0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (12)
  • R2,500 - R5,000 (8)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 21 of 21 matches in All Departments

Trusted Systems - First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings (Paperback,... Trusted Systems - First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings (Paperback, 2010 ed.)
Liqun Chen, Moti Yung
R1,551 Discovery Miles 15 510 Ships in 10 - 15 working days

This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.

Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings (Paperback,... Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings (Paperback, 1st ed. 2018)
Liqun Chen, Mark Manulis, Steve Schneider
R1,633 Discovery Miles 16 330 Ships in 10 - 15 working days

This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.

Dynamics of Vehicle-Road Coupled System (Paperback, Softcover reprint of the original 1st ed. 2015): Shaopu Yang, Liqun Chen,... Dynamics of Vehicle-Road Coupled System (Paperback, Softcover reprint of the original 1st ed. 2015)
Shaopu Yang, Liqun Chen, Shaohua Li
R4,221 Discovery Miles 42 210 Ships in 10 - 15 working days

Vehicle dynamics and road dynamics are usually considered to be two largely independent subjects. In vehicle dynamics, road surface roughness is generally regarded as random excitation of the vehicle, while in road dynamics, the vehicle is generally regarded as a moving load acting on the pavement. This book suggests a new research concept to integrate the vehicle and the road system with the help of a tire model, and establishes a cross-subject research framework dubbed vehicle-pavement coupled system dynamics. In this context, the dynamics of the vehicle, road and the vehicle-road coupled system are investigated by means of theoretical analysis, numerical simulations and field tests. This book will be a valuable resource for university professors, graduate students and engineers majoring in automotive design, mechanical engineering, highway engineering and other related areas. Shaopu Yang is a professor and deputy president of Shijiazhuang Tiedao University, China; Liqun Chen is a professor at Shanghai University, Shanghai, China; Shaohua Li is a professor at Shijiazhuang Tiedao University, China.

Dynamics of Vehicle-Road Coupled System (Hardcover, 2015 ed.): Shaopu Yang, Liqun Chen, Shaohua Li Dynamics of Vehicle-Road Coupled System (Hardcover, 2015 ed.)
Shaopu Yang, Liqun Chen, Shaohua Li
R4,471 Discovery Miles 44 710 Ships in 10 - 15 working days

Vehicle dynamics and road dynamics are usually considered to be two largely independent subjects. In vehicle dynamics, road surface roughness is generally regarded as random excitation of the vehicle, while in road dynamics, the vehicle is generally regarded as a moving load acting on the pavement. This book suggests a new research concept to integrate the vehicle and the road system with the help of a tire model, and establishes a cross-subject research framework dubbed vehicle-pavement coupled system dynamics. In this context, the dynamics of the vehicle, road and the vehicle-road coupled system are investigated by means of theoretical analysis, numerical simulations and field tests. This book will be a valuable resource for university professors, graduate students and engineers majoring in automotive design, mechanical engineering, highway engineering and other related areas. Shaopu Yang is a professor and deputy president of Shijiazhuang Tiedao University, China; Liqun Chen is a professor at Shanghai University, Shanghai, China; Shaohua Li is a professor at Shijiazhuang Tiedao University, China.

Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings... Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings (Paperback, 2014 ed.)
Liqun Chen, Chris Mitchell
R2,331 Discovery Miles 23 310 Ships in 10 - 15 working days

This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.

Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014): Graeme Proudler, Liqun Chen, Chris Dalton Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014)
Graeme Proudler, Liqun Chen, Chris Dalton
R6,328 Discovery Miles 63 280 Ships in 10 - 15 working days

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers... Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers (Paperback, 2012)
Liqun Chen, Moti Yung, Liehuang Zhu
R1,579 Discovery Miles 15 790 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.

Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings (Paperback,... Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings (Paperback, 2011 ed.)
Liqun Chen
R1,623 Discovery Miles 16 230 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC 2011, held in Oxford, UK in December 2011. The 27 revised full papers presented together with one invited contribution were carefully reviewed and selected from 57 submissions. The papers cover a wide range of topics in the field of mathematics and computer science, including coding theory, homomorphic encryption, symmetric and public key cryptosystems, cryptographic functions and protocols, efficient pairing and scalar multiplication implementation, knowledge proof, and security analysis.

Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers... Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers (Paperback, 2011)
Liqun Chen, Moti Yung
R1,581 Discovery Miles 15 810 Ships in 10 - 15 working days

This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008.... Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings (Paperback, 2008 ed.)
Liqun Chen, Mark Ryan, Guilin Wang
R1,606 Discovery Miles 16 060 Ships in 10 - 15 working days

The10thInternationalConferenceonInformationandCommunicationsSecurity (ICICS) was held in Birmingham, UK, during 20-22 October 2008. The ICICS conference series is an established forum that brings together people working in di?erent ?elds of information and communications security from universities, researchinstitutes, industryandgovernmentinstitutions, andgivestheattendees the opportunity to exchange new ideas and investigate state-of-the-art devel- ments. In previous years, ICICS has taken place in China (2007, 2005, 2003, 2001, 1997), USA (2006), Spain (2004), Singapore (2002), and Australia (1999). On each occasion, as on this one, the proceedings were published in the Springer LNCS series. In total, 125 papers from 33 countries were submitted to ICICS 2008, and 27 were accepted covering multiple disciplines of information security and applied cryptography(acceptancerate22%).EachsubmissiontoICICS2008wasano- mously reviewed by three or four reviewers. We are grateful to the Programme Committee, whichwascomposedof57membersfrom12countries;wethankthem aswellasallexternalrefereesfortheirtimeandvaluedcontributionstothetough andtime-consuming reviewingprocess. In addition to the contributed speakers, the programme also featured three invitedspeakers.We aregratefulto JoshuaGuttman (The MITRE Corporation, USA), Peng Ning (North Carolina State University, USA), and Nigel Smart (University of Bristol, UK) for accepting our invitation to speak. ICICS 2008 was organised by the University of Birmingham and Hewlett Packard Laboratories. We gratefully acknowledge sponsorship from the UK - gineering and Physical Sciences Research Council (EPSRC), as well as Hewlett Packard and the University of Birmin

Information Security Practice and Experience - 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008... Information Security Practice and Experience - 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings (Paperback, 2008 ed.)
Liqun Chen, Yi Mu, Willy Susilo
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

The4thInformationSecurityPracticeandExperienceConference(ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, Australia, during April 21-23, 2008. The previous three conferences were held in Singapore in 2005, Hangzhou, China in 2006 and Hong Kong, China in 2007. As with the previous three conference proceedings, the proceedings of ISPEC 2008 were published in the LNCS series by Springer. Theconferencereceived95submissions, outofwhichtheProgramCommittee selected 29 papers for presentation at the conference. These papers are included in the proceedings. The accepted papers cover a range of topics in mathem- ics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve-basedsecuritypractice, securitycomputationandso forth.The conference proceedings contain revised versions of the selected papers. Since some of them were not checked again for correctness before publication, the authors (and not the ProgramCommittee)bear full responsibilityfor the contentsoftheir papers. In addition to the contributed papers, the program comprised two invited talks.TheinvitedspeakerswereVijayVaradharajan(MacquarieUniversity, A- tralia) and Robert Huijie Deng (Singapore Management University, Singapore). Special thanks are due to these speakers. Wewouldliketothankallthepeoplewhohelpedwiththeconferenceprogram and organization. First, we thank the Steering Committee for their guidance on the general format of the conference. We also heartily thank the Program Committee and the sub-reviewers listed on the following pages for their hard e?orts and time contributed to the review process, which took seven weeks. Each paper was carefully evaluated by at least two or three people. There was signi?cant online discussion about a large number of pape

Control of Axially Moving Systems (Paperback, 1st ed. 2022): Keum-Shik Hong, Liqun Chen, Phuong-Tung Pham, Xiaodong Yang Control of Axially Moving Systems (Paperback, 1st ed. 2022)
Keum-Shik Hong, Liqun Chen, Phuong-Tung Pham, Xiaodong Yang
R4,498 Discovery Miles 44 980 Ships in 10 - 15 working days

This book provides a comprehensive guideline on dynamic analysis and vibration control of axially moving systems. First, the mathematical models of various axially moving systems describing the string, beam, belt, and plate models are developed. Accordingly, dynamical issues such as the equilibrium configuration, critical velocity, stability, bifurcation, and further chaotic dynamics are analyzed. Second, this book covers the design of the control schemes based on the hitherto control strategies for axially moving systems: feedback control using the transfer function, variable structure control, control by regulating the axial velocity, wave cancellation approach, boundary control using the Lyapunov method, adaptive control, and hybrid control methods. Finally, according to the contents discussed in the book, specific aspects are outlined for initiating future research endeavors to be undertaken concerning axially moving systems. This book is useful to graduate students and researchers in industrial sectors such as continuous manufacturing systems, transport systems, power transmission systems, and lifting systems not to mention in academia.

