0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (26)
  • R2,500 - R5,000 (36)
  • -
Status
Brand

Showing 1 - 25 of 62 matches in All Departments

Essentials of Blockchain Technology (Hardcover): Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino Essentials of Blockchain Technology (Hardcover)
Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino
R2,616 Discovery Miles 26 160 Ships in 12 - 17 working days

Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcing and crowdsensing, 5G, trust management, and finance. The popularity and rapid development of Blockchain brings many technical and regulatory challenges for research and academic communities. This book will feature contributions from experts on topics related to performance, benchmarking, durability, robustness, as well data gathering and management, algorithms, analytics techniques for transactions processing, and implementation of applications.

Essentials of Blockchain Technology (Paperback): Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino Essentials of Blockchain Technology (Paperback)
Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino
R1,466 Discovery Miles 14 660 Ships in 12 - 17 working days

Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcing and crowdsensing, 5G, trust management, and finance. The popularity and rapid development of Blockchain brings many technical and regulatory challenges for research and academic communities. This book will feature contributions from experts on topics related to performance, benchmarking, durability, robustness, as well data gathering and management, algorithms, analytics techniques for transactions processing, and implementation of applications.

Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021,... Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Xingming Sun, Xiao Rui Zhang, Zhihua Xia, Elisa Bertino
R3,104 Discovery Miles 31 040 Ships in 10 - 15 working days

The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.

Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021,... Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III (Paperback, 1st ed. 2021)
Xingming Sun, Xiao Rui Zhang, Zhihua Xia, Elisa Bertino
R3,109 Discovery Miles 31 090 Ships in 10 - 15 working days

The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.

Cyber Security Meets Machine Learning (Hardcover, 1st ed. 2021): Xiaofeng Chen, Willy Susilo, Elisa Bertino Cyber Security Meets Machine Learning (Hardcover, 1st ed. 2021)
Xiaofeng Chen, Willy Susilo, Elisa Bertino
R4,227 Discovery Miles 42 270 Ships in 10 - 15 working days

Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.

Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings,... Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Xingming Sun, Jinwei Wang, Elisa Bertino
R3,101 Discovery Miles 31 010 Ships in 10 - 15 working days

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.

Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings,... Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Xingming Sun, Jinwei Wang, Elisa Bertino
R3,096 Discovery Miles 30 960 Ships in 10 - 15 working days

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,677 Discovery Miles 16 770 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,678 Discovery Miles 16 780 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part IV (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,676 Discovery Miles 16 760 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,681 Discovery Miles 16 810 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,705 Discovery Miles 17 050 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part VI (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,706 Discovery Miles 17 060 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part V (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,706 Discovery Miles 17 060 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,705 Discovery Miles 17 050 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IV (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,697 Discovery Miles 16 970 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part III (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,699 Discovery Miles 16 990 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

Roles, Trust, and Reputation in Social Media Knowledge Markets - Theory and Methods (Paperback, Softcover reprint of the... Roles, Trust, and Reputation in Social Media Knowledge Markets - Theory and Methods (Paperback, Softcover reprint of the original 1st ed. 2015)
Elisa Bertino, Sorin Adam Matei
R2,157 Discovery Miles 21 570 Ships in 10 - 15 working days

