0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (26)
  • R2,500 - R5,000 (35)
  • -
Status
Brand

Showing 1 - 25 of 61 matches in All Departments

Essentials of Blockchain Technology (Hardcover): Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino Essentials of Blockchain Technology (Hardcover)
Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino
R2,616 Discovery Miles 26 160 Ships in 12 - 17 working days

Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcing and crowdsensing, 5G, trust management, and finance. The popularity and rapid development of Blockchain brings many technical and regulatory challenges for research and academic communities. This book will feature contributions from experts on topics related to performance, benchmarking, durability, robustness, as well data gathering and management, algorithms, analytics techniques for transactions processing, and implementation of applications.

Essentials of Blockchain Technology (Paperback): Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino Essentials of Blockchain Technology (Paperback)
Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino
R1,466 Discovery Miles 14 660 Ships in 12 - 17 working days

Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcing and crowdsensing, 5G, trust management, and finance. The popularity and rapid development of Blockchain brings many technical and regulatory challenges for research and academic communities. This book will feature contributions from experts on topics related to performance, benchmarking, durability, robustness, as well data gathering and management, algorithms, analytics techniques for transactions processing, and implementation of applications.

Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021,... Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Xingming Sun, Xiao Rui Zhang, Zhihua Xia, Elisa Bertino
R3,150 Discovery Miles 31 500 Ships in 10 - 15 working days

The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.

Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021,... Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III (Paperback, 1st ed. 2021)
Xingming Sun, Xiao Rui Zhang, Zhihua Xia, Elisa Bertino
R3,156 Discovery Miles 31 560 Ships in 10 - 15 working days

The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.

Cyber Security Meets Machine Learning (Hardcover, 1st ed. 2021): Xiaofeng Chen, Willy Susilo, Elisa Bertino Cyber Security Meets Machine Learning (Hardcover, 1st ed. 2021)
Xiaofeng Chen, Willy Susilo, Elisa Bertino
R4,294 Discovery Miles 42 940 Ships in 10 - 15 working days

Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.

Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings,... Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Xingming Sun, Jinwei Wang, Elisa Bertino
R3,143 Discovery Miles 31 430 Ships in 10 - 15 working days

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.

Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings,... Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Xingming Sun, Jinwei Wang, Elisa Bertino
R3,148 Discovery Miles 31 480 Ships in 10 - 15 working days

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,702 Discovery Miles 17 020 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,704 Discovery Miles 17 040 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part IV (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,699 Discovery Miles 16 990 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,700 Discovery Miles 17 000 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,728 Discovery Miles 17 280 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part V (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,729 Discovery Miles 17 290 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part VI (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,729 Discovery Miles 17 290 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IV (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,721 Discovery Miles 17 210 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,728 Discovery Miles 17 280 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part III (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,722 Discovery Miles 17 220 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

Roles, Trust, and Reputation in Social Media Knowledge Markets - Theory and Methods (Paperback, Softcover reprint of the... Roles, Trust, and Reputation in Social Media Knowledge Markets - Theory and Methods (Paperback, Softcover reprint of the original 1st ed. 2015)
Elisa Bertino, Sorin Adam Matei
R2,181 Discovery Miles 21 810 Ships in 10 - 15 working days

