0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (11)
  • R2,500 - R5,000 (8)
  • -
Status
Brand

Showing 1 - 19 of 19 matches in All Departments

Dynamics of Vehicle-Road Coupled System (Hardcover, 2015 ed.): Shaopu Yang, Liqun Chen, Shaohua Li Dynamics of Vehicle-Road Coupled System (Hardcover, 2015 ed.)
Shaopu Yang, Liqun Chen, Shaohua Li
R4,436 R3,748 Discovery Miles 37 480 Save R688 (16%) Ships in 12 - 17 working days

Vehicle dynamics and road dynamics are usually considered to be two largely independent subjects. In vehicle dynamics, road surface roughness is generally regarded as random excitation of the vehicle, while in road dynamics, the vehicle is generally regarded as a moving load acting on the pavement. This book suggests a new research concept to integrate the vehicle and the road system with the help of a tire model, and establishes a cross-subject research framework dubbed vehicle-pavement coupled system dynamics. In this context, the dynamics of the vehicle, road and the vehicle-road coupled system are investigated by means of theoretical analysis, numerical simulations and field tests. This book will be a valuable resource for university professors, graduate students and engineers majoring in automotive design, mechanical engineering, highway engineering and other related areas. Shaopu Yang is a professor and deputy president of Shijiazhuang Tiedao University, China; Liqun Chen is a professor at Shanghai University, Shanghai, China; Shaohua Li is a professor at Shijiazhuang Tiedao University, China.

Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014): Graeme Proudler, Liqun Chen, Chris Dalton Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014)
Graeme Proudler, Liqun Chen, Chris Dalton
R4,826 Discovery Miles 48 260 Ships in 12 - 17 working days

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Control of Axially Moving Systems (Hardcover, 1st ed. 2022): Keum-Shik Hong, Liqun Chen, Phuong-Tung Pham, Xiaodong Yang Control of Axially Moving Systems (Hardcover, 1st ed. 2022)
Keum-Shik Hong, Liqun Chen, Phuong-Tung Pham, Xiaodong Yang
R4,271 Discovery Miles 42 710 Ships in 10 - 15 working days

This book provides a comprehensive guideline on dynamic analysis and vibration control of axially moving systems. First, the mathematical models of various axially moving systems describing the string, beam, belt, and plate models are developed. Accordingly, dynamical issues such as the equilibrium configuration, critical velocity, stability, bifurcation, and further chaotic dynamics are analyzed. Second, this book covers the design of the control schemes based on the hitherto control strategies for axially moving systems: feedback control using the transfer function, variable structure control, control by regulating the axial velocity, wave cancellation approach, boundary control using the Lyapunov method, adaptive control, and hybrid control methods. Finally, according to the contents discussed in the book, specific aspects are outlined for initiating future research endeavors to be undertaken concerning axially moving systems. This book is useful to graduate students and researchers in industrial sectors such as continuous manufacturing systems, transport systems, power transmission systems, and lifting systems not to mention in academia.

Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings (Paperback,... Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings (Paperback, 1st ed. 2018)
Liqun Chen, Mark Manulis, Steve Schneider
R1,540 Discovery Miles 15 400 Ships in 10 - 15 working days

This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.

Dynamics of Vehicle-Road Coupled System (Paperback, Softcover reprint of the original 1st ed. 2015): Shaopu Yang, Liqun Chen,... Dynamics of Vehicle-Road Coupled System (Paperback, Softcover reprint of the original 1st ed. 2015)
Shaopu Yang, Liqun Chen, Shaohua Li
R3,964 Discovery Miles 39 640 Ships in 10 - 15 working days

Vehicle dynamics and road dynamics are usually considered to be two largely independent subjects. In vehicle dynamics, road surface roughness is generally regarded as random excitation of the vehicle, while in road dynamics, the vehicle is generally regarded as a moving load acting on the pavement. This book suggests a new research concept to integrate the vehicle and the road system with the help of a tire model, and establishes a cross-subject research framework dubbed vehicle-pavement coupled system dynamics. In this context, the dynamics of the vehicle, road and the vehicle-road coupled system are investigated by means of theoretical analysis, numerical simulations and field tests. This book will be a valuable resource for university professors, graduate students and engineers majoring in automotive design, mechanical engineering, highway engineering and other related areas. Shaopu Yang is a professor and deputy president of Shijiazhuang Tiedao University, China; Liqun Chen is a professor at Shanghai University, Shanghai, China; Shaohua Li is a professor at Shijiazhuang Tiedao University, China.

Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings... Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings (Paperback, 2014 ed.)
Liqun Chen, Chris Mitchell
R2,186 Discovery Miles 21 860 Ships in 10 - 15 working days

This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.

Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers... Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers (Paperback, 2012)
Liqun Chen, Moti Yung, Liehuang Zhu
R1,489 Discovery Miles 14 890 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.

Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers... Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers (Paperback, 2011)
Liqun Chen, Moti Yung
R1,492 Discovery Miles 14 920 Ships in 10 - 15 working days

This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings (Paperback,... Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings (Paperback, 2011 ed.)
Liqun Chen
R1,531 Discovery Miles 15 310 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC 2011, held in Oxford, UK in December 2011. The 27 revised full papers presented together with one invited contribution were carefully reviewed and selected from 57 submissions. The papers cover a wide range of topics in the field of mathematics and computer science, including coding theory, homomorphic encryption, symmetric and public key cryptosystems, cryptographic functions and protocols, efficient pairing and scalar multiplication implementation, knowledge proof, and security analysis.

Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008.... Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings (Paperback, 2008 ed.)
Liqun Chen, Mark Ryan, Guilin Wang
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

The10thInternationalConferenceonInformationandCommunicationsSecurity (ICICS) was held in Birmingham, UK, during 20-22 October 2008. The ICICS conference series is an established forum that brings together people working in di?erent ?elds of information and communications security from universities, researchinstitutes, industryandgovernmentinstitutions, andgivestheattendees the opportunity to exchange new ideas and investigate state-of-the-art devel- ments. In previous years, ICICS has taken place in China (2007, 2005, 2003, 2001, 1997), USA (2006), Spain (2004), Singapore (2002), and Australia (1999). On each occasion, as on this one, the proceedings were published in the Springer LNCS series. In total, 125 papers from 33 countries were submitted to ICICS 2008, and 27 were accepted covering multiple disciplines of information security and applied cryptography(acceptancerate22%).EachsubmissiontoICICS2008wasano- mously reviewed by three or four reviewers. We are grateful to the Programme Committee, whichwascomposedof57membersfrom12countries;wethankthem aswellasallexternalrefereesfortheirtimeandvaluedcontributionstothetough andtime-consuming reviewingprocess. In addition to the contributed speakers, the programme also featured three invitedspeakers.We aregratefulto JoshuaGuttman (The MITRE Corporation, USA), Peng Ning (North Carolina State University, USA), and Nigel Smart (University of Bristol, UK) for accepting our invitation to speak. ICICS 2008 was organised by the University of Birmingham and Hewlett Packard Laboratories. We gratefully acknowledge sponsorship from the UK - gineering and Physical Sciences Research Council (EPSRC), as well as Hewlett Packard and the University of Birmin

Information Security Practice and Experience - 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008... Information Security Practice and Experience - 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings (Paperback, 2008 ed.)
Liqun Chen, Yi Mu, Willy Susilo
R1,512 Discovery Miles 15 120 Ships in 10 - 15 working days

The4thInformationSecurityPracticeandExperienceConference(ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, Australia, during April 21-23, 2008. The previous three conferences were held in Singapore in 2005, Hangzhou, China in 2006 and Hong Kong, China in 2007. As with the previous three conference proceedings, the proceedings of ISPEC 2008 were published in the LNCS series by Springer. Theconferencereceived95submissions, outofwhichtheProgramCommittee selected 29 papers for presentation at the conference. These papers are included in the proceedings. The accepted papers cover a range of topics in mathem- ics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve-basedsecuritypractice, securitycomputationandso forth.The conference proceedings contain revised versions of the selected papers. Since some of them were not checked again for correctness before publication, the authors (and not the ProgramCommittee)bear full responsibilityfor the contentsoftheir papers. In addition to the contributed papers, the program comprised two invited talks.TheinvitedspeakerswereVijayVaradharajan(MacquarieUniversity, A- tralia) and Robert Huijie Deng (Singapore Management University, Singapore). Special thanks are due to these speakers. Wewouldliketothankallthepeoplewhohelpedwiththeconferenceprogram and organization. First, we thank the Steering Committee for their guidance on the general format of the conference. We also heartily thank the Program Committee and the sub-reviewers listed on the following pages for their hard e?orts and time contributed to the review process, which took seven weeks. Each paper was carefully evaluated by at least two or three people. There was signi?cant online discussion about a large number of pape

Control of Axially Moving Systems (Paperback, 1st ed. 2022): Keum-Shik Hong, Liqun Chen, Phuong-Tung Pham, Xiaodong Yang Control of Axially Moving Systems (Paperback, 1st ed. 2022)
Keum-Shik Hong, Liqun Chen, Phuong-Tung Pham, Xiaodong Yang
R4,240 Discovery Miles 42 400 Ships in 10 - 15 working days

