis, Claudio... Handbook of Mobile Data Privacy (Paperback, Softcover reprint of the original 1st ed. 2018)
Aris Gkoulalas-Divanis, Claudio Bettini
R3,552 Discovery Miles 35 520 Ships in 10 - 15 working days

This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.

Wireless Communications under Hostile Jamming: Security and Efficiency (Paperback, Softcover reprint of the original 1st ed.... Wireless Communications under Hostile Jamming: Security and Efficiency (Paperback, Softcover reprint of the original 1st ed. 2018)
Tongtong Li, Tianlong Song, Yuan Liang
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.

Secure Networked Inference with Unreliable Data Sources (Paperback, Softcover reprint of the original 1st ed. 2018): Aditya... Secure Networked Inference with Unreliable Data Sources (Paperback, Softcover reprint of the original 1st ed. 2018)
Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.

Smart Cities - Development and Governance Frameworks (Paperback, Softcover reprint of the original 1st ed. 2018): Zaigham... Smart Cities - Development and Governance Frameworks (Paperback, Softcover reprint of the original 1st ed. 2018)
Zaigham Mahmood
R4,004 Discovery Miles 40 040 Ships in 10 - 15 working days

This invaluable text/reference investigates the state of the art in approaches to building, monitoring, managing, and governing smart cities. A particular focus is placed on the distributed computing environments within the infrastructure of such cities, including issues of device connectivity, communication, security, and interoperability. A selection of experts of international repute offer their perspectives on current trends and best practices, and their suggestions for future developments, together with case studies supporting the vision of smart cities based on the Internet of Things (IoT). Topics and features: examines the various methodologies relating to next-level urbanization, including approaches to security and privacy relating to social and legal aspects; describes a recursive and layered approach to modeling large-scale resource management systems for self-sustainable cities; proposes a novel architecture for hybrid vehicular wireless sensor networks, and a pricing mechanism for the management of natural resources; discusses the challenges and potential solutions to building smart city surveillance systems, applying knowledge-based governance, and adopting electric vehicles; covers topics on intelligent distributed systems, IoT, fog computing paradigms, big data management and analytics, and smart grids; reviews issues of sustainability in the design of smart cities and healthcare services, illustrated by case studies taken from cities in Japan, India, and Brazil. This illuminating volume offers a comprehensive reference for researchers investigating smart cities and the IoT, students interested in the distributed computing technologies used by smart living systems, and practitioners wishing to adopt the latest security and connectivity techniques in smart city environments.

Advances in Ubiquitous Networking - Proceedings of the UNet'15 (Paperback, Softcover reprint of the original 1st ed.... Advances in Ubiquitous Networking - Proceedings of the UNet'15 (Paperback, Softcover reprint of the original 1st ed. 2016)
Essaid Sabir, Hicham Medromi, Mohamed Sadik
R5,516 Discovery Miles 55 160 Ships in 10 - 15 working days

This volume publishes new trends and findings in hot topics related to ubiquitous computing/networking. It is the outcome of UNet - ainternational scientific event that took place on September 08-10, 2015, in the fascinating city of Casablanca, Morocco. UNet'15 is technically sponsored by IEEE Morocco Section and IEEE COMSOC Morocco Chapter.

Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Paperback, Softcover reprint of the original 1st ed. 2017):... Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Paperback, Softcover reprint of the original 1st ed. 2017)
H. R. Vishwakarma, Shyam Akashe
R5,475 Discovery Miles 54 750 Ships in 10 - 15 working days

The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.

Wireless Networking and Mobile Data Management (Paperback, Softcover reprint of the original 1st ed. 2017): R.K. Ghosh Wireless Networking and Mobile Data Management (Paperback, Softcover reprint of the original 1st ed. 2017)
R.K. Ghosh
R4,315 Discovery Miles 43 150 Ships in 10 - 15 working days

This book examines two main topics, namely, Wireless Networking and Mobile Data Management. It is designed around a course the author began teaching to senior undergraduate and master's students at the Department of Computer Science & Engineering of the Indian Institute of Technology Kanpur. The first part of the book, consisting of eight chapters, including the introduction, focuses exclusively on wireless networking aspects. It begins with cellular communication systems, which provided the foundation of wireless networking principles. Three subsequent chapters are devoted to the Global System for Mobile communication (GSM), Wireless Local Area Network (WLAN), Bluetooth, infrared (IR), ZigBee and 6LoWPAN protocols. There is also a chapter on routings in ad hoc networks, an area that is currently being intensively researched due to its potential applications in areas of vehicular network, traffic management, tactical and military systems. Furthermore, the book discusses mobile operating systems and wireless network application level protocols such as Wireless Application Protocols (WAP), Mobile IP and Mosh. The second part highlights mobile data management. It addresses the issues like location management, the importance of replication and caching in mobile environments, the concept of broadcast disk and indexing in air, storage systems for sharing data in mobile environments, and building smart environments. Given that the design of algorithms is the key to applications in data management; this part begins with a chapter on the type of paradigm shift that has been introduced in the design of algorithms, especially due to asymmetry in mobile environments. Lastly, the closing chapter of the book explores smart environments, showing the readers how wireless technology and mobile data management can be combined to provide optimum comfort for human life. Though the book has been structured as a monograph, it can be used both as a textbook and as a reference material for researchers and developers working in the area.

