|
Showing 1 - 8 of
8 matches in All Departments
|
Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings (Paperback, 2014 ed.)
Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis
|
R2,723
Discovery Miles 27 230
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 13th
International Conference on Cryptology and Network Security, CANS
2014, held in Heraklion, Creete, Greece, in October 2014. The 25
revised full papers presented together with the abstracts of 3
invited talks were carefully reviewed and selected from 86
submissions. The papers cover topics of interest such as
encryption; cryptanalysis; malware analysis; and privacy and
identification systems as well as various types of network protocol
design and analysis work.
|
Human Aspects of Information Security, Privacy, and Trust - Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings (Paperback, 2014 ed.)
Theo Tryfonas, Ioannis Askoxylakis
|
R1,593
Discovery Miles 15 930
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the Second International
Conference on Human Aspects of Information Security, Privacy, and
Trust, HAS 2014, held as part of HCI International 2014 which took
place in Heraklion, Crete, Greece, in June 2014 and incorporated 14
conferences which similar thematic areas. HCII 2014 received a
total of 4766 submissions, of which 1476 papers and 220 posters
were accepted for publication after a careful reviewing process.
These papers address the latest research and development efforts
and highlight the human aspects of design and use of computing
systems. The papers thoroughly cover the entire field of
Human-Computer Interaction, addressing major advances in knowledge
and effective use of computers in a variety of application areas.
The 38 papers presented in the HAS 2014 proceedings are organized
in topical sections named: usable security; authentication and
passwords; security policy and awareness; human behaviour in cyber
security and privacy issues.
|
Human Aspects of Information Security, Privacy and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings (Paperback, 2013 ed.)
Louis Marinos, Ioannis Askoxylakis
|
R1,571
Discovery Miles 15 710
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the First
International Conference on Human Aspects of Information Security,
Privacy and Trust, HAS 2013, held as part of the 15th International
Conference on Human-Computer Interaction, HCII 2013, held in Las
Vegas, USA in July 2013, jointly with 12 other thematically similar
conferences. The total of 1666 papers and 303 posters presented at
the HCII 2013 conferences was carefully reviewed and selected from
5210 submissions. These papers address the latest research and
development efforts and highlight the human aspects of design and
use of computing systems. The papers accepted for presentation
thoroughly cover the entire field of human-computer interaction,
addressing major advances in knowledge and effective use of
computers in a variety of application areas. The total of 39
contributions was carefully reviewed and selected for inclusion in
the HAS proceedings. The papers are organized in the following
topical sections: novel authentication systems; human factors in
security; security and privacy policies; and user centric security
and privacy.
|
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012, Proceedings (Paperback, 2012 ed.)
Ioannis Askoxylakis, Henrich C. Poehls, Joachim Posegga
|
R1,523
Discovery Miles 15 230
|
Ships in 10 - 15 working days
|
This volume constitutes the refereed proceedings of the 6th IFIP WG
11.2 International Workshop on Information Security Theory and
Practice: Security, Privacy and Trust in Computing Systems and
Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in
June 2012. The 9 revised full papers and 8 short papers presented
together with three keynote speeches were carefully reviewed and
selected from numerous submissions. They are organized in topical
sections on protocols, privacy, policy and access control,
multi-party computation, cryptography, and mobile security.
|
Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows
|
R3,348
Discovery Miles 33 480
|
Ships in 10 - 15 working days
|
The two-volume set, LNCS 9878 and 9879 constitutes the refereed
proceedings of the 21st European Symposium on Research in Computer
Security, ESORICS 2016, held in Heraklion, Greece, in September
2016. The 60 revised full papers presented were carefully reviewed
and selected from 285 submissions. The papers cover a wide range of
topics in security and privacy, including data protection: systems
security, network security, access control, authentication, and
security in such emerging areas as cloud computing, cyber-physical
systems, and the Internet of Things.
|
Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows
|
R3,383
Discovery Miles 33 830
|
Ships in 10 - 15 working days
|
The two-volume set, LNCS 9878 and 9879 constitutes the refereed
proceedings of the 21st European Symposium on Research in Computer
Security, ESORICS 2016, held in Heraklion, Greece, in September
2016. The 60 revised full papers presented were carefully reviewed
and selected from 285 submissions. The papers cover a wide range of
topics in security and privacy, including data protection: systems
security, network security, access control, authentication, and
security in such emerging areas as cloud computing, cyber-physical
systems, and the Internet of Things.
|
Human Aspects of Information Security, Privacy, and Trust - Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings (Paperback, 2015 ed.)
Theo Tryfonas, Ioannis Askoxylakis
|
R1,673
Discovery Miles 16 730
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the Third International
Conference on Human Aspects of Information Security, Privacy, and
Trust, HAS 2015, held as part of the 17th International Conference
on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA,
USA, in August 2015 and received a total of 4843 submissions, of
which 1462 papers and 246 posters were accepted for publication
after a careful reviewing process. These papers address the latest
research and development efforts and highlight the human aspects of
design and use of computing systems. The papers thoroughly cover
the entire field of Human-Computer Interaction, addressing major
advances in knowledge and effective use of computers in a variety
of application areas. The 62 papers presented in the HAS 2015
proceedings are organized in topical sections as follows:
authentication, cybersecurity, privacy, security, and user
behavior, security in social media and smart technologies, and
security technologies.
|
Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings (Paperback, 1st ed. 2015)
Mauro Conti, Matthias Schunter, Ioannis Askoxylakis
|
R2,488
Discovery Miles 24 880
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 8th
International Conference on Trust and Trustworthy Computing, TRUST
2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full
papers and 3 short papers presented in this volume were carefully
reviewed and selected from 42 submissions. They were organized in
topical sections named: hardware-enhanced trusted execution; trust
and users; trusted systems and services; trust and privacy; and
building blocks for trust. There are 7 two-page abstracts of poster
papers included in the back matter of the volume.
|
You may like...
Cold Pursuit
Liam Neeson, Laura Dern
Blu-ray disc
R39
Discovery Miles 390
|