0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Content Computing - Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004,... Content Computing - Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings (Paperback, 2004 ed.)
Chi-Hung Chi, Kwok Yan Lam
R1,841 Discovery Miles 18 410 Ships in 10 - 15 working days

Welcome to the Advanced Workshop on Content Computing 2004. The focus of this workshop was "Content Computing." It emphasized research areas that facilitate e?cient, appropriate dissemination of content to users with the nec- saryaccessrights. Weusetheword"content"insteadof"information"or"data" because we want to cover not only raw data but also presentation quality. The fast growth of the Internet has already made it the key infrastructure for informationdissemination, education, business andentertainment. While the client-server model has been the most widely adopted paradigm for the WWW, thedesiretoprovidemorevalue-addedservicesinthedeliverylayerhasledtothe concept of an active network, where content-driven, intelligent computation will be performed to provide quality-of-service for content presentation and best-'t client demand. These value-added services typically aim to enhance information security, provide pervasive Internet access, and improve application robustness, system/networkperformance, knowledgeextraction, etc. Theyarerealizedby- corporatingsophisticatedmechanisms atthe deliverylayer, which is transparent to the content providers and Web surfers. Consequently, the notion of "Content Computing" has emerged. Content computing is a new paradigm for coordin- ing distributed systems and intelligent networks, based on a peer-to-peer model and with value-added processing of the application-speci?c contents at the - livery layer. This paradigm is especially useful to pervasive lightweight client devices such as mobile and portable end-user terminals with a wide variation of hardware/software con?gurations. This year, the workshop was held in Zhenjiang, Jiangsu, China. We received 194 high-quality papers from 11 regions, namely PR China, Korea, Singapore, Japan, United States, Canada, Australia, Germany, Taiwan, Italy, and Hong Kong. Totally, 62 papers were accepted and presented in the workshop.

Advances in Cryptology - ASIACRYPT'99 - International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT'99 - International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999 Proceedings (Paperback, 1999 ed.)
Kwok Yan Lam, Eiji Okamoto, Chaoping Xing
R1,778 Discovery Miles 17 780 Ships in 10 - 15 working days

Asiacrypt'99 was held in Singapore on 14-18 November 1999. Asiacrypt is one of the major events in the cryptology research community. Asiacrypt'99, the ?fth annual Asiacrypt conference, was sponsored by the Asiacrypt Steering Comm- tee and the Centre for Systems Security of the National University of Singapore, and in cooperation with the International Association for Cryptology Research. As the Program Co-Chairs of Asiacrypt'99, we are extremely honored to or- nize this event, which showcases the state-of-the-art development of cryptology research at the conclusion of this millennium. This year, a total of 96 research papers were submitted to Asiacrypt'99. The portfolio of country of origin of submissions serves as a good indicator of the - ternational reputation of the conference. Countries from which submissions or- inated include: Australia, Belgium, China, Estonia, France, Germany, Greece, India, Iran, Japan, Korea, Norway, Russia, Saudi Arabia, Switzerland, Sin- pore, Spain, Taiwan, Thailand, The Netherlands, Turkey, Ukraine, UK, USA and Yugoslavia. Through a stringent refereeing process by the Program C- mittee, 31 papers of outstanding quality were accepted and are included in the conference proceedings. Accepted papers were authored by researchers from the following countries: Australia, Belgium, France, Germany, India, Japan, China, Singapore, Switzerland, Taiwan, The Netherlands, UK, and USA.

Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020,... Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings (Paperback, 1st ed. 2020)
Khoa Nguyen, Wenling Wu, Kwok Yan Lam, Huaxiong Wang
R1,642 Discovery Miles 16 420 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020. The 20 full papers presented were carefully reviewed and selected from 59 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: signature schemes, encryption schemes and NIZKS, secure machine learning and multiparty computation, secret sharing schemes, and security analyses.* The conference was held virtually due to the COVID-19 pandemic.

Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 -... Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings (Paperback, 1st ed. 2016)
Kwok Yan Lam, Chi-Hung Chi, Sihan Qing
R3,029 Discovery Miles 30 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016. The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Disney Lion King
Hardcover R50 R40 Discovery Miles 400
What Can You Hear Construction
Roger Priddy, Priddy Books Board book R250 R227 Discovery Miles 2 270
Friends Farm
Roger Priddy Board book  (1)
R218 Discovery Miles 2 180
Noisy Rhymes Incy Wincy Spider
Philip Dauncey Board book R197 Discovery Miles 1 970
Farm Animals
Hardcover R390 R360 Discovery Miles 3 600
Busy Noisy Ocean - A Musical Adventure…
Carmen Crowe Board book R403 Discovery Miles 4 030
Baby's Very First Noisy Book Things That…
Fiona Watt Board book  (1)
R326 R276 Discovery Miles 2 760
Listen to the Sounds of Spring Sound…
Marion Billet Board book R301 R235 Discovery Miles 2 350
Twas the Night Before Christmas - Wind…
Clement C Moore Hardcover R675 R603 Discovery Miles 6 030
Listen to the Jungle
Marion Billet Board book R305 R272 Discovery Miles 2 720

 

Partners