Concurrency Control in Distributed System Using Mutual Exclusion (Paperback, Softcover reprint of the original 1st ed. 2018):... Concurrency Control in Distributed System Using Mutual Exclusion (Paperback, Softcover reprint of the original 1st ed. 2018)
Sukhendu Kanrar, Nabendu Chaki, Samiran Chattopadhyay
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

The book presents various state-of-the-art approaches for process synchronization in a distributed environment. The range of algorithms discussed in the book starts from token based mutual exclusion algorithms that work on tree based topology. Then there are interesting solutions for more flexible logical topology like a directed graph, with or without cycle. In a completely different approach, one of the chapters presents two recent voting-based DME algorithms. All DME algorithms presented in the book aim to ensure fairness in terms of first come first serve (FCFS) order among equal priority processes. At the same time, the solutions consider the priority of the requesting processes and allocate resource for the earliest request when no such request from a higher priority process is pending.

Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings... Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings (Paperback, 1st ed. 2018)
Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar
R1,530 Discovery Miles 15 300 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.

Mining Over Air: Wireless Communication Networks Analytics (Paperback, Softcover reprint of the original 1st ed. 2018): Ye... Mining Over Air: Wireless Communication Networks Analytics (Paperback, Softcover reprint of the original 1st ed. 2018)
Ye Ouyang, Mantian Hu, Alexis Huet, Zhongyuan Li
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book introduces the concepts, applications and development of data science in the telecommunications industry by focusing on advanced machine learning and data mining methodologies in the wireless networks domain. Mining Over Air describes the problems and their solutions for wireless network performance and quality, device quality readiness and returns analytics, wireless resource usage profiling, network traffic anomaly detection, intelligence-based self-organizing networks, telecom marketing, social influence, and other important applications in the telecom industry. Written by authors who study big data analytics in wireless networks and telecommunication markets from both industrial and academic perspectives, the book targets the pain points in telecommunication networks and markets through big data. Designed for both practitioners and researchers, the book explores the intersection between the development of new engineering technology and uses data from the industry to understand consumer behavior. It combines engineering savvy with insights about human behavior. Engineers will understand how the data generated from the technology can be used to understand the consumer behavior and social scientists will get a better understanding of the data generation process.

Trusted Computing and Information Security - 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised... Trusted Computing and Information Security - 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Huanguo Zhang, Bo Zhao, Fei Yan
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018. The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.

Emerging Technologies for Authorization and Authentication - First International Workshop, ETAA 2018, Barcelona, Spain,... Emerging Technologies for Authorization and Authentication - First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings (Paperback, 1st ed. 2018)
Andrea Saracino, Paolo Mori
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the proceedings of the First International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2018, held in Barcelona, Spain, in September 2018. The 10 papers presented in this volume were carefully reviewed and selected from 16 submissions. They were organized in two parts: authentication and authorization techniques and violation detection and countermeasures.

Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part II... Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Amos Beimel, Stefan Dziembowski
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Inside Radio: An Attack and Defense Guide (Paperback, Softcover reprint of the original 1st ed. 2018): Qing Yang, Lin Huang Inside Radio: An Attack and Defense Guide (Paperback, Softcover reprint of the original 1st ed. 2018)
Qing Yang, Lin Huang
R2,097 Discovery Miles 20 970 Ships in 10 - 15 working days

This book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. The book also offers detailed case studies and theoretical treatments - specifically it lists numerous laboratory procedures, results, plots, commands and screenshots from real-world experiments. It is a valuable reference guide for practitioners and researchers who want to learn more about the advanced research findings and use the off-the-shelf tools to explore the wireless world.

Digital Signal Processing - Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 2018): K. Deergha Rao,... Digital Signal Processing - Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 2018)
K. Deergha Rao, M.N.S. Swamy
R2,221 Discovery Miles 22 210 Ships in 10 - 15 working days

The book provides a comprehensive exposition of all major topics in digital signal processing (DSP). With numerous illustrative examples for easy understanding of the topics, it also includes MATLAB-based examples with codes in order to encourage the readers to become more confident of the fundamentals and to gain insights into DSP. Further, it presents real-world signal processing design problems using MATLAB and programmable DSP processors. In addition to problems that require analytical solutions, it discusses problems that require solutions using MATLAB at the end of each chapter. Divided into 13 chapters, it addresses many emerging topics, which are not typically found in advanced texts on DSP. It includes a chapter on adaptive digital filters used in the signal processing problems for faster acceptable results in the presence of changing environments and changing system requirements. Moreover, it offers an overview of wavelets, enabling readers to easily understand the basics and applications of this powerful mathematical tool for signal and image processing. The final chapter explores DSP processors, which is an area of growing interest for researchers. A valuable resource for undergraduate and graduate students, it can also be used for self-study by researchers, practicing engineers and scientists in electronics, communications, and computer engineering as well as for teaching one- to two-semester courses.

