0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (11)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 13 of 13 matches in All Departments

Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings... Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings (Paperback, 2012 ed.)
Feng Bao, Pierangela Samarati, Jianying Zhou
R1,649 Discovery Miles 16 490 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.

Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011,... Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings (Paperback, Edition.)
Feng Bao, Jian Weng
R1,610 Discovery Miles 16 100 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.

Information Security Practice and Experience - 5th International Conference, ISPEC 2009 Xi'an, China, April 13-15, 2009... Information Security Practice and Experience - 5th International Conference, ISPEC 2009 Xi'an, China, April 13-15, 2009 Proceedings (Paperback, 2009 ed.)
Feng Bao, Hui Li, Guilin Wang
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

The 5th International Conference on Information Security Practice and Expe- ence (ISPEC 2009) was held in Xi'an, China, April 13-15, 2009. The ISPEC conference series is an established forum that brings together - searchers and practitioners to provide a con?uence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors. In previous years, ISPEC has taken place in Sin- pore (2005), Hangzhou, China (2006), Hong Kong, China (2007), and Sydney, Australia (2008). For all sessions, as this one, the conference proceedings were published by Springer in the Lecture Notes in Computer Science series. In total, 147 papers from 26 countries were submitted to ISPEC 2009, and 34 were ?nally selected for inclusion in the proceedings (acceptance rate 23%). The accepted papers cover multiple topics of information security and applied cryptography. Each submission was anonymously reviewed by at least three - viewers. We are grateful to the Program Committee, which was composed of more than 40 well-known security experts from 15 countries; we heartily thank them as well as all external reviewers for their time and valued contributions to the tough and time-consuming reviewing process. Inadditiontothe regularpaperpresentations,the programalsofeaturedfour invited talks by Yupu Hu, from Xidian University, China; Youki Kadobayashi, from Nara Institute of Science and Technology, Japan; Mark Ryan, from the University of Birmingham, UK; and Gene Tsudik, from the University of C- ifornia at Irvine, USA. We are grateful to them for accepting our invitation to speak at the conference.

Provable Security - Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings... Provable Security - Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings (Paperback, 2008 ed.)
Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai
R1,582 Discovery Miles 15 820 Ships in 10 - 15 working days

Thesecondinternationalconferenceonprovablesecurity, ProvSec2008, washeld in Shanghai, China, during October 30th - November 1st, 2008. The conference wassponsoredbyShanghaiJiaoTongUniversity(SJTU)incooperationwiththe Chinese Association for Cryptologic Research (CACR) and the Natural Science Foundation of China (NSFC). The aim of ProvSec is to provide a platform for researchers, scholars, and practitionerstoexchangeideasandextendknowledgeonprovablesecurity, which is an important research area in cryptography. The ?rst ProvSec was held in Wollongong, Australia, in 2007. This year, the conference received 79 papers and the program committee selected 25 papers during eight weeks' thorough reviewing process. The authors ofthe selected papersarefrom12 di?erentcountries: Australia, Belgium, China, Estonia, France, Germany, India, Japan, Norway, Singapore, the UK, and the USA. We are grateful to the members of the program committee for their many hours of valuable time and hard work. In addition to the regular conference program, the conference hosted two invited talks: - Kenny Paterson (University of London, Royal Holloway): Non-interactive Key Distribution and Identity-Based Encryption: A Historical Perspective - PhillipRogaway(University ofCalifornia, Davis): BlockcipherModes of- eration: Culture and Counter-Culture in Modern Cryptography. The conference was also one of the special events for the 50th anniversary of the Department of Computer Science at SJTU. We extend our gratitude to all the people involved in organizing ProvSec from the Department of Computer Science and Engineering and the Lab for InformationSecurityofShanghaiJiaoTongUniversity, inparticulartoYuLong, Yanfei Zheng, Meiju Chen, Zhihua Su, and Bo Zhu for their great e?orts in making the conference run smoot

Cryptology and Network Security - 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings... Cryptology and Network Security - 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings (Paperback, 2007 ed.)
Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing
R1,560 Discovery Miles 15 600 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007.