Knowledge and expertise, especially of the kind that can shape public opinion, have been traditionally the domain of individuals holding degrees awarded by higher learning institutions or occupying formal positions in notable organizations. Expertise is validated by reputations established in an institutionalized marketplace of ideas with a limited number of "available seats" and a stringent process of selection and retention of names, ideas, topics and facts of interest. However, the social media revolution, which has enabled over two billion Internet users not only to consume, but also to produce information and knowledge, has created a secondary and very active informal marketplace of ideas and knowledge. Anchored by platforms like Wikipedia, YouTube, Facebook and Twitter, this informal marketplace has low barriers to entry and has become a gigantic and potentially questionable, knowledge resource for the public at large. Roles, Trust and Reputation in Social Media Knowledge Markets will discuss some of the emerging trends in defining, measuring and operationalizing reputation as a new and essential component of the knowledge that is generated and consumed online. The book will propose a future research agenda related to these issues. The ultimate goal of research agenda being to shape the next generation of theoretical and analytic strategies needed for understanding how knowledge markets are influenced by social interactions and reputations built around functional roles. The authors, including leading scholars and young innovators, will share with the readers some of the main lessons they have learned from their own work in these areas and will discuss the issues, topics and sub-areas that they find under-studied or that promise the greatest intellectual payoff in the future. The discussion will be placed in the context of social network analysis and "big data" research. Roles, Trust and Reputation in Social Media Knowledge Markets exposes issues that have not been satisfactorily dealt with in the current literature, as the research agenda in reputation and authorship is still emerging. In a broader sense, the volume aims to change the way in which knowledge generation in social media spaces is understood and utilized. The tools, theories and methodologies proposed by the contributors offer concrete avenues for developing the next generation of research strategies and applications that will help: tomorrow's information consumers make smarter choices, developers to create new tools and researchers to launch new research programs.

Security for Web Services and Service-Oriented Architectures (Paperback, 2010 ed.): Elisa Bertino, Lorenzo Martino, Federica... Security for Web Services and Service-Oriented Architectures (Paperback, 2010 ed.)
Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Squicciarini
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards,anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace all those new collaborative applications and to indicate a new, "social" approach to generating and distributing Web content, characterized by open communication, decentralization of authority, and freedom to share and reuse. For Web services technologies to hold their promise, it is crucial that - curity of services and their interactions with users be assured. Con?dentiality, integrity,availability,anddigitalidentitymanagementareallrequired.People need to be assured that their interactions with services over the Web are kept con?dential and the privacy of their personal information is preserved. People need to be sure that information they use for looking up and selecting s- vicesiscorrectanditsintegrityisassured.Peoplewantservicestobeavailable when needed. They also require interactions to be convenient and person- ized, in addition to being private. Addressing these requirements, especially when dealing with open distributed applications, is a formidable challenge.

Roles, Trust, and Reputation in Social Media Knowledge Markets - Theory and Methods (Hardcover, 2015 ed.): Elisa Bertino, Sorin... Roles, Trust, and Reputation in Social Media Knowledge Markets - Theory and Methods (Hardcover, 2015 ed.)
Elisa Bertino, Sorin Adam Matei
R2,402 Discovery Miles 24 020 Ships in 10 - 15 working days

Knowledge and expertise, especially of the kind that can shape public opinion, have been traditionally the domain of individuals holding degrees awarded by higher learning institutions or occupying formal positions in notable organizations. Expertise is validated by reputations established in an institutionalized marketplace of ideas with a limited number of "available seats" and a stringent process of selection and retention of names, ideas, topics and facts of interest. However, the social media revolution, which has enabled over two billion Internet users not only to consume, but also to produce information and knowledge, has created a secondary and very active informal marketplace of ideas and knowledge. Anchored by platforms like Wikipedia, YouTube, Facebook and Twitter, this informal marketplace has low barriers to entry and has become a gigantic and potentially questionable, knowledge resource for the public at large. Roles, Trust and Reputation in Social Media Knowledge Markets will discuss some of the emerging trends in defining, measuring and operationalizing reputation as a new and essential component of the knowledge that is generated and consumed online. The book will propose a future research agenda related to these issues. The ultimate goal of research agenda being to shape the next generation of theoretical and analytic strategies needed for understanding how knowledge markets are influenced by social interactions and reputations built around functional roles. The authors, including leading scholars and young innovators, will share with the readers some of the main lessons they have learned from their own work in these areas and will discuss the issues, topics and sub-areas that they find under-studied or that promise the greatest intellectual payoff in the future. The discussion will be placed in the context of social network analysis and "big data" research. Roles, Trust and Reputation in Social Media Knowledge Markets exposes issues that have not been satisfactorily dealt with in the current literature, as the research agenda in reputation and authorship is still emerging. In a broader sense, the volume aims to change the way in which knowledge generation in social media spaces is understood and utilized. The tools, theories and methodologies proposed by the contributors offer concrete avenues for developing the next generation of research strategies and applications that will help: tomorrow's information consumers make smarter choices, developers to create new tools and researchers to launch new research programs.

