0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Searchable Encryption - From Concepts to Systems (Hardcover, 1st ed. 2023): Kui Ren, Cong Wang Searchable Encryption - From Concepts to Systems (Hardcover, 1st ed. 2023)
Kui Ren, Cong Wang
R3,695 Discovery Miles 36 950 Ships in 12 - 17 working days

This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from searchable encryption constructions. The book fits in the timely context, where the necessity of safeguarding important and sensitive data has been globally recognized. Traditional security measures, such as storing data behind network firewalls and layers of access control mechanisms to keep attackers out, are no longer sufficient to cope with the expanding landscape of surging cyber threats. There is an urgent call to keep sensitive data always encrypted to protect the data at rest, in transit, and in use. Doing so guarantees data confidentiality for owners, even if the data is out of their hands, e.g., hosted at in-the-cloud databases. The daunting challenge is how to perform computation over encrypted data. As we unfold in this book, searchable encryption, as a specific line of research in this broadly defined area, has received tremendous advancements over the past decades. This book is majorly oriented toward senior undergraduates, graduate students, and researchers, who want to work in the field and need extensive coverage of encrypted database research. It also targets security practitioners who want to make well-informed deployment choices of the latest advancements in searchable encryption for their targeted applications. Hopefully, this book will be beneficial in both regards.

Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON,... Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings (Paperback, 1st ed. 2018)
Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
R1,486 Discovery Miles 14 860 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017.The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more.The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.

Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada,... Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings (Paperback, 1st ed. 2018)
Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
R3,749 Discovery Miles 37 490 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017.The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.

Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October... Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings (Paperback, 1st ed. 2017)
Robert Deng, Jian Weng, Kui Ren, Vinod Yegneswaran
R1,617 Discovery Miles 16 170 Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016. The 32 revised full papers and 18 poster papers were carefully reviewed and selected from 137 submissions. The papers are organized thematically starting with mobile and network security, followed by applied cryptography, web security and privacy, system security, hardware security. The volume also includes papers from the ATCS workshop and the poster session.

Wireless Algorithms, Systems, and Applications - 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013,... Wireless Algorithms, Systems, and Applications - 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings (Paperback, 2013 ed.)
Kui Ren, Xue Liu, Weifa Liang, Ming Xu, Xiaohua Jia, …
R1,544 Discovery Miles 15 440 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.

Communication Security in Wireless Sensor Networks (Paperback): Kui Ren, Wenjing Lou Communication Security in Wireless Sensor Networks (Paperback)
Kui Ren, Wenjing Lou
R1,681 Discovery Miles 16 810 Ships in 10 - 15 working days
Communication Security in Wireless Sensor Networks (Paperback): Kui Ren, Wenjing Lou Communication Security in Wireless Sensor Networks (Paperback)
Kui Ren, Wenjing Lou
R1,686 Discovery Miles 16 860 Ships in 10 - 15 working days

A wireless sensor network (WSN) usually consists of a large number of small, low-cost devices that have limited energy supply, computation, memory, and communication capacities. Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Communication security is essential to the success of WSN applications, especially for those mission-critical applications working in unattended and even hostile environments. However, providing satisfactory security protection in WSNs has ever been a challenging task due to various network & resource constraints and malicious attacks. This motivates extensive research on communication security for WSNs. This book studies communication security in WSNs regarding three important aspects, namely, broadcast/multicast security, data report security, and random key pre-distribution. The latest research results on these topics are discussed in detail. The book will be of interest to researchers in the area of network security and wireless networks. It is also directed towards senior undergraduate and graduate students major in computer networks and information security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Spaceboy
David Walliams Paperback R464 Discovery Miles 4 640
Dagboek Van 'n Wimpy Kid 18 - Leekoppie
Jeff Kinney Paperback R185 R145 Discovery Miles 1 450
Giotto Colors 3.0 Colour Pencils (12…
R81 R67 Discovery Miles 670
Stabilo Arty Aquacolor Watercolour…
R114 Discovery Miles 1 140
Stabilo Arty Woody 3 in 1 Colour Pencils…
R367 Discovery Miles 3 670
Powerless - Book 1
Lauren Roberts Paperback R295 R199 Discovery Miles 1 990
Fake - Madison Kate: Book 3
Tate James Paperback R395 R279 Discovery Miles 2 790
Giotto Stilnovo Coloured Pencils (Box of…
 (11)
R436 R358 Discovery Miles 3 580
Reckless - The Powerless Trilogy: Book 2
Lauren Roberts Paperback R295 R199 Discovery Miles 1 990
Croxley Create Wood Free Pencil Crayons…
R12 Discovery Miles 120

 

Partners