Trusted Computing - Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009,  Proceedings (Paperback, 2009... Trusted Computing - Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings (Paperback, 2009 ed.)
Liqun Chen, Chris J. Mitchell, Andrew Martin
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

Thisvolumecontainsthe15paperspresentedinthetechnicalstrandoftheTrust 2009 conference, held in Oxford, UK in April 2009. Trust 2009 was the second international conference devoted to the technical and socio-economic aspects of trusted computing. The conference had two main strands, one devoted to technical aspects of trusted computing (addressed by these proceedings), and the other devoted to socio-economic aspects. Trust 2009 built on the successful Trust 2008 conference, held in Villach, Austria in March 2008. The proceedings of Trust 2008, containing 14 papers, were published in volume 4968 of the Lecture Notes in Computer Science series. ThetechnicalstrandofTrust2009contained15originalpapersonthedesign and application of trusted computing. For these proceedings the papers have been divided into four main categories, namely: - Implementation of trusted computing - Attestation - PKI for trusted computing - Applications of trusted computing The 15 papers included here were selected from a total of 33 submissions. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion. We believe that the result is a high-quality set of papers, some of which have been signi?cantly improved as a result of the refereeing process. We would also like to thank all the authors who submitted their papers to the technical strand of the Trust 2009 conference, all external referees, and all the attendees of the conference.

Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022,... Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings (Paperback, 1st ed. 2022)
Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati
R3,072 Discovery Miles 30 720 Ships in 10 - 15 working days

This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.

Control of Axially Moving Systems (Hardcover, 1st ed. 2022): Keum-Shik Hong, Liqun Chen, Phuong-Tung Pham, Xiaodong Yang Control of Axially Moving Systems (Hardcover, 1st ed. 2022)
Keum-Shik Hong, Liqun Chen, Phuong-Tung Pham, Xiaodong Yang
R4,531 Discovery Miles 45 310 Ships in 10 - 15 working days

This book provides a comprehensive guideline on dynamic analysis and vibration control of axially moving systems. First, the mathematical models of various axially moving systems describing the string, beam, belt, and plate models are developed. Accordingly, dynamical issues such as the equilibrium configuration, critical velocity, stability, bifurcation, and further chaotic dynamics are analyzed. Second, this book covers the design of the control schemes based on the hitherto control strategies for axially moving systems: feedback control using the transfer function, variable structure control, control by regulating the axial velocity, wave cancellation approach, boundary control using the Lyapunov method, adaptive control, and hybrid control methods. Finally, according to the contents discussed in the book, specific aspects are outlined for initiating future research endeavors to be undertaken concerning axially moving systems. This book is useful to graduate students and researchers in industrial sectors such as continuous manufacturing systems, transport systems, power transmission systems, and lifting systems not to mention in academia.

Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK,... Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider
R1,712 Discovery Miles 17 120 Ships in 10 - 15 working days

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.

Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK,... Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider
R1,712 Discovery Miles 17 120 Ships in 10 - 15 working days

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.

Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017,... Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings (Paperback, 1st ed. 2018)
Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu
R3,317 Discovery Miles 33 170 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security.

Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18,... Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings (Paperback, 1st ed. 2016)
Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang
R2,715 Discovery Miles 27 150 Ships in 10 - 15 working days

This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.

Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings (Paperback,... Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings (Paperback, 1st ed. 2016)
Liqun Chen, Jinguang Han
R2,764 Discovery Miles 27 640 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016. The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The papers are grouped in topical sections on attribute/role-based cryptography, data in cloud, searchable encryption, key management, encryption, leakage analysis, homomorphic encryption.

Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings... Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings (Paperback, 1st ed. 2015)
Liqun Chen, Shin'ichiro Matsuo
R2,368 Discovery Miles 23 680 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Security Standardisation Research, SSR 2015, held in Tokyo, Japan, in December 2015. The 13 papers presented in this volume were carefully reviewed and selected from 18 submissions. They are organized in topical sections named: bitcoin and payment; protocol and API; analysis on cryptographic algorithm; privacy; and trust and formal analysis.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dig & Discover: Ancient Egypt - Excavate…
Hinkler Pty Ltd Kit R263 Discovery Miles 2 630
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
Bostik Double-Sided Tape (18mm x 10m…
 (1)
R24 R22 Discovery Miles 220
Bostik Glu Dots - Extra Strength (64…
R48 Discovery Miles 480
Cadac Pizza Stone (33cm)
 (18)
R363 Discovery Miles 3 630
Bosch GBM 320 Professional Drill…
R725 R609 Discovery Miles 6 090
Bostik Clear on Blister Card (25ml)
R33 Discovery Miles 330
Bantex @School Standard Slim Colouring…
R15 Discovery Miles 150
Peptine Pro Canine/Feline Hydrolysed…
R359 R279 Discovery Miles 2 790
Watchman Lawn Hose (10M)
R699 R315 Discovery Miles 3 150

 

Partners