0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (10)
  • R2,500 - R5,000 (7)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 18 of 18 matches in All Departments

Cyber Security Meets Machine Learning (Hardcover, 1st ed. 2021): Xiaofeng Chen, Willy Susilo, Elisa Bertino Cyber Security Meets Machine Learning (Hardcover, 1st ed. 2021)
Xiaofeng Chen, Willy Susilo, Elisa Bertino
R4,227 Discovery Miles 42 270 Ships in 10 - 15 working days

Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.

Introduction to Security Reduction (Paperback, Softcover reprint of the original 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Paperback, Softcover reprint of the original 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R4,739 Discovery Miles 47 390 Ships in 10 - 15 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

Provable Security - 12th International Conference, ProvSec 2018,  Jeju, South Korea, October 25-28, 2018, Proceedings... Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings (Paperback, 1st ed. 2018)
Joonsang Baek, Willy Susilo, Jong-Kil Kim
R1,601 Discovery Miles 16 010 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications.

Introduction to Security Reduction (Hardcover, 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Hardcover, 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R5,505 Discovery Miles 55 050 Ships in 10 - 15 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018,... Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings (Paperback, 1st ed. 2018)
Willy Susilo, Guomin Yang
R3,133 Discovery Miles 31 330 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.

Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014.... Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings (Paperback, 2014 ed.)
Willy Susilo, Yi Mu
R2,987 Discovery Miles 29 870 Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.

Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings (Paperback,... Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings (Paperback, 2013 ed.)
Willy Susilo, Reza Reyhanitabar
R1,577 Discovery Miles 15 770 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.

Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012.... Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings (Paperback, 2012 ed.)
Willy Susilo, Yi Mu, Jennifer Seberry
R1,612 Discovery Miles 16 120 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.

Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings... Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings (Paperback, 2008 ed.)
Yi Mu, Willy Susilo, Jennifer Seberry
R1,620 Discovery Miles 16 200 Ships in 10 - 15 working days

The 13th Australasian Conference on Information Security and Privacy (ACISP 2008) was held at Wollongong, Australia, during July 7-9, 2008. The conference was sponsored by the Centre for Computer and Information Security of the University of Wollongong and the ResearchNetwork for a Secure Australia. The submission and review process was run using the iChair software, written by Thomas Baigneres and Matthieu Finiasz from EPFL, LASEC, Switzerland. We would like to thank them for letting us use their iChair software. The conferencereceived111submissions, out ofwhich the ProgramComm- tee selected 33 papers for presentation at the conference after a rigorous review process.Thesepapersareincludedintheproceedings.Theacceptedpaperscover a range of topics in information security, including authentication, key m- agement, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security. Theconferenceproceedingscontainrevisedversionsoftheselectedpapers.Since some of them were not checked again for correctness before publication, the - thors bear full responsibility for the contents of their papers. We would like to thank the authors of all papers for submitting their papers to the conference. In addition to the contributed papers, the program comprised three invited talks. The invited speakers were Xavier Boyen (Voltage, USA), Josef Pieprzyk (Macquarie University, Australia) and Nigel Phair (Australian High Tech Crime Centre). We would like to express our thanks to them.

Information Security Practice and Experience - 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008... Information Security Practice and Experience - 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings (Paperback, 2008 ed.)
Liqun Chen, Yi Mu, Willy Susilo
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

