0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (6)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP... Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings (Paperback, 2014 ed.)
David Naccache, Damien Sauveron
R2,182 Discovery Miles 21 820 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy.

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices - 4th IFIP WG 11.2... Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices - 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings (Paperback, Edition.)
Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron
R1,590 Discovery Miles 15 900 Ships in 10 - 15 working days

These proceedings contain the papers selected for presentation at the 4th Wo- shop on Information Security Theory and Practice (WISTP 2010), held during April 12-14, 2010 in Passau, Germany. In response to the call for papers, 69 papers were submitted to the wo- shop. These papers were evaluated on the basis of their signi?cance, novelty, and technicalquality. Eachpaper was reviewedby four members of the Program Committee. Reviewing was double-blind meaning that the Program Committee was not able to see the names and a?liations of the authors, and the authors were not told which committee members reviewed which papers. The Program Committee meeting was held electronically, holding intensive discussions over a periodoftwo weeks.Of the papers submitted, 20 full papersand 10shortpapers were selected for presentation at the workshop. This workshop was sponsored by Vodaphone, who also provided a best - per award. We would like to thank this organization for their support, which helped make this workshop possible. Their continued support helps to reduce registration fees and make WISTP a continuing success. WISTP 2010 was also organized in cooperation with the International - sociation for Cryptologic Research (IACR), the IFIP WG 11.2 Pervasive S- tems Security, and ACM SIGSAC. Their support has signi?cantly contributed to raising the pro?le of WISTP, which is re?ected in the number of high-quality submissions that we received.

Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2... Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 (Paperback, 2008 ed.)
Jose A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis
R1,518 Discovery Miles 15 180 Ships in 10 - 15 working days

With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded s- tems are becoming more and more mobile and ubiquitous. They also strongly interact with the physical world. Ensuring the security of these complex and resource-constrained systems is a really challenging research topic. Therefore this Workshop in Information Security Theory and Practices was organized to bring together researchers and practitioners in related areas, and to encourage cooperation between the research and the industrial communities. This was the second edition of WISTP, after the ?rst event in Heraklion, Greece, in 2007. This year again we had a signi?cant number of high-quality submissions coming from many di?erent countries. These submissions re?ected the major topics of the conference, i. e. , smart devices, convergence, and ne- generation networks. Submissions were reviewed by at least three reviewers, in most cases by four, and at least by ?ve for the papers involving Program C- mittee members. This long and rigorousprocess could be achievedthanks to the hard work of the Program Committee members and additional reviewers, listed in the following pages. This led to the selection of high-quality papers that made up the workshop program and are published in these proceedings. A number of posters and short papers were also selected for presentation at the conference. The process was very selective and we would like to thank all those authors who submitted contributions that could not be selected.

Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG... Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 (Paperback, 2007 ed.)
Damien Sauveron, Konstantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater
R1,641 Discovery Miles 16 410 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems, WISTP 2007, held in Heraklion, Crete, Greece in May 2007.

The 20 revised full papers are organized in topical sections on mobility, hardware and cryptography, privacy, cryptography schemes, smart cards, and small devices.

Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020,... Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Diana Maimut, Andrei-George Oprina, Damien Sauveron
R1,564 Discovery Miles 15 640 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020.The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more.

Advances in Computational Science and Engineering - Second International Conference, FGCN 2008, Workshops and Symposia, Sanya,... Advances in Computational Science and Engineering - Second International Conference, FGCN 2008, Workshops and Symposia, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers (Paperback, 2009 ed.)
Laurence Tianruo Yang, Jong Hyuk Park, Thanos Vasilakos, Yan Zhang, Damien Sauveron, …
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

As communication and networking (CN) become specialized and fragmented, it is easy to lose sight that many topics in CN have common threads and because of this, advances in one sub-discipline may transmit to another. The presentation of results between different sub-disciplines of CN encourages this interchange for the advan- ment of CN as a whole. Of particular interest is the hybrid approach of combining ideas from one discipline with those of another to achieve a result that is more signi- cant than the sum of the individual parts. Through this hybrid philosophy, a new or common principle can be discovered which has the propensity to propagate throu- out this multifaceted discipline. This volume comprises the selection of extended versions of papers that were p- sented in their shortened form at the 2008 International Conference on Future Gene- tion Communication and Networking (http: //www. sersc. org/FGCN2008/), Inter- tional Conference on Bio-Science and Bio-Technology (http: //www. sersc. org/ BSBT2008/), International Symposium on u- and e- Service, Science and Technology (http: //www. sersc. org/UNESST2008/), International Symposium on Database Theory and Application (http: //www. sersc. org/DTA2008/), International Symposium on Control and Automation (http: //www. sersc. org/CA2008/), International Symposium on Signal Processing, Image Processing and Pattern Recognition (http: //www. sersc. org/SIP2008/), International Symposium on Grid and Distributed Computing (ttp: //www. sersc. org/ GDC2008/), International Symposium on Smart Home (http: //www. sersc. org/SH2008/), and 2009 Advanced Science and Technology (http: //www. sersc. org/A

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bostik Double-Sided Tape (18mm x 10m…
 (1)
R31 Discovery Miles 310
Shield Auto Cleaning Kit
R65 Discovery Miles 650
Cricut Joy Machine
 (6)
R3,787 Discovery Miles 37 870
Mellerware Non-Stick Vapour ll Steam…
R348 Discovery Miles 3 480
Mediabox NEO TV Stick (Black) - Netflix…
R1,189 Discovery Miles 11 890
Croxley Create Wood Free Colouring…
R29 Discovery Miles 290
Complete Snack-A-Chew Dog Biscuits…
R92 Discovery Miles 920
Marvel Studios Spider-Man 6" Mystery…
R499 R89 Discovery Miles 890
Jurassic Park Trilogy Collection
Sam Neill, Laura Dern, … Blu-ray disc  (1)
R311 Discovery Miles 3 110
Barbie
Margot Robbie, Ryan Gosling Blu-ray disc R266 Discovery Miles 2 660

 

Partners