The 17 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.

Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings... Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings (Paperback, 2006 ed.)
Jianying Zhou, Moti Yung, Feng Bao
R3,192 Discovery Miles 31 920 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, held in Singapore in June 2006. Book presents 33 revised full papers, organized in topical sections on intrusion detection and avoidance, cryptographic applications, DoS attacks and countermeasures, key management, cryptanalysis, security of limited devices, cryptography, authentication and Web security, ad-hoc and sensor network security, cryptographic constructions, and security and privacy.

Information Security - 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings (Paperback, 2005... Information Security - 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings (Paperback, 2005 ed.)
Jianying Zhou, Robert H. Deng, Feng Bao
R1,806 Discovery Miles 18 060 Ships in 10 - 15 working days

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought together individuals from academia and - dustry involvedin manyresearchdisciplines of information security to foster the exchange of ideas. During recent years this conference has tried to place special emphasis on the practical aspects of information security, and since it passed from being an international workshop to being an international conference in 2001, it has become one of the most relevant forums at which researchers meet and discuss emerging security challenges and solutions. Advised by the ISC Steering Committee, and in order to provide students with more opportunities for publication, ISC 2005 accepted extra student papers - sides the regular papers. The initiative was very well accepted by the young sector of the scienti?c community, and we hope that the success of this idea will remainfornextISCevents. AnotherimportantfactorforthesuccessofISC2005 was that selected papers in the proceedings will be invited for submission to a special issue of the InternationalJournalof InformationSecurity. The result was an incredible response to the call for papers; we received 271 submissions, the highest since ISC events started. It goes without saying that the paper selection process was more competitive and di?cult than ever before - only 33 regular papers were accepted, plus 5 student papers for a special student session.

Information Security Practice and Experience - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005,... Information Security Practice and Experience - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Paperback, 2005 ed.)
Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou
R1,601 Discovery Miles 16 010 Ships in 10 - 15 working days

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission, reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference

Public Key Cryptography -- PKC 2004 - 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore,... Public Key Cryptography -- PKC 2004 - 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 (Paperback, 2004 ed.)
Feng Bao, Robert Deng, Jianying Zhou
R1,768 Discovery Miles 17 680 Ships in 10 - 15 working days

PKC2004wasthe7thInternationalWorkshoponPracticeandTheoryinPublic Key Cryptography and was sponsored by IACR, the International Association for Cryptologic Research (www. iacr. org). This year the workshop was organized 2 in cooperation with the Institute for Infocomm Research (I R), Singapore. There were 106 paper submissions from 19 countries to PKC 2004. That is the highest submission number in PKC history. Due to the large number of submissionsandthehighqualityofthe submittedpapers, notallthepapersthat contained new ideas were accepted. Of the 106 submissions, 32 were selected for the proceedings. Each paper was sent to at least 3 members of the Program Committee for comments. The revised versions of the accepted papers were not checked for correctness of their scienti?c aspects and the authors bear the full responsibility for the contents of their papers. Some authors will write ?nal versions of their papers for publication in refereed journals. I am very grateful to the members of the Program Committee for their hard work in the di?cult task of selecting fewer than 1 in 3 of the submitted papers, as well as the following external referees who helped the Program Committee: Nuttapong Attrapadung, RobertoMariaAvanzi, GildasAvoine, JoonsangBaek, Qingjun Cai, Jae Choon Cha, Chien-Ning Chen, Liqun Chen, Xiaofeng Chen, Koji Chida, Nicolas T. Courtois, Yang Cui, Jean-Franco, is Dhem, Louis Goubin, Louis Granboulan, Rob Granger, Jens Groth, Yumiko Hanaoka, Darrel Hank- son, Chao-ChihHsu, TetsutaroKobayashi, YuichiKomano, HidenoriKuwakado, TanjaLange, PeterLeadbitter, ByoungcheonLee, Chun-KoLee, HenryC. J. Lee, JohnMaloneLee, YongLi, Beno tLibert, Hsi-ChungLin, YiLu, JeanMonnerat, Anderson C. A. Nas