The4thInformationSecurityPracticeandExperienceConference(ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, Australia, during April 21-23, 2008. The previous three conferences were held in Singapore in 2005, Hangzhou, China in 2006 and Hong Kong, China in 2007. As with the previous three conference proceedings, the proceedings of ISPEC 2008 were published in the LNCS series by Springer. Theconferencereceived95submissions, outofwhichtheProgramCommittee selected 29 papers for presentation at the conference. These papers are included in the proceedings. The accepted papers cover a range of topics in mathem- ics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve-basedsecuritypractice, securitycomputationandso forth.The conference proceedings contain revised versions of the selected papers. Since some of them were not checked again for correctness before publication, the authors (and not the ProgramCommittee)bear full responsibilityfor the contentsoftheir papers. In addition to the contributed papers, the program comprised two invited talks.TheinvitedspeakerswereVijayVaradharajan(MacquarieUniversity, A- tralia) and Robert Huijie Deng (Singapore Management University, Singapore). Special thanks are due to these speakers. Wewouldliketothankallthepeoplewhohelpedwiththeconferenceprogram and organization. First, we thank the Steering Committee for their guidance on the general format of the conference. We also heartily thank the Program Committee and the sub-reviewers listed on the following pages for their hard e?orts and time contributed to the review process, which took seven weeks. Each paper was carefully evaluated by at least two or three people. There was signi?cant online discussion about a large number of pape

Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings... Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings (Paperback, 2007 ed.)
Willy Susilo, Joseph K. Liu, Yi Mu
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007.

The 10 revised full papers presented together with 7 short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.

Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings (Paperback,... Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings (Paperback, 1st ed. 2022)
Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan
R2,524 Discovery Miles 25 240 Ships in 10 - 15 working days

This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022. The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.

Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022,... Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings (Paperback, 1st ed. 2022)
Khoa Nguyen, Guomin Yang, Fuchun Guo, Willy Susilo
R2,784 Discovery Miles 27 840 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

Cyberspace Safety and Security - 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings... Cyberspace Safety and Security - 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings (Paperback, 1st ed. 2022)
Xiaofeng Chen, Jian Shen, Willy Susilo
R1,588 Discovery Miles 15 880 Ships in 10 - 15 working days

This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi'an, China, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104 initial submissions. The papers focus on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.

Cyber Security Meets Machine Learning (Paperback, 1st ed. 2021): Xiaofeng Chen, Willy Susilo, Elisa Bertino Cyber Security Meets Machine Learning (Paperback, 1st ed. 2021)
Xiaofeng Chen, Willy Susilo, Elisa Bertino
R2,920 Discovery Miles 29 200 Ships in 10 - 15 working days

Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.

Information Security - 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings (Paperback,... Information Security - 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings (Paperback, 1st ed. 2021)
Joseph K. Liu, Sokratis Katsikas, Weizhi Meng, Willy Susilo, Rolly Intan
R2,364 Discovery Miles 23 640 Ships in 10 - 15 working days

This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security.

Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings (Paperback,... Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings (Paperback, 1st ed. 2020)
Willy Susilo, Robert H. Deng, Fuchun Guo, Yannan Li, Rolly Intan
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

This book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020. The 23 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers cover topics of research in theory and applications of information security, such as Security and privacy and Network security as well.

Advances in Cyber Security: Principles, Techniques, and Applications (Hardcover, 1st ed. 2019): Kuan-Ching Li, Xiaofeng Chen,... Advances in Cyber Security: Principles, Techniques, and Applications (Hardcover, 1st ed. 2019)
Kuan-Ching Li, Xiaofeng Chen, Willy Susilo
R4,767 Discovery Miles 47 670 Ships in 10 - 15 working days

This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes. Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Barbie
Margot Robbie, Ryan Gosling Blu-ray disc R266 Discovery Miles 2 660
Hot Wheels Aluminium Bottle…
R128 Discovery Miles 1 280
Sylvanian Families - Walnut Squirrel…
R749 R579 Discovery Miles 5 790
Harry's House
Harry Styles CD  (1)
R238 R197 Discovery Miles 1 970
JBL T110 In-Ear Headphones (Black)
 (13)
R229 R201 Discovery Miles 2 010
Clare - The Killing Of A Gentle Activist
Christopher Clark Paperback R360 R309 Discovery Miles 3 090
Finally Enough Love - #1's Remixed
Madonna CD  (2)
R110 R101 Discovery Miles 1 010
Pokémon Go Plus +
 (1)
R1,499 R1,369 Discovery Miles 13 690
Too Hard To Forget
Tessa Bailey Paperback R280 R224 Discovery Miles 2 240
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300

 

Partners