|
Showing 1 - 3 of
3 matches in All Departments
This book constitutes the refereed proceedings of the 5th
International Conference on the Theory and Application of
Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in
Ifrane, Morocco, in July 2012. The 24 papers presented together
with abstracts of 2 invited talks were carefully reviewed and
selected from 56 submissions. They are organized in topical
sections on signature schemes, stream ciphers, applications of
information theory, block ciphers, network security protocols,
public-key cryptography, cryptanalysis of hash functions, hash
functions: design and implementation, algorithms for public-key
cryptography, and cryptographic protocols.
|
Privacy and Security Issues in Data Mining and Machine Learning - International ECML/PKDD Workshop, PSDML 2010, Barcelona, Spain, September 24, 2010. Revised Selected Papers (Paperback, Edition.)
Christos Dimitrakakis, Aris Gkoulalas-Divanis, Aikaterini Mitrokotsa, Vassilios S Verykios, Yucel Saygin
|
R1,535
Discovery Miles 15 350
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the International
ECML/PKDD Workshop on Privacy and Security Issues in Data Mining
and Machine Learning, PSDML 2010, held in Barcelona, Spain, in
September 2010. The 11 revised full papers presented were carefully
reviewed and selected from 21 submissions. The papers range from
data privacy to security applications, focusing on detecting
malicious behavior in computer systems.
|
Secure IT Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings (Paperback, 1st ed. 2017)
Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevicius
|
R2,552
Discovery Miles 25 520
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 22nd Nordic Conference
on Secure IT Systems, held in Tartu, Estonia, in November 2017. The
18 full papers presented were carefully reviewed and selected from
42 submissions. The papers address a broad range of topics in IT
security and privacy. They are organized in the following topical
sections: outsourcing computations; privacy preservation; security
and privacy in machine learning; applications; access control; and
emerging security areas.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|