Topics in Parallel and Distributed Computing - Enhancing the Undergraduate Curriculum: Performance, Concurrency, and... Topics in Parallel and Distributed Computing - Enhancing the Undergraduate Curriculum: Performance, Concurrency, and Programming on Modern Platforms (Paperback, Softcover reprint of the original 1st ed. 2018)
Sushil K. Prasad, Anshul Gupta, Arnold Rosenberg, Alan Sussman, Charles Weems
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

This book introduces beginning undergraduate students of computing and computational disciplines to modern parallel and distributed programming languages and environments, including map-reduce, general-purpose graphics processing units (GPUs), and graphical user interfaces (GUI) for mobile applications. The book also guides instructors via selected essays on what and how to introduce parallel and distributed computing topics into the undergraduate curricula, including quality criteria for parallel algorithms and programs, scalability, parallel performance, fault tolerance, and energy efficiency analysis. The chapters designed for students serve as supplemental textual material for early computing core courses, which students can use for learning and exercises. The illustrations, examples, and sequences of smaller steps to build larger concepts are also tools that could be inserted into existing instructor material. The chapters intended for instructors are written at a teaching level and serve as a rigorous reference to include learning goals, advice on presentation and use of the material, within early and advanced undergraduate courses. Since Parallel and Distributed Computing (PDC) now permeates most computing activities, imparting a broad-based skill set in PDC technology at various levels in the undergraduate educational fabric woven by Computer Science (CS) and Computer Engineering (CE) programs as well as related computational disciplines has become essential. This book and others in this series aim to address the need for lack of suitable textbook support for integrating PDC-related topics into undergraduate courses, especially in the early curriculum. The chapters are aligned with the curricular guidelines promulgated by the NSF/IEEE-TCPP Curriculum Initiative on Parallel and Distributed Computing for CS and CE students and with the CS2013 ACM/IEEE Computer Science Curricula.

Frontiers in Cyber Security - First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings... Frontiers in Cyber Security - First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings (Paperback, 1st ed. 2018)
Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang
R1,476 Discovery Miles 14 760 Ships in 10 - 15 working days

This book constitutes the proceedings of the First International Conference on Frontiers in Cyber Security, held in Chengdu, China, in November 2018. The 18 full papers along with the3 short papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections, namely: symmetric key cryptography, public key cryptography, post-quantum cryptography, cloud security and data deduplication, access control, attack and behavior detection, system and network security, security design.

Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part I... Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Amos Beimel, Stefan Dziembowski
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Radio Frequency Cell Site Engineering Made Easy (Paperback, 1st ed. 2019): Saleh Faruque Radio Frequency Cell Site Engineering Made Easy (Paperback, 1st ed. 2019)
Saleh Faruque
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book introduces Radio Frequency Cell Site Engineering to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications. The presentation is designed to be easily accessible, minimizing mathematics and maximizing visuals.

Ubiquitous Networking - 4th International Symposium, UNet 2018, Hammamet, Tunisia, May 2 - 5, 2018, Revised Selected Papers... Ubiquitous Networking - 4th International Symposium, UNet 2018, Hammamet, Tunisia, May 2 - 5, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Noureddine Boudriga, Mohamed-Slim Alouini, Slim Rekhis, Essaid Sabir, Sofie Pollin
R1,509 Discovery Miles 15 090 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Symposium on Ubiquitous Networking, UNet 2018, held in Hammamet, Morocco, in May 2018. The 35 full papers presented together with 5 short papers in this volume were carefully reviewed and selected from 87 submissions. The focus of UNet is on technical challenges and solutions related to such a widespread adoption of networking technologies, including broadband multimedia, machine-to-machine applications, Internet of things, security and privacy, data engineering, sensor networks and RFID technologies.

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,583 Discovery Miles 15 830 Ships in 10 - 15 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, … Hardcover R3,259 Discovery Miles 32 590
Reconfigurable Intelligent…
Hongliang Zhang, Boya Di, … Hardcover R4,586 Discovery Miles 45 860
Industrial IoT - Challenges, Design…
Ismail Butun Hardcover R4,586 Discovery Miles 45 860
6G Mobile Wireless Networks
Yulei Wu, Sukhdeep Singh, … Hardcover R4,610 Discovery Miles 46 100
Intelligent Resource Management for…
Qiang Ye, Weihua Zhuang Hardcover R3,939 Discovery Miles 39 390
Big Data in Emergency Management…
Rajendra Akerkar Hardcover R4,259 Discovery Miles 42 590
Full-Duplex Communications for Future…
Hirley Alves, Taneli Riihonen, … Hardcover R2,830 Discovery Miles 28 300
Information Technology in Disaster Risk…
Yuko Murayama, Dimiter Velev, … Hardcover R2,830 Discovery Miles 28 300
Machine Learning, Deep Learning and…
E.S. Gopi Hardcover R6,285 Discovery Miles 62 850
5G and Beyond - Fundamentals and…
Xingqin Lin, Namyoon Lee Hardcover R4,618 Discovery Miles 46 180

 

Partners