0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (13)
  • R2,500 - R5,000 (7)
  • -
Status
Brand

Showing 1 - 20 of 20 matches in All Departments

Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014): Graeme Proudler, Liqun Chen, Chris Dalton Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014)
Graeme Proudler, Liqun Chen, Chris Dalton
R4,853 Discovery Miles 48 530 Ships in 10 - 15 working days

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Dynamics of Vehicle-Road Coupled System (Hardcover, 2015 ed.): Shaopu Yang, Liqun Chen, Shaohua Li Dynamics of Vehicle-Road Coupled System (Hardcover, 2015 ed.)
Shaopu Yang, Liqun Chen, Shaohua Li
R4,255 R3,771 Discovery Miles 37 710 Save R484 (11%) Ships in 10 - 15 working days

Vehicle dynamics and road dynamics are usually considered to be two largely independent subjects. In vehicle dynamics, road surface roughness is generally regarded as random excitation of the vehicle, while in road dynamics, the vehicle is generally regarded as a moving load acting on the pavement. This book suggests a new research concept to integrate the vehicle and the road system with the help of a tire model, and establishes a cross-subject research framework dubbed vehicle-pavement coupled system dynamics. In this context, the dynamics of the vehicle, road and the vehicle-road coupled system are investigated by means of theoretical analysis, numerical simulations and field tests. This book will be a valuable resource for university professors, graduate students and engineers majoring in automotive design, mechanical engineering, highway engineering and other related areas. Shaopu Yang is a professor and deputy president of Shijiazhuang Tiedao University, China; Liqun Chen is a professor at Shanghai University, Shanghai, China; Shaohua Li is a professor at Shijiazhuang Tiedao University, China.

Control of Axially Moving Systems (Hardcover, 1st ed. 2022): Keum-Shik Hong, Liqun Chen, Phuong-Tung Pham, Xiaodong Yang Control of Axially Moving Systems (Hardcover, 1st ed. 2022)
Keum-Shik Hong, Liqun Chen, Phuong-Tung Pham, Xiaodong Yang
R4,050 Discovery Miles 40 500 Ships in 18 - 22 working days

This book provides a comprehensive guideline on dynamic analysis and vibration control of axially moving systems. First, the mathematical models of various axially moving systems describing the string, beam, belt, and plate models are developed. Accordingly, dynamical issues such as the equilibrium configuration, critical velocity, stability, bifurcation, and further chaotic dynamics are analyzed. Second, this book covers the design of the control schemes based on the hitherto control strategies for axially moving systems: feedback control using the transfer function, variable structure control, control by regulating the axial velocity, wave cancellation approach, boundary control using the Lyapunov method, adaptive control, and hybrid control methods. Finally, according to the contents discussed in the book, specific aspects are outlined for initiating future research endeavors to be undertaken concerning axially moving systems. This book is useful to graduate students and researchers in industrial sectors such as continuous manufacturing systems, transport systems, power transmission systems, and lifting systems not to mention in academia.

Dynamics of Vehicle-Road Coupled System (Paperback, Softcover reprint of the original 1st ed. 2015): Shaopu Yang, Liqun Chen,... Dynamics of Vehicle-Road Coupled System (Paperback, Softcover reprint of the original 1st ed. 2015)
Shaopu Yang, Liqun Chen, Shaohua Li
R3,741 Discovery Miles 37 410 Ships in 18 - 22 working days

Vehicle dynamics and road dynamics are usually considered to be two largely independent subjects. In vehicle dynamics, road surface roughness is generally regarded as random excitation of the vehicle, while in road dynamics, the vehicle is generally regarded as a moving load acting on the pavement. This book suggests a new research concept to integrate the vehicle and the road system with the help of a tire model, and establishes a cross-subject research framework dubbed vehicle-pavement coupled system dynamics. In this context, the dynamics of the vehicle, road and the vehicle-road coupled system are investigated by means of theoretical analysis, numerical simulations and field tests. This book will be a valuable resource for university professors, graduate students and engineers majoring in automotive design, mechanical engineering, highway engineering and other related areas. Shaopu Yang is a professor and deputy president of Shijiazhuang Tiedao University, China; Liqun Chen is a professor at Shanghai University, Shanghai, China; Shaohua Li is a professor at Shijiazhuang Tiedao University, China.

Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings... Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings (Paperback, 2014 ed.)
Liqun Chen, Chris Mitchell
R2,068 Discovery Miles 20 680 Ships in 18 - 22 working days

This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.

Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers... Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers (Paperback, 2012)
Liqun Chen, Moti Yung, Liehuang Zhu
R1,426 Discovery Miles 14 260 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.

Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers... Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers (Paperback, 2011)
Liqun Chen, Moti Yung
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings (Paperback,... Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings (Paperback, 2011 ed.)
Liqun Chen
R1,464 Discovery Miles 14 640 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC 2011, held in Oxford, UK in December 2011. The 27 revised full papers presented together with one invited contribution were carefully reviewed and selected from 57 submissions. The papers cover a wide range of topics in the field of mathematics and computer science, including coding theory, homomorphic encryption, symmetric and public key cryptosystems, cryptographic functions and protocols, efficient pairing and scalar multiplication implementation, knowledge proof, and security analysis.

Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008.... Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings (Paperback, 2008 ed.)
Liqun Chen, Mark Ryan, Guilin Wang
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

The10thInternationalConferenceonInformationandCommunicationsSecurity (ICICS) was held in Birmingham, UK, during 20-22 October 2008. The ICICS conference series is an established forum that brings together people working in di?erent ?elds of information and communications security from universities, researchinstitutes, industryandgovernmentinstitutions, andgivestheattendees the opportunity to exchange new ideas and investigate state-of-the-art devel- ments. In previous years, ICICS has taken place in China (2007, 2005, 2003, 2001, 1997), USA (2006), Spain (2004), Singapore (2002), and Australia (1999). On each occasion, as on this one, the proceedings were published in the Springer LNCS series. In total, 125 papers from 33 countries were submitted to ICICS 2008, and 27 were accepted covering multiple disciplines of information security and applied cryptography(acceptancerate22%).EachsubmissiontoICICS2008wasano- mously reviewed by three or four reviewers. We are grateful to the Programme Committee, whichwascomposedof57membersfrom12countries;wethankthem aswellasallexternalrefereesfortheirtimeandvaluedcontributionstothetough andtime-consuming reviewingprocess. In addition to the contributed speakers, the programme also featured three invitedspeakers.We aregratefulto JoshuaGuttman (The MITRE Corporation, USA), Peng Ning (North Carolina State University, USA), and Nigel Smart (University of Bristol, UK) for accepting our invitation to speak. ICICS 2008 was organised by the University of Birmingham and Hewlett Packard Laboratories. We gratefully acknowledge sponsorship from the UK - gineering and Physical Sciences Research Council (EPSRC), as well as Hewlett Packard and the University of Birmin

Information Security Practice and Experience - 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008... Information Security Practice and Experience - 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings (Paperback, 2008 ed.)
Liqun Chen, Yi Mu, Willy Susilo
R1,447 Discovery Miles 14 470 Ships in 18 - 22 working days

The4thInformationSecurityPracticeandExperienceConference(ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, Australia, during April 21-23, 2008. The previous three conferences were held in Singapore in 2005, Hangzhou, China in 2006 and Hong Kong, China in 2007. As with the previous three conference proceedings, the proceedings of ISPEC 2008 were published in the LNCS series by Springer. Theconferencereceived95submissions, outofwhichtheProgramCommittee selected 29 papers for presentation at the conference. These papers are included in the proceedings. The accepted papers cover a range of topics in mathem- ics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve-basedsecuritypractice, securitycomputationandso forth.The conference proceedings contain revised versions of the selected papers. Since some of them were not checked again for correctness before publication, the authors (and not the ProgramCommittee)bear full responsibilityfor the contentsoftheir papers. In addition to the contributed papers, the program comprised two invited talks.TheinvitedspeakerswereVijayVaradharajan(MacquarieUniversity, A- tralia) and Robert Huijie Deng (Singapore Management University, Singapore). Special thanks are due to these speakers. Wewouldliketothankallthepeoplewhohelpedwiththeconferenceprogram and organization. First, we thank the Steering Committee for their guidance on the general format of the conference. We also heartily thank the Program Committee and the sub-reviewers listed on the following pages for their hard e?orts and time contributed to the review process, which took seven weeks. Each paper was carefully evaluated by at least two or three people. There was signi?cant online discussion about a large number of pape

Control of Axially Moving Systems (Paperback, 1st ed. 2022): Keum-Shik Hong, Liqun Chen, Phuong-Tung Pham, Xiaodong Yang Control of Axially Moving Systems (Paperback, 1st ed. 2022)
Keum-Shik Hong, Liqun Chen, Phuong-Tung Pham, Xiaodong Yang
R4,023 Discovery Miles 40 230 Ships in 18 - 22 working days

This book provides a comprehensive guideline on dynamic analysis and vibration control of axially moving systems. First, the mathematical models of various axially moving systems describing the string, beam, belt, and plate models are developed. Accordingly, dynamical issues such as the equilibrium configuration, critical velocity, stability, bifurcation, and further chaotic dynamics are analyzed. Second, this book covers the design of the control schemes based on the hitherto control strategies for axially moving systems: feedback control using the transfer function, variable structure control, control by regulating the axial velocity, wave cancellation approach, boundary control using the Lyapunov method, adaptive control, and hybrid control methods. Finally, according to the contents discussed in the book, specific aspects are outlined for initiating future research endeavors to be undertaken concerning axially moving systems. This book is useful to graduate students and researchers in industrial sectors such as continuous manufacturing systems, transport systems, power transmission systems, and lifting systems not to mention in academia.

Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022,... Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings (Paperback, 1st ed. 2022)
Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati
R2,751 Discovery Miles 27 510 Ships in 18 - 22 working days

This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.

Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK,... Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider
R1,540 Discovery Miles 15 400 Ships in 18 - 22 working days

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.

Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK,... Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider
R1,540 Discovery Miles 15 400 Ships in 18 - 22 working days

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.

Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings (Paperback,... Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings (Paperback, 1st ed. 2018)
Liqun Chen, Mark Manulis, Steve Schneider
R1,473 Discovery Miles 14 730 Ships in 18 - 22 working days

This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.

Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017,... Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings (Paperback, 1st ed. 2018)
Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu
R2,968 Discovery Miles 29 680 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security.

Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18,... Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings (Paperback, 1st ed. 2016)
Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang
R2,396 Discovery Miles 23 960 Ships in 18 - 22 working days

This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.

Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings (Paperback,... Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings (Paperback, 1st ed. 2016)
Liqun Chen, Jinguang Han
R2,439 Discovery Miles 24 390 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016. The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The papers are grouped in topical sections on attribute/role-based cryptography, data in cloud, searchable encryption, key management, encryption, leakage analysis, homomorphic encryption.

Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings... Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings (Paperback, 1st ed. 2015)
Liqun Chen, Shin'ichiro Matsuo
R2,100 Discovery Miles 21 000 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Security Standardisation Research, SSR 2015, held in Tokyo, Japan, in December 2015. The 13 papers presented in this volume were carefully reviewed and selected from 18 submissions. They are organized in topical sections named: bitcoin and payment; protocol and API; analysis on cryptographic algorithm; privacy; and trust and formal analysis.

Trusted Computing - Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009,  Proceedings (Paperback, 2009... Trusted Computing - Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings (Paperback, 2009 ed.)
Liqun Chen, Chris J. Mitchell, Andrew Martin
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Thisvolumecontainsthe15paperspresentedinthetechnicalstrandoftheTrust 2009 conference, held in Oxford, UK in April 2009. Trust 2009 was the second international conference devoted to the technical and socio-economic aspects of trusted computing. The conference had two main strands, one devoted to technical aspects of trusted computing (addressed by these proceedings), and the other devoted to socio-economic aspects. Trust 2009 built on the successful Trust 2008 conference, held in Villach, Austria in March 2008. The proceedings of Trust 2008, containing 14 papers, were published in volume 4968 of the Lecture Notes in Computer Science series. ThetechnicalstrandofTrust2009contained15originalpapersonthedesign and application of trusted computing. For these proceedings the papers have been divided into four main categories, namely: - Implementation of trusted computing - Attestation - PKI for trusted computing - Applications of trusted computing The 15 papers included here were selected from a total of 33 submissions. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion. We believe that the result is a high-quality set of papers, some of which have been signi?cantly improved as a result of the refereeing process. We would also like to thank all the authors who submitted their papers to the technical strand of the Trust 2009 conference, all external referees, and all the attendees of the conference.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
William R. Stanek. The Black and White…
William R. Stanek, Hc Stanek Hardcover R1,385 Discovery Miles 13 850
The New Superconductors
Frank J. Owens, Charles P. Poole Jr Hardcover R2,766 Discovery Miles 27 660
The Connoisseur - an Illustrated…
Anonymous Hardcover R1,076 Discovery Miles 10 760
Modern Trends in Magnetostriction Study…
M.R.J. Gibbs Hardcover R5,335 Discovery Miles 53 350
Electrostatic Ignitions of Fires and…
TH Pratt Hardcover R3,181 Discovery Miles 31 810
Journey of the Stone - an exhibition by…
Melinda McCarthy Hardcover R965 Discovery Miles 9 650
The Connoisseur - an Illustrated…
Anonymous Hardcover R888 Discovery Miles 8 880
Electric Fields in Composite Dielectrics…
Tadasu Takuma, Boonchai Techaumnat Hardcover R2,750 Discovery Miles 27 500
Terahertz Sources and Systems
R.E. Miles, P. Harrison, … Hardcover R4,058 Discovery Miles 40 580
Ferrofluids - Magnetically Controllable…
Stefan Odenbach Hardcover R2,795 Discovery Miles 27 950

 

Partners