0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Foundations and Practice of Security - 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal,... Foundations and Practice of Security - 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi
R1,590 Discovery Miles 15 900 Ships in 10 - 15 working days

This book constitutes the carefully refereed and revised selected papers of the 5th Canada-France ETS Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 21 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security.

Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected... Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected Papers (Paperback, 2012)
Ali Miri, Serge Vaudenay
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography.

Wireless Sensor and Actor Networks II - Proceedings of the 2008 IFIP Conference on Wireless Sensor and Actor Networks (WSAN... Wireless Sensor and Actor Networks II - Proceedings of the 2008 IFIP Conference on Wireless Sensor and Actor Networks (WSAN 08), Ottawa, Ontario, Canada, July 14-15, 2008 (Hardcover, 2008 ed.)
Ali Miri
R3,139 Discovery Miles 31 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 2008 IFIP Conference on Wireless Sensors and Actor Networks held in Ottawa, Canada on July 14-15, 2008.

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Selected Areas in Cryptography - 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected... Selected Areas in Cryptography - 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers (Paperback, 2007 ed.)
Carlisle Adams, Ali Miri, Michael Wiener
R1,598 Discovery Miles 15 980 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Selected Areas in Cryptography, SAC 2007, held in Ottawa, Canada, in August 2007.

The 25 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections on stream cipher cryptanalysis, hash function attacks, side-channel attacks, efficient implementations, block cipher cryptanalysis, a new stream cipher, white box cryptanalysis, message authentication code attack, and modes of operation.

Wireless Sensor and Actor Networks II - Proceedings of the 2008 IFIP Conference on Wireless Sensor and Actor Networks (WSAN... Wireless Sensor and Actor Networks II - Proceedings of the 2008 IFIP Conference on Wireless Sensor and Actor Networks (WSAN 08), Ottawa, Ontario, Canada, July 14-15, 2008 (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Ali Miri
R2,958 Discovery Miles 29 580 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 2008 IFIP Conference on Wireless Sensors and Actor Networks held in Ottawa, Canada on July 14-15, 2008.

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Sea Monster (Paperback): Sedigheh Javidibooshehri Sea Monster (Paperback)
Sedigheh Javidibooshehri; Illustrated by Ali Miri
R458 Discovery Miles 4 580 Ships in 10 - 15 working days
Advanced Security and Privacy for RFID Technologies (Hardcover, New): Ali Miri Advanced Security and Privacy for RFID Technologies (Hardcover, New)
Ali Miri
R5,486 Discovery Miles 54 860 Ships in 10 - 15 working days

While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for RFID Technologies addresses these concerns with its comprehensive coverage on current issues with security models and everyday threats and vulnerabilities. This informative publication not only addresses the security risks involved with RFID technologies, but also gives insight on some possible solutions and preventions. Researchers, professionals, and practitioners aiming to better understand the risks involved with these developing technologies will benefit from this book s expansive coverage on the topic.

Privacy-Preserving Data Mining (Paperback): Saeed Samet, Ali Miri Privacy-Preserving Data Mining (Paperback)
Saeed Samet, Ali Miri
R1,775 Discovery Miles 17 750 Ships in 10 - 15 working days

Security and privacy represent crucial requirements in different scenarios as organizations and parties involved may not want to disclose their own private information to each other. Assuring adequate and verifiable security and privacy in these scenarios faces various challenges. One such challenge is whether proposed protocols can be used over public channels, like internet. Another possible issue is whether the complete final result of a protocol can be broadcasted to, or be received by all parties. Collusion attacks can pose another security challenge in multiparty settings. Finally, it may be desirable to design incremental versions of the protocols to improve security and efficiency. To address these problems we have designed new secure building blocks and privacy-preserving protocols, while considering their performance in terms of security and efficiency. Building blocks, and the resulting protocols which take advantage of these blocks can be implemented over public channels, have a balanced distribution of the final results, and are resistant to collusion attacks. These blocks are used to design novel privacy-preserving protocols for learning and data mining techniques.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Playstation 4 Replacement Case
 (9)
R56 Discovery Miles 560
Fine Living E-Table (Black | White)
 (7)
R319 R199 Discovery Miles 1 990
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Lucky Metal Cut Throat Razer Carrier
R30 R25 Discovery Miles 250
Multi-Functional Bamboo Standing Laptop…
R595 R299 Discovery Miles 2 990
The High Notes
Danielle Steel Paperback R340 R266 Discovery Miles 2 660
Razer Kaira Pro Wireless Gaming…
R3,656 Discovery Miles 36 560
Docking Edition Multi-Functional…
R1,099 R799 Discovery Miles 7 990
Zenith Shoe-repair Adhesive 25ml
R50 Discovery Miles 500
Hani - A Life Too Short
Janet Smith, Beauregard Tromp Paperback R310 R248 Discovery Miles 2 480

 

Partners