0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014.... Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings (Paperback, 2014 ed.)
Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis
R2,623 Discovery Miles 26 230 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.

Human Aspects of Information Security, Privacy, and Trust - Second International Conference, HAS 2014, Held as Part of HCI... Human Aspects of Information Security, Privacy, and Trust - Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings (Paperback, 2014 ed.)
Theo Tryfonas, Ioannis Askoxylakis
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 38 papers presented in the HAS 2014 proceedings are organized in topical sections named: usable security; authentication and passwords; security policy and awareness; human behaviour in cyber security and privacy issues.

Human Aspects of Information Security, Privacy and Trust - First International Conference, HAS 2013, Held as Part of HCI... Human Aspects of Information Security, Privacy and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings (Paperback, 2013 ed.)
Louis Marinos, Ioannis Askoxylakis
R1,500 Discovery Miles 15 000 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 39 contributions was carefully reviewed and selected for inclusion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy.

Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems -... Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012, Proceedings (Paperback, 2012 ed.)
Ioannis Askoxylakis, Henrich C. Poehls, Joachim Posegga
R1,453 Discovery Miles 14 530 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security.

Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September... Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows
R3,231 Discovery Miles 32 310 Ships in 10 - 15 working days

The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things.

Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September... Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows
R3,266 Discovery Miles 32 660 Ships in 10 - 15 working days

The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things.

Human Aspects of Information Security, Privacy, and Trust - Third International Conference, HAS 2015, Held as Part of HCI... Human Aspects of Information Security, Privacy, and Trust - Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings (Paperback, 2015 ed.)
Theo Tryfonas, Ioannis Askoxylakis
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

This book constitutes the proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 62 papers presented in the HAS 2015 proceedings are organized in topical sections as follows: authentication, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies.

Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings... Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings (Paperback, 1st ed. 2015)
Mauro Conti, Matthias Schunter, Ioannis Askoxylakis
R2,393 Discovery Miles 23 930 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
700ml Grip Water Bottle
R20 Discovery Miles 200
Conwood Juliet Vanity Case (Black)
R606 Discovery Miles 6 060
Bloedbroers - Na die slagveld van…
Deon Lamprecht Paperback R290 R195 Discovery Miles 1 950
Creepsterz Oily Snake-Blindbox
R60 Discovery Miles 600
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Philips TAUE101 Wired In-Ear Headphones…
R199 R129 Discovery Miles 1 290
Bostik Art & Craft Sprayable Adhesive…
R189 Discovery Miles 1 890
Efekto Cypermethrin - Emulsifiable…
R109 Discovery Miles 1 090
Cadac Pizza Stone (33cm)
 (18)
R398 Discovery Miles 3 980
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840

 

Partners