0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Content Computing - Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004,... Content Computing - Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings (Paperback, 2004 ed.)
Chi-Hung Chi, Kwok Yan Lam
R1,700 Discovery Miles 17 000 Ships in 10 - 15 working days

Welcome to the Advanced Workshop on Content Computing 2004. The focus of this workshop was "Content Computing." It emphasized research areas that facilitate e?cient, appropriate dissemination of content to users with the nec- saryaccessrights. Weusetheword"content"insteadof"information"or"data" because we want to cover not only raw data but also presentation quality. The fast growth of the Internet has already made it the key infrastructure for informationdissemination, education, business andentertainment. While the client-server model has been the most widely adopted paradigm for the WWW, thedesiretoprovidemorevalue-addedservicesinthedeliverylayerhasledtothe concept of an active network, where content-driven, intelligent computation will be performed to provide quality-of-service for content presentation and best-'t client demand. These value-added services typically aim to enhance information security, provide pervasive Internet access, and improve application robustness, system/networkperformance, knowledgeextraction, etc. Theyarerealizedby- corporatingsophisticatedmechanisms atthe deliverylayer, which is transparent to the content providers and Web surfers. Consequently, the notion of "Content Computing" has emerged. Content computing is a new paradigm for coordin- ing distributed systems and intelligent networks, based on a peer-to-peer model and with value-added processing of the application-speci?c contents at the - livery layer. This paradigm is especially useful to pervasive lightweight client devices such as mobile and portable end-user terminals with a wide variation of hardware/software con?gurations. This year, the workshop was held in Zhenjiang, Jiangsu, China. We received 194 high-quality papers from 11 regions, namely PR China, Korea, Singapore, Japan, United States, Canada, Australia, Germany, Taiwan, Italy, and Hong Kong. Totally, 62 papers were accepted and presented in the workshop.

Advances in Cryptology - ASIACRYPT'99 - International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT'99 - International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999 Proceedings (Paperback, 1999 ed.)
Kwok Yan Lam, Eiji Okamoto, Chaoping Xing
R1,641 Discovery Miles 16 410 Ships in 10 - 15 working days

Asiacrypt'99 was held in Singapore on 14-18 November 1999. Asiacrypt is one of the major events in the cryptology research community. Asiacrypt'99, the ?fth annual Asiacrypt conference, was sponsored by the Asiacrypt Steering Comm- tee and the Centre for Systems Security of the National University of Singapore, and in cooperation with the International Association for Cryptology Research. As the Program Co-Chairs of Asiacrypt'99, we are extremely honored to or- nize this event, which showcases the state-of-the-art development of cryptology research at the conclusion of this millennium. This year, a total of 96 research papers were submitted to Asiacrypt'99. The portfolio of country of origin of submissions serves as a good indicator of the - ternational reputation of the conference. Countries from which submissions or- inated include: Australia, Belgium, China, Estonia, France, Germany, Greece, India, Iran, Japan, Korea, Norway, Russia, Saudi Arabia, Switzerland, Sin- pore, Spain, Taiwan, Thailand, The Netherlands, Turkey, Ukraine, UK, USA and Yugoslavia. Through a stringent refereeing process by the Program C- mittee, 31 papers of outstanding quality were accepted and are included in the conference proceedings. Accepted papers were authored by researchers from the following countries: Australia, Belgium, France, Germany, India, Japan, China, Singapore, Switzerland, Taiwan, The Netherlands, UK, and USA.

Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020,... Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings (Paperback, 1st ed. 2020)
Khoa Nguyen, Wenling Wu, Kwok Yan Lam, Huaxiong Wang
R1,512 Discovery Miles 15 120 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020. The 20 full papers presented were carefully reviewed and selected from 59 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: signature schemes, encryption schemes and NIZKS, secure machine learning and multiparty computation, secret sharing schemes, and security analyses.* The conference was held virtually due to the COVID-19 pandemic.

Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 -... Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings (Paperback, 1st ed. 2016)
Kwok Yan Lam, Chi-Hung Chi, Sihan Qing
R2,829 Discovery Miles 28 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016. The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Misfit - Stories Vannie Anne Kant
Chase Rhys Paperback R260 R224 Discovery Miles 2 240
The Papery A5 WOW 2025 Diary - Wolf
R349 R300 Discovery Miles 3 000
High Waist Leggings (Black)
R169 R49 Discovery Miles 490
King Of Greed - Kings Of Sin: Book 3
Ana Huang Paperback R280 R140 Discovery Miles 1 400
Vital BabyŽ NOURISH™ Power™ Suction Bowl…
R159 Discovery Miles 1 590
Cracker Island
Gorillaz CD R207 R158 Discovery Miles 1 580
Double Sided Wallet
R91 Discovery Miles 910
Baby Dove Soap Bar Rich Moisture 75g
R20 Discovery Miles 200
Bostik Glue Stick - Loose (25g)
R31 R19 Discovery Miles 190
Midea Classic Top Loader Water Dispenser…
R3,655 Discovery Miles 36 550

 

Partners