Knowledge and expertise, especially of the kind that can shape public opinion, have been traditionally the domain of individuals holding degrees awarded by higher learning institutions or occupying formal positions in notable organizations. Expertise is validated by reputations established in an institutionalized marketplace of ideas with a limited number of "available seats" and a stringent process of selection and retention of names, ideas, topics and facts of interest. However, the social media revolution, which has enabled over two billion Internet users not only to consume, but also to produce information and knowledge, has created a secondary and very active informal marketplace of ideas and knowledge. Anchored by platforms like Wikipedia, YouTube, Facebook and Twitter, this informal marketplace has low barriers to entry and has become a gigantic and potentially questionable, knowledge resource for the public at large. Roles, Trust and Reputation in Social Media Knowledge Markets will discuss some of the emerging trends in defining, measuring and operationalizing reputation as a new and essential component of the knowledge that is generated and consumed online. The book will propose a future research agenda related to these issues. The ultimate goal of research agenda being to shape the next generation of theoretical and analytic strategies needed for understanding how knowledge markets are influenced by social interactions and reputations built around functional roles. The authors, including leading scholars and young innovators, will share with the readers some of the main lessons they have learned from their own work in these areas and will discuss the issues, topics and sub-areas that they find under-studied or that promise the greatest intellectual payoff in the future. The discussion will be placed in the context of social network analysis and "big data" research. Roles, Trust and Reputation in Social Media Knowledge Markets exposes issues that have not been satisfactorily dealt with in the current literature, as the research agenda in reputation and authorship is still emerging. In a broader sense, the volume aims to change the way in which knowledge generation in social media spaces is understood and utilized. The tools, theories and methodologies proposed by the contributors offer concrete avenues for developing the next generation of research strategies and applications that will help: tomorrow's information consumers make smarter choices, developers to create new tools and researchers to launch new research programs.

Security for Web Services and Service-Oriented Architectures (Paperback, 2010 ed.): Elisa Bertino, Lorenzo Martino, Federica... Security for Web Services and Service-Oriented Architectures (Paperback, 2010 ed.)
Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Squicciarini
R1,580 Discovery Miles 15 800 Ships in 10 - 15 working days

Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards,anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace all those new collaborative applications and to indicate a new, "social" approach to generating and distributing Web content, characterized by open communication, decentralization of authority, and freedom to share and reuse. For Web services technologies to hold their promise, it is crucial that - curity of services and their interactions with users be assured. Con?dentiality, integrity,availability,anddigitalidentitymanagementareallrequired.People need to be assured that their interactions with services over the Web are kept con?dential and the privacy of their personal information is preserved. People need to be sure that information they use for looking up and selecting s- vicesiscorrectanditsintegrityisassured.Peoplewantservicestobeavailable when needed. They also require interactions to be convenient and person- ized, in addition to being private. Addressing these requirements, especially when dealing with open distributed applications, is a formidable challenge.

Homomorphic Encryption and Applications (Paperback, 2014 ed.): Xun Yi, Russell Paulet, Elisa Bertino Homomorphic Encryption and Applications (Paperback, 2014 ed.)
Xun Yi, Russell Paulet, Elisa Bertino
R2,659 Discovery Miles 26 590 Ships in 10 - 15 working days

This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.

Roles, Trust, and Reputation in Social Media Knowledge Markets - Theory and Methods (Hardcover, 2015 ed.): Elisa Bertino, Sorin... Roles, Trust, and Reputation in Social Media Knowledge Markets - Theory and Methods (Hardcover, 2015 ed.)
Elisa Bertino, Sorin Adam Matei
R2,426 Discovery Miles 24 260 Ships in 10 - 15 working days

Knowledge and expertise, especially of the kind that can shape public opinion, have been traditionally the domain of individuals holding degrees awarded by higher learning institutions or occupying formal positions in notable organizations. Expertise is validated by reputations established in an institutionalized marketplace of ideas with a limited number of "available seats" and a stringent process of selection and retention of names, ideas, topics and facts of interest. However, the social media revolution, which has enabled over two billion Internet users not only to consume, but also to produce information and knowledge, has created a secondary and very active informal marketplace of ideas and knowledge. Anchored by platforms like Wikipedia, YouTube, Facebook and Twitter, this informal marketplace has low barriers to entry and has become a gigantic and potentially questionable, knowledge resource for the public at large. Roles, Trust and Reputation in Social Media Knowledge Markets will discuss some of the emerging trends in defining, measuring and operationalizing reputation as a new and essential component of the knowledge that is generated and consumed online. The book will propose a future research agenda related to these issues. The ultimate goal of research agenda being to shape the next generation of theoretical and analytic strategies needed for understanding how knowledge markets are influenced by social interactions and reputations built around functional roles. The authors, including leading scholars and young innovators, will share with the readers some of the main lessons they have learned from their own work in these areas and will discuss the issues, topics and sub-areas that they find under-studied or that promise the greatest intellectual payoff in the future. The discussion will be placed in the context of social network analysis and "big data" research. Roles, Trust and Reputation in Social Media Knowledge Markets exposes issues that have not been satisfactorily dealt with in the current literature, as the research agenda in reputation and authorship is still emerging. In a broader sense, the volume aims to change the way in which knowledge generation in social media spaces is understood and utilized. The tools, theories and methodologies proposed by the contributors offer concrete avenues for developing the next generation of research strategies and applications that will help: tomorrow's information consumers make smarter choices, developers to create new tools and researchers to launch new research programs.

