0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (7)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

SOFSEM 2015: Theory and Practice of Computer Science - 41st International Conference on Current Trends in Theory and Practice... SOFSEM 2015: Theory and Practice of Computer Science - 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Snezkou, Czech Republic, January 24-29, 2015, Proceedings (Paperback, 2015 ed.)
Giuseppe Italiano, Tiziana Margaria-Steffen, Jaroslav Pokorny, Jean-Jacques Quisquater, Roger Wattenhofer
R3,458 Discovery Miles 34 580 Ships in 10 - 15 working days

This book constitutes the proceedings of the 41st International Conference on Current Trends in Theory and Practice of Computer Science held in Pec pod Snezkou, Czech Republic, during January 24-29, 2015. The book features 8 invited talks and 42 regular papers which were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections named: foundations of computer science; software and Web engineering; data, information, and knowledge engineering; and cryptography, security, and verification.

Smart Card Research and Advanced Applications VI - IFIP 18th World Computer Congress TC8/WG8.8 & TC11/WG11.2 Sixth... Smart Card Research and Advanced Applications VI - IFIP 18th World Computer Congress TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS) 22-27 August 2004 Toulouse, France (Paperback, Softcover reprint of the original 1st ed. 2004)
Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, Anas Abou El Kalam
R1,569 Discovery Miles 15 690 Ships in 10 - 15 working days

In the Information Society, the smart card, or smart device with its processing power and link to its owner, will be the potential human representation or delegate in Ambient Intelligence (Pervasive Computing), where every appliance or computer will be connected, and where control and trust of the personal environment will be the next decade challenge. Smart card research is of increasing importance as the need for information security grows rapidly. Smart cards will play a very large role in ID management in secure systems. In many computer science areas, smart cards introduce new dimensions and opportunities. Disciplines like hardware design, operating systems, modeling systems, cryptography and distributed systems find new areas of applications or issues; smart cards also create new challenges for these domains. CARDIS, the IFIP Conference on Smart Card Research and Advanced Applications, gathers researchers and technologists who are focused in all aspects of the design, development, deployment, validation and application of smart cards or smart personal devices.This volume contains the 20 papers that have been selected by the CARDIS Program Committee for presentation at the 6th International Conference on Smart Card Research and Advanced Applications (CARDIS 2004), which was held in conjunction with the IFIP 18th World Computer Congress in Toulouse, France in August 2004 and sponsored by the International Federation for Information Processing (IFIP). With 20% of the papers coming from Asia, 20% from America, and 60% from Europe, the competition was particularly severe this year, with only 20 papers selected out of 45 very good submissions. Smart Card Research and Advanced Applications VI presents the latest advances in smart card research and applications, and will be essential reading for developers of smart cards and smart card applications, as well as for computer science researchers in computer architecture, computer security, and cryptography.

Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks - Third IFIP WG 11.2... Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks - Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings (Paperback, 2009 ed.)
Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September 2009. WISTP 2009 was the third int- national workshop devoted to information security theory and practice. WISTP 2009 built on the successful WISTP 2007 and 2008 conferences, held in Heraklion, Crete, Greece and Seville, Spain in May 2007 and May 2008, - spectively. The proceedings of WISTP 2007 and WISTP 2008 were published as volumes 4462 and 5019 of the Lecture Notes in Computer Science series. This workshop received the following support: - Co-sponsored by IFIP WG 11. 2 Small System Security - Co-sponsored by VDE ITG - Technical sponsorship of the IEEE Systems, Man & Cybernetics Society - Supported by the Technical Committee on Systems Safety and Security - Organized in cooperation with the ACM SIGSAC - Supported by ENISA - Supported by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) These proceedings contain 12 original papers covering a range of theoretical and practical topics in information security. For the purposes of the organi- tion of the WISTP program, the papers were divided into four main categories, namely: - Mobility - Attacks and Secure Implementations - Performance and Security - Cryptography The12papersincludedherewereselectedfromatotalof27submissions. The refereeing process was rigorous,involving at least three (and mostly four or ?ve) independent reports being prepared for each submission.

Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG... Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 (Paperback, 2007 ed.)
Damien Sauveron, Konstantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater
R1,641 Discovery Miles 16 410 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems, WISTP 2007, held in Heraklion, Crete, Greece in May 2007.

The 20 revised full papers are organized in topical sections on mobility, hardware and cryptography, privacy, cryptography schemes, smart cards, and small devices.