Information and Communications Security - 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings... Information and Communications Security - 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings (Paperback, 2002 ed.)
Robert H. Deng, Feng Bao, Jianying Zhou
R1,794 Discovery Miles 17 940 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Conference on Information and Communication Security, ICICS 2002, held in Singapore in December 2002. The 41 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on system security, crypto systems, security protocols, fingerprinting and watermarking, efficient implementation of algorithms, access control, and cryptanalysis and cryptographic techniques.

Information Security Practice and Experience - 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021,... Information Security Practice and Experience - 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings (Paperback, 1st ed. 2021)
Robert Deng, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, …
R2,358 Discovery Miles 23 580 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th International Conference on Information Security Practice and Experience, ISPEC 2021, held in Nanjing, China, in December 2021. The 23 full papers presented in this volume were carefully reviewed and selected from 94 submissions. The conference focus on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.

Computational Reconstruction of Missing Data in Biological Research (Paperback, 1st ed. 2021): Feng Bao Computational Reconstruction of Missing Data in Biological Research (Paperback, 1st ed. 2021)
Feng Bao
R1,503 Discovery Miles 15 030 Ships in 10 - 15 working days

The emerging biotechnologies have significantly advanced the study of biological mechanisms. However, biological data usually contain a great amount of missing information, e.g. missing features, missing labels or missing samples, which greatly limits the extensive usage of the data. In this book, we introduce different types of biological data missing scenarios and propose machine learning models to improve the data analysis, including deep recurrent neural network recovery for feature missings, robust information theoretic learning for label missings and structure-aware rebalancing for minor sample missings. Models in the book cover the fields of imbalance learning, deep learning, recurrent neural network and statistical inference, providing a wide range of references of the integration between artificial intelligence and biology. With simulated and biological datasets, we apply approaches to a variety of biological tasks, including single-cell characterization, genome-wide association studies, medical image segmentations, and quantify the performances in a number of successful metrics.The outline of this book is as follows. In Chapter 2, we introduce the statistical recovery of missing data features; in Chapter 3, we introduce the statistical recovery of missing labels; in Chapter 4, we introduce the statistical recovery of missing data sample information; finally, in Chapter 5, we summarize the full text and outlook future directions. This book can be used as references for researchers in computational biology, bioinformatics and biostatistics. Readers are expected to have basic knowledge of statistics and machine learning.

Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18,... Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings (Paperback, 1st ed. 2016)
Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang
R2,715 Discovery Miles 27 150 Ships in 10 - 15 working days

This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
LocknLock Pet Dry Food Container (1.6L)
R91 Discovery Miles 910
Pure Pleasure Electric Heating Pad (30 x…
 (2)
R599 R428 Discovery Miles 4 280
Barbie
Margot Robbie, Ryan Gosling Blu-ray disc R266 Discovery Miles 2 660
Hot Wheels Aluminium Bottle…
R128 Discovery Miles 1 280
Sylvanian Families - Walnut Squirrel…
R749 R579 Discovery Miles 5 790
Wildberry Bath Mat (Blue)
R89 R40 Discovery Miles 400
MyNotes A5 Rainbow Bands Notebook
Paperback R50 R42 Discovery Miles 420
An Evening With Silk Sonic
Bruno Mars, Anderson .Paak, … CD  (2)
R155 Discovery Miles 1 550
Meet The Moonlight
Jack Johnson CD R430 Discovery Miles 4 300
Cable Guys Controller and Smartphone…
R399 R349 Discovery Miles 3 490

 

Partners