RFID Security and Privacy (Paperback): Yingjiu Li, Robert Deng, Elisa Bertino RFID Security and Privacy (Paperback)
Yingjiu Li, Robert Deng, Elisa Bertino
R1,111 Discovery Miles 11 110 Ships in 10 - 15 working days

As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area.

Private Information Retrieval (Paperback): Xun Yi, Russell Paulet, Elisa Bertino Private Information Retrieval (Paperback)
Xun Yi, Russell Paulet, Elisa Bertino
R1,094 Discovery Miles 10 940 Ships in 10 - 15 working days

This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single-database PIR techniques, this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.

Indexing Techniques for Advanced Database Systems (Paperback, Softcover reprint of the original 1st ed. 1997): Elisa Bertino,... Indexing Techniques for Advanced Database Systems (Paperback, Softcover reprint of the original 1st ed. 1997)
Elisa Bertino, Beng Chin Ooi, Ron Sacks-Davis, Kian-Lee Tan, Justin Zobel, …
R4,547 Discovery Miles 45 470 Ships in 10 - 15 working days

Recent years have seen an explosive growth in the use of new database applications such as CAD/CAM systems, spatial information systems, and multimedia information systems. The needs of these applications are far more complex than traditional business applications. They call for support of objects with complex data types, such as images and spatial objects, and for support of objects with wildly varying numbers of index terms, such as documents. Traditional indexing techniques such as the B-tree and its variants do not efficiently support these applications, and so new indexing mechanisms have been developed. As a result of the demand for database support for new applications, there has been a proliferation of new indexing techniques. The need for a book addressing indexing problems in advanced applications is evident. For practitioners and database and application developers, this book explains best practice, guiding the selection of appropriate indexes for each application. For researchers, this book provides a foundation for the development of new and more robust indexes. For newcomers, this book is an overview of the wide range of advanced indexing techniques. Indexing Techniques for Advanced Database Systems is suitable as a secondary text for a graduate level course on indexing techniques, and as a reference for researchers and practitioners in industry.

Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings... Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings (Paperback, 2012 ed.)
Li Xu, Elisa Bertino, Yi Mu
R1,660 Discovery Miles 16 600 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Funny Story
Emily Henry Paperback R360 R255 Discovery Miles 2 550
Iron Flame - The Empyrean: Book 2
Rebecca Yarros Hardcover R610 R488 Discovery Miles 4 880
Bad Luck Penny
Amy Heydenrych Paperback  (1)
R350 R255 Discovery Miles 2 550
Terms And Conditions - Dreamland…
Lauren Asher Paperback  (2)
R322 R265 Discovery Miles 2 650
The Recovery Agent
Janet Evanovich Paperback R411 R337 Discovery Miles 3 370
The Hardest Fall
Ella Maise Paperback R270 R216 Discovery Miles 2 160
Seven Letters
Sinead Moriarty Paperback  (1)
R320 R253 Discovery Miles 2 530
Marriage For One
Ella Maise Paperback R220 Discovery Miles 2 200
Learned By Heart
Emma Donoghue Paperback R365 R285 Discovery Miles 2 850
Fangirl Down
Tessa Bailey Paperback R295 R236 Discovery Miles 2 360

 

Partners