0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30... Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (Hardcover, 2005 ed.)
Ryoichi Sasaki, Eiji Okamoto, Hiroshi Yoshiura
R4,507 Discovery Miles 45 070 Ships in 12 - 17 working days

Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.

Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30... Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Ryoichi Sasaki, Eiji Okamoto, Hiroshi Yoshiura
R4,327 Discovery Miles 43 270 Ships in 10 - 15 working days

Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.

Pairing-Based Cryptography - Pairing 2007 - First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007,... Pairing-Based Cryptography - Pairing 2007 - First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

This book represents the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in July 2007.

The 18 revised full papers presented together with 2 abstracts and 3 full papers of invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topcial sections on applications, certificateless public key encryption, hyperelliptic curves, implementation, cryptographic protocols, cryptanalysis, and cryptographic algorithms.

Information and Communications Security - 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004.... Information and Communications Security - 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings (Paperback, 2004 ed.)
Javier Lopez, Eiji Okamoto
R3,049 Discovery Miles 30 490 Ships in 10 - 15 working days

This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),Torremolinos(Malaga), ' Spain,27-29 October 2004. The ?ve previous conferences were held in Beijing, Sydney, Xian, S- gapore and Huhehaote City, where we had an enthusiastic and well-attended event. The proceedings were released as volumes 1334, 1726, 2229, 2513 and 2836 of the LNCS series of Springer, respectively. During these last years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by offering you yet another successful meeting with a rich and interesting program. The responseto the Call for Paperswas overwhelming,245 papersubmissionswere received. Therefore, the paper selection process was very competitive and dif?cult - only 42 papers were accepted. The success of the conference depends on the quality of the program. Thus, we are indebted to our Program Committee members and the ext- nal refereesfor the great job they did. These proceedingscontainrevised versionsof the accepted papers.Revisions were not checked and the authorsbear full responsibilityfor the content of their papers.

Progress in Cryptology - INDOCRYPT 2000 - First International Conference in Cryptology in India, Calcutta, India, December... Progress in Cryptology - INDOCRYPT 2000 - First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000. Proceedings (Paperback, 2000 ed.)
Bimal Kumar Roy, Eiji Okamoto
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Conference on Cryptology in India, INDOCRYPT 2000, held in Calcutta, India in December 2000. The 25 revised full papers presented were carefully reviewed and selected from a total of 54 submissions. The book offers topical sections on stream ciphers and Boolean functions, cryptoanalysis: stream ciphers, cryptanalysis: block ciphers, electronic cash and multiparty computation, digital signatures, elliptic curves, fast arithmetic, cryptographic protocols, and block cipher and public key cryptography.

Information Security - Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings... Information Security - Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings (Paperback, 2000 ed.)
Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
R1,588 Discovery Miles 15 880 Ships in 10 - 15 working days

The third International Workshop on Information Security was held at the U- versity of Wollongong, Australia. The conference was sponsored by the Centre for Computer Security Research, University of Wollongong. The main themes of the conference were the newly emerging issues of Information Security. Mul- media copyright protection and security aspects of e-commerce were two topics that clearly re?ect the focus of the conference. Protection of the copyright of electronic documents seems to be driven by strong practical demand from the industry for new, e cient and secure solutions. Although e-commerce is already booming, it has not reached its full potential in terms of new, e cient and secure e-commerce protocols with added properties. There were 63 papers submitted to the conference. The program committee accepted 23. Of those accepted, six papers were from Australia, ve from Japan, two each from Spain, Germany and the USA, and one each from Finland and Sweden. Four papers were co-authored by international teams from Canada and China, Korea and Australia, Taiwan and Australia, and Belgium, France and Germany, respectively. Final versions of the accepted papers were gathered using computing and other resources of the Institute of Mathematics, Polish Academy of Sciences, Warsaw, Poland. We are especially grateful to Jerzy Urbanowicz and Andrzej Pokrzywa for their help during preparation of the proceedings.

Advances in Cryptology - ASIACRYPT'99 - International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT'99 - International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999 Proceedings (Paperback, 1999 ed.)
Kwok Yan Lam, Eiji Okamoto, Chaoping Xing
R1,641 Discovery Miles 16 410 Ships in 10 - 15 working days

Asiacrypt'99 was held in Singapore on 14-18 November 1999. Asiacrypt is one of the major events in the cryptology research community. Asiacrypt'99, the ?fth annual Asiacrypt conference, was sponsored by the Asiacrypt Steering Comm- tee and the Centre for Systems Security of the National University of Singapore, and in cooperation with the International Association for Cryptology Research. As the Program Co-Chairs of Asiacrypt'99, we are extremely honored to or- nize this event, which showcases the state-of-the-art development of cryptology research at the conclusion of this millennium. This year, a total of 96 research papers were submitted to Asiacrypt'99. The portfolio of country of origin of submissions serves as a good indicator of the - ternational reputation of the conference. Countries from which submissions or- inated include: Australia, Belgium, China, Estonia, France, Germany, Greece, India, Iran, Japan, Korea, Norway, Russia, Saudi Arabia, Switzerland, Sin- pore, Spain, Taiwan, Thailand, The Netherlands, Turkey, Ukraine, UK, USA and Yugoslavia. Through a stringent refereeing process by the Program C- mittee, 31 papers of outstanding quality were accepted and are included in the conference proceedings. Accepted papers were authored by researchers from the following countries: Australia, Belgium, France, Germany, India, Japan, China, Singapore, Switzerland, Taiwan, The Netherlands, UK, and USA.

Information Security - First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997,... Information Security - First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings (Paperback, 1998 ed.)
Eiji Okamoto, George Davida, Masahiro Mambo
R1,608 Discovery Miles 16 080 Ships in 10 - 15 working days

This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Security, ISW'98, held in Tatsunokuchi, Ishikawa, Japan, in September 1997. The volume presents six invited surveys together with 25 thoroughly revised full papers selected from 39 submissions. Among the topics covered are public-key cryptosystems, cryptoanalysis, digital signatures, hardware/software implementation, key management, key sharing, security management, electronic commerce, and quantum cryptology.

Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015,... Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu
R2,864 Discovery Miles 28 640 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015. The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions. The papers provide the latest results in research and development in the field of information security and applied cryptology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Playseat Evolution Racing Chair (Black)
 (3)
R8,999 Discovery Miles 89 990
Runner Runner
Gemma Arterton, Ben Affleck, … Blu-ray disc  (1)
R43 Discovery Miles 430
Sylvanian Families - Walnut Squirrel…
R749 R579 Discovery Miles 5 790
Russell Hobbs Toaster (2 Slice…
R707 Discovery Miles 7 070
Bostik Glu Dots - Extra Strength (64…
R55 Discovery Miles 550
Baby Dove Soap Bar Rich Moisture 75g
R20 Discovery Miles 200
Womens 2-Piece Fitness Gym Gloves…
R129 Discovery Miles 1 290
Samsung EO-IA500BBEGWW Wired In-ear…
R299 R249 Discovery Miles 2 490
Braai
Reuben Riffel Paperback R495 R359 Discovery Miles 3 590
Medalist Mini American Football (Blue)
R122 Discovery Miles 1 220

 

Partners