Homomorphic Encryption and Applications (Paperback, 2014 ed.): Xun Yi, Russell Paulet, Elisa Bertino Homomorphic Encryption and Applications (Paperback, 2014 ed.)
Xun Yi, Russell Paulet, Elisa Bertino
R2,625 Discovery Miles 26 250 Ships in 10 - 15 working days

This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.

RFID Security and Privacy (Paperback): Yingjiu Li, Robert Deng, Elisa Bertino RFID Security and Privacy (Paperback)
Yingjiu Li, Robert Deng, Elisa Bertino
R1,095 Discovery Miles 10 950 Ships in 10 - 15 working days

As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area.

Private Information Retrieval (Paperback): Xun Yi, Russell Paulet, Elisa Bertino Private Information Retrieval (Paperback)
Xun Yi, Russell Paulet, Elisa Bertino
R1,078 Discovery Miles 10 780 Ships in 10 - 15 working days

This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single-database PIR techniques, this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.

Indexing Techniques for Advanced Database Systems (Paperback, Softcover reprint of the original 1st ed. 1997): Elisa Bertino,... Indexing Techniques for Advanced Database Systems (Paperback, Softcover reprint of the original 1st ed. 1997)
Elisa Bertino, Beng Chin Ooi, Ron Sacks-Davis, Kian-Lee Tan, Justin Zobel, …
R4,475 Discovery Miles 44 750 Ships in 10 - 15 working days

Recent years have seen an explosive growth in the use of new database applications such as CAD/CAM systems, spatial information systems, and multimedia information systems. The needs of these applications are far more complex than traditional business applications. They call for support of objects with complex data types, such as images and spatial objects, and for support of objects with wildly varying numbers of index terms, such as documents. Traditional indexing techniques such as the B-tree and its variants do not efficiently support these applications, and so new indexing mechanisms have been developed. As a result of the demand for database support for new applications, there has been a proliferation of new indexing techniques. The need for a book addressing indexing problems in advanced applications is evident. For practitioners and database and application developers, this book explains best practice, guiding the selection of appropriate indexes for each application. For researchers, this book provides a foundation for the development of new and more robust indexes. For newcomers, this book is an overview of the wide range of advanced indexing techniques. Indexing Techniques for Advanced Database Systems is suitable as a secondary text for a graduate level course on indexing techniques, and as a reference for researchers and practitioners in industry.

Distributed and Parallel Database Object Management (Paperback, Softcover reprint of the original 1st ed. 1994): Elisa Bertino,... Distributed and Parallel Database Object Management (Paperback, Softcover reprint of the original 1st ed. 1994)
Elisa Bertino, Tamer OEzsu
R4,434 Discovery Miles 44 340 Ships in 10 - 15 working days

Distributed and Parallel Database Object Management brings together in one place important contributions and state-of-the-art research results in this rapidly advancing area of computer science. Distributed and Parallel Database Object Management serves as an excellent reference, providing insights into some of the most important issues in the field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Jabra Elite 5 Hybrid ANC True Wireless…
R2,899 R2,399 Discovery Miles 23 990
Snappy Tritan Bottle (1.5L)(Green)
R229 R180 Discovery Miles 1 800
Gym Towel & Bag
R78 Discovery Miles 780
Professor Snape Wizard Wand - In…
 (8)
R832 Discovery Miles 8 320
Anton Rupert - The Life Of A Business…
Ebbe Dommisse Paperback R395 R289 Discovery Miles 2 890
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Gold Fresh Couture by Moschino EDP 100ml…
R1,506 Discovery Miles 15 060
Elecstor GU-10 5W Rechargeable LED Bulb…
R69 R59 Discovery Miles 590
Art Puzzle Animal Party (24Pieces)
R79 R74 Discovery Miles 740

 

Partners