Smart Card. Research and Applications - Third International Conference, CARDIS'98 Louvain-la-Neuve, Belgium, September... Smart Card. Research and Applications - Third International Conference, CARDIS'98 Louvain-la-Neuve, Belgium, September 14-16, 1998 Proceedings (Paperback, 2000 ed.)
Jean-Jacques Quisquater, Bruce Schneier
R1,721 Discovery Miles 17 210 Ships in 10 - 15 working days

This volume constitutes the thoroughly refereed post-proceedings of the Third International Conference on Smart Card Research and Advanced Applications, CARDIS'98, held in Louvain-la-Neuve, Belgium in September 1998. The 35 revised full papers presented were carefully reviewed and updated for inclusion in this book. All current aspects of smart card research and applications development are addressed, in particular: Java cards, electronic commerce, efficiency, security (including cryptographic algorithms, cryptographic protocols, and authentication), and architecture.

Computer Security - ESORICS 98 - 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September... Computer Security - ESORICS 98 - 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings (Paperback, 1998)
Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann
R1,719 Discovery Miles 17 190 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998.
The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads.

Advances in Cryptology - EUROCRYPT '95 - International Conference on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '95 - International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995 Proceedings (Paperback, 1995 ed.)
Louis C. Guillou, Jean-Jacques Quisquater
R1,600 Discovery Miles 16 000 Ships in 10 - 15 working days

EUROCRYPT '95. Sponsored by the International Association for Cryp- logic Research (IACR), in cooperation with the Centre Commun d'Etudes de T616vision et T61Qcommunications (CCETT), a workshop on the theory and - plications of cryptographic techniques takes place at the Palais du Grand Large, Saint Malo, France, May 21-25, 1995. The General Chair of EUROCRYPT '95 is Franqoise Scarabin. The Or- nization Committee was helped by Maryvonne Lahaie and her communication team. Moreover, the CCETT has generously provided the help of a young - glish lady, Miss Virginia Cooper, for the secretariat of both the Organization arid Program Committees. They all did an excellent job in preparing the conference. It is our pleasure to thank them for their essential work. IACR and EUROCRYPT. According to a very good suggestion expressed during CRYPTO '82, the Association was established at CRYPTO '83. Today, the Association has approximately 600 members and the mailing file managed by its Secretariat consists of more than 2 000 names. The main goal of the Association is the sponsoring of two annual conferences: CRYPTO, every summer at the University of California, Santa Barbara (UCSB), and EUROCRYPT, every spring in a different European country. Moreover, the Association edits quarterly the Journal of Cryptology (JoC).

Computer Security - ESORICS 92 - Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25,... Computer Security - ESORICS 92 - Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992. Proceedings (Paperback, 1992 ed.)
Yves Deswarte, Gerard Eizenberg, Jean-Jacques Quisquater
R1,768 Discovery Miles 17 680 Ships in 10 - 15 working days

This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l'information et des syst mes) in cooperation with a large number of national and international societies and institutes.

The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (Paperback, 1st ed. 2016): Peter Y.... The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (Paperback, 1st ed. 2016)
Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater
R3,260 Discovery Miles 32 600 Ships in 10 - 15 working days

This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn's 80th birthday. The title of this books leans on the title of a serious history of cryptology named "The Codebreakers", written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology - past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
In Silence My Heart Speaks
Thobeka Yose Paperback R290 R195 Discovery Miles 1 950
How To Fix (Unf*ck) A Country - 6 Things…
Roy Havemann Paperback R310 R210 Discovery Miles 2 100
Carbon City Zero - A Collaborative Board…
Rami Niemi Game R656 Discovery Miles 6 560
Razer Kaira Pro Wireless Gaming…
R3,656 Discovery Miles 36 560
Bostik Clear Gel in Box (25ml)
R40 Discovery Miles 400
Maped Smiling Planet Pulse Sharpener - 1…
R13 Discovery Miles 130
Alva 5-Piece Roll-Up BBQ/ Braai Tool Set
R389 R346 Discovery Miles 3 460
Gotcha Gotcha Scorch Watch (Gents)
R329 R303 Discovery Miles 3 030
Croxley A4 PP Printed File Dividers…
R23 R21 Discovery Miles 210
Kendall Office Chair (Green)
 (1)
R1,699 R1,346 Discovery Miles 13 460

 

Partners