0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (6)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP... Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings (Paperback, 2014 ed.)
David Naccache, Damien Sauveron
R2,134 Discovery Miles 21 340 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy.

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices - 4th IFIP WG 11.2... Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices - 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings (Paperback, Edition.)
Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron
R1,571 Discovery Miles 15 710 Ships in 10 - 15 working days

These proceedings contain the papers selected for presentation at the 4th Wo- shop on Information Security Theory and Practice (WISTP 2010), held during April 12-14, 2010 in Passau, Germany. In response to the call for papers, 69 papers were submitted to the wo- shop. These papers were evaluated on the basis of their signi?cance, novelty, and technicalquality. Eachpaper was reviewedby four members of the Program Committee. Reviewing was double-blind meaning that the Program Committee was not able to see the names and a?liations of the authors, and the authors were not told which committee members reviewed which papers. The Program Committee meeting was held electronically, holding intensive discussions over a periodoftwo weeks.Of the papers submitted, 20 full papersand 10shortpapers were selected for presentation at the workshop. This workshop was sponsored by Vodaphone, who also provided a best - per award. We would like to thank this organization for their support, which helped make this workshop possible. Their continued support helps to reduce registration fees and make WISTP a continuing success. WISTP 2010 was also organized in cooperation with the International - sociation for Cryptologic Research (IACR), the IFIP WG 11.2 Pervasive S- tems Security, and ACM SIGSAC. Their support has signi?cantly contributed to raising the pro?le of WISTP, which is re?ected in the number of high-quality submissions that we received.

Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2... Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 (Paperback, 2008 ed.)
Jose A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis
R1,503 Discovery Miles 15 030 Ships in 10 - 15 working days

With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded s- tems are becoming more and more mobile and ubiquitous. They also strongly interact with the physical world. Ensuring the security of these complex and resource-constrained systems is a really challenging research topic. Therefore this Workshop in Information Security Theory and Practices was organized to bring together researchers and practitioners in related areas, and to encourage cooperation between the research and the industrial communities. This was the second edition of WISTP, after the ?rst event in Heraklion, Greece, in 2007. This year again we had a signi?cant number of high-quality submissions coming from many di?erent countries. These submissions re?ected the major topics of the conference, i. e. , smart devices, convergence, and ne- generation networks. Submissions were reviewed by at least three reviewers, in most cases by four, and at least by ?ve for the papers involving Program C- mittee members. This long and rigorousprocess could be achievedthanks to the hard work of the Program Committee members and additional reviewers, listed in the following pages. This led to the selection of high-quality papers that made up the workshop program and are published in these proceedings. A number of posters and short papers were also selected for presentation at the conference. The process was very selective and we would like to thank all those authors who submitted contributions that could not be selected.

Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG... Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 (Paperback, 2007 ed.)
Damien Sauveron, Konstantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater
R1,619 Discovery Miles 16 190 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems, WISTP 2007, held in Heraklion, Crete, Greece in May 2007.

The 20 revised full papers are organized in topical sections on mobility, hardware and cryptography, privacy, cryptography schemes, smart cards, and small devices.

Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020,... Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Diana Maimut, Andrei-George Oprina, Damien Sauveron
R1,546 Discovery Miles 15 460 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020.The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more.

Advances in Computational Science and Engineering - Second International Conference, FGCN 2008, Workshops and Symposia, Sanya,... Advances in Computational Science and Engineering - Second International Conference, FGCN 2008, Workshops and Symposia, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers (Paperback, 2009 ed.)
Laurence Tianruo Yang, Jong Hyuk Park, Thanos Vasilakos, Yan Zhang, Damien Sauveron, …
R1,533 Discovery Miles 15 330 Ships in 10 - 15 working days

As communication and networking (CN) become specialized and fragmented, it is easy to lose sight that many topics in CN have common threads and because of this, advances in one sub-discipline may transmit to another. The presentation of results between different sub-disciplines of CN encourages this interchange for the advan- ment of CN as a whole. Of particular interest is the hybrid approach of combining ideas from one discipline with those of another to achieve a result that is more signi- cant than the sum of the individual parts. Through this hybrid philosophy, a new or common principle can be discovered which has the propensity to propagate throu- out this multifaceted discipline. This volume comprises the selection of extended versions of papers that were p- sented in their shortened form at the 2008 International Conference on Future Gene- tion Communication and Networking (http: //www. sersc. org/FGCN2008/), Inter- tional Conference on Bio-Science and Bio-Technology (http: //www. sersc. org/ BSBT2008/), International Symposium on u- and e- Service, Science and Technology (http: //www. sersc. org/UNESST2008/), International Symposium on Database Theory and Application (http: //www. sersc. org/DTA2008/), International Symposium on Control and Automation (http: //www. sersc. org/CA2008/), International Symposium on Signal Processing, Image Processing and Pattern Recognition (http: //www. sersc. org/SIP2008/), International Symposium on Grid and Distributed Computing (ttp: //www. sersc. org/ GDC2008/), International Symposium on Smart Home (http: //www. sersc. org/SH2008/), and 2009 Advanced Science and Technology (http: //www. sersc. org/A

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Burberry London Eau De Parfum Spray…
R2,394 R1,443 Discovery Miles 14 430
Multi Colour Jungle Stripe Neckerchief
R119 Discovery Miles 1 190
Breaking Bread - A Memoir
Jonathan Jansen Paperback R330 R220 Discovery Miles 2 200
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Holy Fvck
Demi Lovato CD R435 Discovery Miles 4 350
'n Bybeldagboek vir Meisies
Jean Fischer Paperback R149 R126 Discovery Miles 1 260
Microsoft Windows 11 Professional DSP…
R3,499 R1,499 Discovery Miles 14 990
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Operation Joktan
Amir Tsarfati, Steve Yohn Paperback  (1)
R250 R211 Discovery Miles 2 110

 

Partners