0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30... Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (Hardcover, 2005 ed.)
Ryoichi Sasaki, Eiji Okamoto, Hiroshi Yoshiura
R4,815 Discovery Miles 48 150 Ships in 12 - 19 working days

Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.

Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30... Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Ryoichi Sasaki, Eiji Okamoto, Hiroshi Yoshiura
R4,676 Discovery Miles 46 760 Ships in 10 - 15 working days

Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.

Pairing-Based Cryptography - Pairing 2007 - First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007,... Pairing-Based Cryptography - Pairing 2007 - First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto
R1,637 Discovery Miles 16 370 Ships in 10 - 15 working days

This book represents the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in July 2007.

The 18 revised full papers presented together with 2 abstracts and 3 full papers of invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topcial sections on applications, certificateless public key encryption, hyperelliptic curves, implementation, cryptographic protocols, cryptanalysis, and cryptographic algorithms.

Information and Communications Security - 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004.... Information and Communications Security - 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings (Paperback, 2004 ed.)
Javier Lopez, Eiji Okamoto
R3,295 Discovery Miles 32 950 Ships in 10 - 15 working days

This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),Torremolinos(Malaga), ' Spain,27-29 October 2004. The ?ve previous conferences were held in Beijing, Sydney, Xian, S- gapore and Huhehaote City, where we had an enthusiastic and well-attended event. The proceedings were released as volumes 1334, 1726, 2229, 2513 and 2836 of the LNCS series of Springer, respectively. During these last years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by offering you yet another successful meeting with a rich and interesting program. The responseto the Call for Paperswas overwhelming,245 papersubmissionswere received. Therefore, the paper selection process was very competitive and dif?cult - only 42 papers were accepted. The success of the conference depends on the quality of the program. Thus, we are indebted to our Program Committee members and the ext- nal refereesfor the great job they did. These proceedingscontainrevised versionsof the accepted papers.Revisions were not checked and the authorsbear full responsibilityfor the content of their papers.

Progress in Cryptology - INDOCRYPT 2000 - First International Conference in Cryptology in India, Calcutta, India, December... Progress in Cryptology - INDOCRYPT 2000 - First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000. Proceedings (Paperback, 2000 ed.)
Bimal Kumar Roy, Eiji Okamoto
R1,704 Discovery Miles 17 040 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Conference on Cryptology in India, INDOCRYPT 2000, held in Calcutta, India in December 2000. The 25 revised full papers presented were carefully reviewed and selected from a total of 54 submissions. The book offers topical sections on stream ciphers and Boolean functions, cryptoanalysis: stream ciphers, cryptanalysis: block ciphers, electronic cash and multiparty computation, digital signatures, elliptic curves, fast arithmetic, cryptographic protocols, and block cipher and public key cryptography.

Information Security - Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings... Information Security - Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings (Paperback, 2000 ed.)
Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
R1,723 Discovery Miles 17 230 Ships in 10 - 15 working days

The third International Workshop on Information Security was held at the U- versity of Wollongong, Australia. The conference was sponsored by the Centre for Computer Security Research, University of Wollongong. The main themes of the conference were the newly emerging issues of Information Security. Mul- media copyright protection and security aspects of e-commerce were two topics that clearly re?ect the focus of the conference. Protection of the copyright of electronic documents seems to be driven by strong practical demand from the industry for new, e cient and secure solutions. Although e-commerce is already booming, it has not reached its full potential in terms of new, e cient and secure e-commerce protocols with added properties. There were 63 papers submitted to the conference. The program committee accepted 23. Of those accepted, six papers were from Australia, ve from Japan, two each from Spain, Germany and the USA, and one each from Finland and Sweden. Four papers were co-authored by international teams from Canada and China, Korea and Australia, Taiwan and Australia, and Belgium, France and Germany, respectively. Final versions of the accepted papers were gathered using computing and other resources of the Institute of Mathematics, Polish Academy of Sciences, Warsaw, Poland. We are especially grateful to Jerzy Urbanowicz and Andrzej Pokrzywa for their help during preparation of the proceedings.

Advances in Cryptology - ASIACRYPT'99 - International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT'99 - International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999 Proceedings (Paperback, 1999 ed.)
Kwok Yan Lam, Eiji Okamoto, Chaoping Xing
R1,778 Discovery Miles 17 780 Ships in 10 - 15 working days

Asiacrypt'99 was held in Singapore on 14-18 November 1999. Asiacrypt is one of the major events in the cryptology research community. Asiacrypt'99, the ?fth annual Asiacrypt conference, was sponsored by the Asiacrypt Steering Comm- tee and the Centre for Systems Security of the National University of Singapore, and in cooperation with the International Association for Cryptology Research. As the Program Co-Chairs of Asiacrypt'99, we are extremely honored to or- nize this event, which showcases the state-of-the-art development of cryptology research at the conclusion of this millennium. This year, a total of 96 research papers were submitted to Asiacrypt'99. The portfolio of country of origin of submissions serves as a good indicator of the - ternational reputation of the conference. Countries from which submissions or- inated include: Australia, Belgium, China, Estonia, France, Germany, Greece, India, Iran, Japan, Korea, Norway, Russia, Saudi Arabia, Switzerland, Sin- pore, Spain, Taiwan, Thailand, The Netherlands, Turkey, Ukraine, UK, USA and Yugoslavia. Through a stringent refereeing process by the Program C- mittee, 31 papers of outstanding quality were accepted and are included in the conference proceedings. Accepted papers were authored by researchers from the following countries: Australia, Belgium, France, Germany, India, Japan, China, Singapore, Switzerland, Taiwan, The Netherlands, UK, and USA.

Information Security - First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997,... Information Security - First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings (Paperback, 1998 ed.)
Eiji Okamoto, George Davida, Masahiro Mambo
R1,743 Discovery Miles 17 430 Ships in 10 - 15 working days

This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Security, ISW'98, held in Tatsunokuchi, Ishikawa, Japan, in September 1997. The volume presents six invited surveys together with 25 thoroughly revised full papers selected from 39 submissions. Among the topics covered are public-key cryptosystems, cryptoanalysis, digital signatures, hardware/software implementation, key management, key sharing, security management, electronic commerce, and quantum cryptology.

Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015,... Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu
R3,066 Discovery Miles 30 660 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015. The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions. The papers provide the latest results in research and development in the field of information security and applied cryptology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ghost Boys
Rhodes Paperback R247 R228 Discovery Miles 2 280
Biko - Philosophy, Identity And…
Mabogo Percy More Paperback  (3)
R220 R198 Discovery Miles 1 980
Our Long Walk To Economic Freedom…
Johan Fourie Paperback R412 Discovery Miles 4 120
What's a Yia Yia? - A Book About…
Stella Stamatakis Hardcover R543 Discovery Miles 5 430
A History Of South Africa - From The…
Fransjohan Pretorius Paperback R580 Discovery Miles 5 800
Entering the Civil Aircraft Industry…
Dean C Roberts Hardcover R902 Discovery Miles 9 020
PJ Masks: Power of Three - A PJ Masks…
Pat-A-Cake, Pj Masks Paperback  (1)
R109 Discovery Miles 1 090
Huawei Stories: Visionaries
Tian Tao, Yin Zhifeng Paperback R470 R352 Discovery Miles 3 520
The Baddies Sticker Activity Book
Julia Donaldson Paperback R210 Discovery Miles 2 100
Camel Workbook of Affirmations Camel…
Alan Haynes Paperback R513 Discovery Miles 5 130

 

Partners