0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (9)
  • R2,500 - R5,000 (8)
  • -
Status
Brand

Showing 1 - 17 of 17 matches in All Departments

Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011,... Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers (Paperback, 2012)
Jan Camenisch, Dogan Kesdogan
R1,518 Discovery Miles 15 180 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2011, held in Lucerne, Switzerland, in June 2011, co-located and under the auspices of IFIP SEC 2011, the 26th IFIP TC-11 International Information Security Conference. The 12 revised full papers were carefully reviewed and selected from 28 initial submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on assisting users, malware detection, saving energy, policies, and problems in the cloud.

Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018,... Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings (Paperback, 1st ed. 2018)
Jan Camenisch, Panos Papadimitratos
R1,632 Discovery Miles 16 320 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018. The 26 full papers were carefully reviewed and selected from 79 submissions. The papers are organized in the following topical sections: privacy; Internet misbehavior and protection; malware; symmetric key cryptography; signatures; cryptanalysis; cryptographic primitives; and cryptographic protocols.

Attribute-based Credentials for Trust - Identity in the Information Society (Paperback, Softcover reprint of the original 1st... Attribute-based Credentials for Trust - Identity in the Information Society (Paperback, Softcover reprint of the original 1st ed. 2015)
Kai Rannenberg, Jan Camenisch, Ahmad Sabouri
R4,165 Discovery Miles 41 650 Ships in 10 - 15 working days

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them in actual production pilots, allowing provably accredited members of restricted communities to provide anonymous feedback on their community or its members. To date, credentials such as digitally signed pieces of personal information or other information used to authenticate or identify a user have not been designed to respect the users' privacy. They inevitably reveal the identity of the holder even though the application at hand often needs much less information, e.g. only the confirmation that the holder is a teenager or is eligible for social benefits. In contrast, Privacy-ABCs allow their holders to reveal only their minimal information required by the applications, without giving away their full identity information. Privacy-ABCs thus facilitate the implementation of a trustworthy and at the same time privacy-respecting digital society. The ABC4Trust project as a multidisciplinary and European project, gives a technological response to questions linked to data protection. Viviane Reding (Former Vice-president of the European Commission, Member of European Parliament)

Attribute-based Credentials for Trust - Identity in the Information Society (Hardcover): Kai Rannenberg, Jan Camenisch, Ahmad... Attribute-based Credentials for Trust - Identity in the Information Society (Hardcover)
Kai Rannenberg, Jan Camenisch, Ahmad Sabouri
R4,417 Discovery Miles 44 170 Ships in 10 - 15 working days

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them in actual production pilots, allowing provably accredited members of restricted communities to provide anonymous feedback on their community or its members. To date, credentials such as digitally signed pieces of personal information or other information used to authenticate or identify a user have not been designed to respect the users' privacy. They inevitably reveal the identity of the holder even though the application at hand often needs much less information, e.g. only the confirmation that the holder is a teenager or is eligible for social benefits. In contrast, Privacy-ABCs allow their holders to reveal only their minimal information required by the applications, without giving away their full identity information. Privacy-ABCs thus facilitate the implementation of a trustworthy and at the same time privacy-respecting digital society. The ABC4Trust project as a multidisciplinary and European project, gives a technological response to questions linked to data protection. Viviane Reding (Former Vice-president of the European Commission, Member of European Parliament)

Privacy and Identity Management for Life (Paperback, 2011 ed.): Jan Camenisch, Simone Fischer-Hubner, Kai Rannenberg Privacy and Identity Management for Life (Paperback, 2011 ed.)
Jan Camenisch, Simone Fischer-Hubner, Kai Rannenberg
R4,561 Discovery Miles 45 610 Ships in 10 - 15 working days

At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.

iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April... iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers (Paperback, 2010 ed.)
Jan Camenisch, Dogan Kesdogan
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand

Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24,... Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers (Paperback, Edition.)
Jan Camenisch, Costas Lambrinoudakis
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management.

Open Research Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6,... Open Research Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers (Paperback, 2011 ed.)
Jan Camenisch, Valentin Kisimov, Maria Dubovitskaya
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in March 2010. The 14 revised full papers presented together with an invited talk were carefully reviewed and selected during two rounds of refereeing. The papers are organized in topical sections on scheduling, adversaries, protecting resources, secure processes, and security for clouds.

iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April... iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers (Hardcover, 2010 ed.)
Jan Camenisch, Dogan Kesdogan
R1,662 Discovery Miles 16 620 Ships in 10 - 15 working days

The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand

Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers... Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers (Paperback, 2007 ed.)
Jan Camenisch, Christian Collberg, Neil F. Johnson, Phil Sallee
R1,604 Discovery Miles 16 040 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Information Hiding, IH 2006, held in Alexandria, VA, USA in July 2006.

