0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Content Computing - Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004,... Content Computing - Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings (Paperback, 2004 ed.)
Chi-Hung Chi, Kwok Yan Lam
R1,700 Discovery Miles 17 000 Ships in 10 - 15 working days

Welcome to the Advanced Workshop on Content Computing 2004. The focus of this workshop was "Content Computing." It emphasized research areas that facilitate e?cient, appropriate dissemination of content to users with the nec- saryaccessrights. Weusetheword"content"insteadof"information"or"data" because we want to cover not only raw data but also presentation quality. The fast growth of the Internet has already made it the key infrastructure for informationdissemination, education, business andentertainment. While the client-server model has been the most widely adopted paradigm for the WWW, thedesiretoprovidemorevalue-addedservicesinthedeliverylayerhasledtothe concept of an active network, where content-driven, intelligent computation will be performed to provide quality-of-service for content presentation and best-'t client demand. These value-added services typically aim to enhance information security, provide pervasive Internet access, and improve application robustness, system/networkperformance, knowledgeextraction, etc. Theyarerealizedby- corporatingsophisticatedmechanisms atthe deliverylayer, which is transparent to the content providers and Web surfers. Consequently, the notion of "Content Computing" has emerged. Content computing is a new paradigm for coordin- ing distributed systems and intelligent networks, based on a peer-to-peer model and with value-added processing of the application-speci?c contents at the - livery layer. This paradigm is especially useful to pervasive lightweight client devices such as mobile and portable end-user terminals with a wide variation of hardware/software con?gurations. This year, the workshop was held in Zhenjiang, Jiangsu, China. We received 194 high-quality papers from 11 regions, namely PR China, Korea, Singapore, Japan, United States, Canada, Australia, Germany, Taiwan, Italy, and Hong Kong. Totally, 62 papers were accepted and presented in the workshop.

Advances in Cryptology - ASIACRYPT'99 - International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT'99 - International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999 Proceedings (Paperback, 1999 ed.)
Kwok Yan Lam, Eiji Okamoto, Chaoping Xing
R1,641 Discovery Miles 16 410 Ships in 10 - 15 working days

Asiacrypt'99 was held in Singapore on 14-18 November 1999. Asiacrypt is one of the major events in the cryptology research community. Asiacrypt'99, the ?fth annual Asiacrypt conference, was sponsored by the Asiacrypt Steering Comm- tee and the Centre for Systems Security of the National University of Singapore, and in cooperation with the International Association for Cryptology Research. As the Program Co-Chairs of Asiacrypt'99, we are extremely honored to or- nize this event, which showcases the state-of-the-art development of cryptology research at the conclusion of this millennium. This year, a total of 96 research papers were submitted to Asiacrypt'99. The portfolio of country of origin of submissions serves as a good indicator of the - ternational reputation of the conference. Countries from which submissions or- inated include: Australia, Belgium, China, Estonia, France, Germany, Greece, India, Iran, Japan, Korea, Norway, Russia, Saudi Arabia, Switzerland, Sin- pore, Spain, Taiwan, Thailand, The Netherlands, Turkey, Ukraine, UK, USA and Yugoslavia. Through a stringent refereeing process by the Program C- mittee, 31 papers of outstanding quality were accepted and are included in the conference proceedings. Accepted papers were authored by researchers from the following countries: Australia, Belgium, France, Germany, India, Japan, China, Singapore, Switzerland, Taiwan, The Netherlands, UK, and USA.

Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020,... Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings (Paperback, 1st ed. 2020)
Khoa Nguyen, Wenling Wu, Kwok Yan Lam, Huaxiong Wang
R1,512 Discovery Miles 15 120 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020. The 20 full papers presented were carefully reviewed and selected from 59 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: signature schemes, encryption schemes and NIZKS, secure machine learning and multiparty computation, secret sharing schemes, and security analyses.* The conference was held virtually due to the COVID-19 pandemic.

Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 -... Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings (Paperback, 1st ed. 2016)
Kwok Yan Lam, Chi-Hung Chi, Sihan Qing
R2,829 Discovery Miles 28 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016. The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Winsor & Newton Cotman - Watercolour…
 (6)
R3,254 R2,043 Discovery Miles 20 430
The Philosophy of Progress in Human…
Henry James Slack Paperback R469 Discovery Miles 4 690
Schmincke - Horadam Watercolour Paint…
R2,565 R2,269 Discovery Miles 22 690
See What You Made Me Do - Power, Control…
Jess Hill Hardcover R736 Discovery Miles 7 360
Schmincke Horadam Watercolour Paint…
R2,558 R2,261 Discovery Miles 22 610
Sociology - Issues and Debates
Helen Taylor, Taylor Hardcover R3,958 Discovery Miles 39 580
The Social Significance of the Modern…
Emma Goldman Hardcover R767 Discovery Miles 7 670
Military Chaplains' Review - Alcohol…
unknownauthor Hardcover R609 Discovery Miles 6 090
Making Love In A War Zone - Interracial…
Jonathan Jansen Paperback  (3)
R90 R71 Discovery Miles 710
Maimeriblu - 018 Titanium White (12ml…
R252 R235 Discovery Miles 2 350

 

Partners