This book provides a comprehensive guideline on dynamic analysis and vibration control of axially moving systems. First, the mathematical models of various axially moving systems describing the string, beam, belt, and plate models are developed. Accordingly, dynamical issues such as the equilibrium configuration, critical velocity, stability, bifurcation, and further chaotic dynamics are analyzed. Second, this book covers the design of the control schemes based on the hitherto control strategies for axially moving systems: feedback control using the transfer function, variable structure control, control by regulating the axial velocity, wave cancellation approach, boundary control using the Lyapunov method, adaptive control, and hybrid control methods. Finally, according to the contents discussed in the book, specific aspects are outlined for initiating future research endeavors to be undertaken concerning axially moving systems. This book is useful to graduate students and researchers in industrial sectors such as continuous manufacturing systems, transport systems, power transmission systems, and lifting systems not to mention in academia.

Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK,... Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.

Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK,... Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.

Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017,... Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings (Paperback, 1st ed. 2018)
Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu
R3,125 Discovery Miles 31 250 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security.

Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings (Paperback,... Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings (Paperback, 1st ed. 2016)
Liqun Chen, Jinguang Han
R2,588 Discovery Miles 25 880 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016. The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The papers are grouped in topical sections on attribute/role-based cryptography, data in cloud, searchable encryption, key management, encryption, leakage analysis, homomorphic encryption.

Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18,... Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings (Paperback, 1st ed. 2016)
Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang
R2,542 Discovery Miles 25 420 Ships in 10 - 15 working days

This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.

Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings... Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings (Paperback, 1st ed. 2015)
Liqun Chen, Shin'ichiro Matsuo
R2,221 Discovery Miles 22 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Security Standardisation Research, SSR 2015, held in Tokyo, Japan, in December 2015. The 13 papers presented in this volume were carefully reviewed and selected from 18 submissions. They are organized in topical sections named: bitcoin and payment; protocol and API; analysis on cryptographic algorithm; privacy; and trust and formal analysis.

Trusted Computing - Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009,  Proceedings (Paperback, 2009... Trusted Computing - Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings (Paperback, 2009 ed.)
Liqun Chen, Chris J. Mitchell, Andrew Martin
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

Thisvolumecontainsthe15paperspresentedinthetechnicalstrandoftheTrust 2009 conference, held in Oxford, UK in April 2009. Trust 2009 was the second international conference devoted to the technical and socio-economic aspects of trusted computing. The conference had two main strands, one devoted to technical aspects of trusted computing (addressed by these proceedings), and the other devoted to socio-economic aspects. Trust 2009 built on the successful Trust 2008 conference, held in Villach, Austria in March 2008. The proceedings of Trust 2008, containing 14 papers, were published in volume 4968 of the Lecture Notes in Computer Science series. ThetechnicalstrandofTrust2009contained15originalpapersonthedesign and application of trusted computing. For these proceedings the papers have been divided into four main categories, namely: - Implementation of trusted computing - Attestation - PKI for trusted computing - Applications of trusted computing The 15 papers included here were selected from a total of 33 submissions. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion. We believe that the result is a high-quality set of papers, some of which have been signi?cantly improved as a result of the refereeing process. We would also like to thank all the authors who submitted their papers to the technical strand of the Trust 2009 conference, all external referees, and all the attendees of the conference.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
STEM Activity: Sensational Science
Steph Clarkson Paperback  (4)
R246 R202 Discovery Miles 2 020
Russell Hobbs Toaster (4 Slice) (Matt…
R1,167 Discovery Miles 11 670
Microsoft Xbox Elite Series 2 Wireless…
 (1)
R4,962 Discovery Miles 49 620
I Will Not Be Silenced
Karyn Maughan Paperback R350 R260 Discovery Miles 2 600
Dig & Discover: Ancient Egypt - Excavate…
Hinkler Pty Ltd Kit R256 R222 Discovery Miles 2 220
Sony NEW Playstation Dualshock 4 v2…
 (22)
R1,428 Discovery Miles 14 280
Bostik Double-Sided Tape (18mm x 10m…
 (1)
R31 Discovery Miles 310
Multifunction Water Gun - Gladiator
R399 R379 Discovery Miles 3 790
Versace Versace Eros Eau De Parfum Spray…
R1,626 R1,158 Discovery Miles 11 580
The Lord Is My Strength And My Song…
Paperback R35 R29 Discovery Miles 290

 

Partners