The 25 revised full papers presented were carefully selected from over 70 papers submitted. The papers are organized in topical sections on watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.

Advances in Cryptology - EUROCRYPT 2004 - International Conference on the Theory and Applications of Cryptographic Techniques,... Advances in Cryptology - EUROCRYPT 2004 - International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings (Paperback, 2004 ed.)
Christian Cachin, Jan Camenisch
R3,277 Discovery Miles 32 770 Ships in 10 - 15 working days

These are the proceedings of Eurocrypt 2004, the 23rd Annual Eurocrypt C- ference. The conference was organized by members of the IBM Zurich Research Laboratory in cooperation with IACR, the International Association for Cr- tologic Research. Theconferencereceivedarecordnumberof206submissions,outofwhichthe program committee selected 36 for presentation at the conference (three papers were withdrawn by the authors shortly after submission). These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program also featured two invited talks. The ?rst one was the 2004 IACR Distinguished Lecture given by Whit?eld Di?e. The second invited talk was by Ivan Damg? ard who presented "Paradigms for Multiparty Computation. " The traditional rump session with short informal talks on recent results was chaired by Arjen Lenstra. The reviewing process was a challenging task, and many good submissions had to be rejected. Each paper was reviewed independently by at least three members of the program committee, and papers co-authored by a member of the program committee were reviewed by at least six (other) members. The individual reviewing phase was followed by profound and sometimes lively d- cussions about the papers, which contributed a lot to the quality of the ?nal selection. Extensive comments were sent to the authors in most cases.

Privacy and Identity Management. Time for a Revolution? - 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International... Privacy and Identity Management. Time for a Revolution? - 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers (Paperback, Softcover reprint of the original 1st ed. 2016)
David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hubner, Charles Raab
R2,653 Discovery Miles 26 530 Ships in 10 - 15 working days

This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.

Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised... Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Carlisle Adams, Jan Camenisch
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

This book contains revised selected papers from the 24th International Conference on Selected Areas in Cryptography, SAC 2017, held in Ottawa, ON, Canada in August 2017. The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. The focus of the conference was on specific themes in the area of cryptographic system design and analysis such as: Design and analysis of symmetric key cryptosystems Primitives for symmetric key cryptography, including block and stream ciphers, hash functions, and MAC algorithms Efficient implementations of symmetric and public key algorithms

Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015,... Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Jan Camenisch, Dogan Kesdogan
R1,922 Discovery Miles 19 220 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2015, held in Zurich, Switzerland, in October 2015. iNetSec is the main workshop of the IFIP working group WG 11.4; its objective is to present and discuss open problems and new research directions on all aspects related to network security. The 9 revised full papers presented in this volume were carefully reviewed and selected from 13 submissions. They were organized in topical sections named: network security; intrusion detection; anonymous communication; and cryptography.

Privacy and Identity Management. Time for a Revolution? - 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International... Privacy and Identity Management. Time for a Revolution? - 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers (Hardcover, 1st ed. 2016)
David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hubner, Charles Raab
R2,903 Discovery Miles 29 030 Ships in 10 - 15 working days

This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.

Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings (Paperback,... Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings (Paperback, 2014 ed.)
Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
R3,322 Discovery Miles 33 220 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.

Privacy and Identity Management for Life (Hardcover, 2011 ed.): Jan Camenisch, Simone Fischer-Hubner, Kai Rannenberg Privacy and Identity Management for Life (Hardcover, 2011 ed.)
Jan Camenisch, Simone Fischer-Hubner, Kai Rannenberg
R4,593 Discovery Miles 45 930 Ships in 10 - 15 working days

At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Anton Rupert - The Life Of A Business…
Ebbe Dommisse Paperback R395 R289 Discovery Miles 2 890
Space Blankets (Adult)
 (1)
R16 Discovery Miles 160
Tenet
John David Washington, Robert Pattinson, … DVD R53 Discovery Miles 530
Casals Electric Plastic Grass Trimmer…
R599 R169 Discovery Miles 1 690
Johnson's Baby Oil (125ml)
R40 Discovery Miles 400
Russell Hobbs Toaster (2 Slice…
R707 Discovery Miles 7 070
Simba ABC Elephant Ring Rattle
 (3)
R66 Discovery Miles 660
Munchkin Latch Pacifier & Designer Clip…
 (1)
R75 Discovery Miles 750
Moonology Diary 2024
Yasmin Boland Paperback R330 R258 Discovery Miles 2 580
ZA Cute Gold Drop Shaped Earrings
R439 R299 Discovery Miles 2 990

 

Partners