|
Showing 1 - 20 of
20 matches in All Departments
|
Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings (Paperback, 1st ed. 2018)
Liqun Chen, Mark Manulis, Steve Schneider
|
R1,633
Discovery Miles 16 330
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 21st International
Conference on Information Security, ISC 2018, held in Guildford,
UK, in September 2018. The 26 full papers presented in this volume
were carefully reviewed and selected from 59 submissions. The book
also includes one invited talk in full-paper length. The papers
were organized in topical sections named: software security;
symmetric ciphers and cryptanalysis; data privacy and
anonymization; outsourcing and assisted computing; advanced
encryption; privacy-preserving applications; advanced signatures;
and network security.
Vehicle dynamics and road dynamics are usually considered to be two
largely independent subjects. In vehicle dynamics, road surface
roughness is generally regarded as random excitation of the
vehicle, while in road dynamics, the vehicle is generally regarded
as a moving load acting on the pavement. This book suggests a new
research concept to integrate the vehicle and the road system with
the help of a tire model, and establishes a cross-subject research
framework dubbed vehicle-pavement coupled system dynamics. In this
context, the dynamics of the vehicle, road and the vehicle-road
coupled system are investigated by means of theoretical analysis,
numerical simulations and field tests. This book will be a valuable
resource for university professors, graduate students and engineers
majoring in automotive design, mechanical engineering, highway
engineering and other related areas. Shaopu Yang is a professor and
deputy president of Shijiazhuang Tiedao University, China; Liqun
Chen is a professor at Shanghai University, Shanghai, China;
Shaohua Li is a professor at Shijiazhuang Tiedao University, China.
Vehicle dynamics and road dynamics are usually considered to be two
largely independent subjects. In vehicle dynamics, road surface
roughness is generally regarded as random excitation of the
vehicle, while in road dynamics, the vehicle is generally regarded
as a moving load acting on the pavement. This book suggests a new
research concept to integrate the vehicle and the road system with
the help of a tire model, and establishes a cross-subject research
framework dubbed vehicle-pavement coupled system dynamics. In this
context, the dynamics of the vehicle, road and the vehicle-road
coupled system are investigated by means of theoretical analysis,
numerical simulations and field tests. This book will be a valuable
resource for university professors, graduate students and engineers
majoring in automotive design, mechanical engineering, highway
engineering and other related areas. Shaopu Yang is a professor and
deputy president of Shijiazhuang Tiedao University, China; Liqun
Chen is a professor at Shanghai University, Shanghai, China;
Shaohua Li is a professor at Shijiazhuang Tiedao University, China.
In this book the authors first describe the background of trusted
platforms and trusted computing and speculate about the future.
They then describe the technical features and architectures of
trusted platforms from several different perspectives, finally
explaining second-generation TPMs, including a technical
description intended to supplement the Trusted Computing Group's
TPM2 specifications. The intended audience is IT managers and
engineers and graduate students in information security.
This book constitutes the proceedings of the First International
Conference on Security Standardisation Research, SSR 2014, which
was held in London, UK, in December 2014. The 14 full papers
presented in this volume were carefully reviewed and selected from
22 submissions. The papers cover a range of topics in the field of
security standardisation research, including cryptographic
evaluation, standards development, analysis with formal methods,
potential future areas of standardisation, and improving existing
standards.
|
Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers (Paperback, 2012)
Liqun Chen, Moti Yung, Liehuang Zhu
|
R1,579
Discovery Miles 15 790
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed post-conference
proceedings of the International Conference on Trusted Systems,
INTRUST 2011, held in Beijing, China, in November 2011. The 21
revised full papers were carefully reviewed and selected from 34
submissions for inclusion in the book. Except these contributed
papers the program of INTRUST also consisted of a workshop titled
Asian Lounge on Trust, Security and Privacy consisting of six
keynote speeches. The papers are organized in topical sections on
trusted services, mobile trusted systems, security analysis,
cryptographic aspects, trusted networks, implementation, and direct
anonymous attestation.
This book constitutes the refereed proceedings of the 13th IMA
International Conference on Cryptography and Coding, IMACC 2011,
held in Oxford, UK in December 2011. The 27 revised full papers
presented together with one invited contribution were carefully
reviewed and selected from 57 submissions. The papers cover a wide
range of topics in the field of mathematics and computer science,
including coding theory, homomorphic encryption, symmetric and
public key cryptosystems, cryptographic functions and protocols,
efficient pairing and scalar multiplication implementation,
knowledge proof, and security analysis.
This book constitutes the proceedings of the International
Conference on Trusted Systems, held in Beijing, China, in December
2010.The 23 contributed papers presented together with nine invited
talks from a workshop, titled "Asian Lounge on Trust, Security and
Privacy" were carefully selected from 66 submissions. The papers
are organized in seven topical sections on implentation technology,
security analysis, cryptographic aspects, mobile trusted systems,
hardware security, attestation, and software protection.
The10thInternationalConferenceonInformationandCommunicationsSecurity
(ICICS) was held in Birmingham, UK, during 20-22 October 2008. The
ICICS conference series is an established forum that brings
together people working in di?erent ?elds of information and
communications security from universities, researchinstitutes,
industryandgovernmentinstitutions, andgivestheattendees the
opportunity to exchange new ideas and investigate state-of-the-art
devel- ments. In previous years, ICICS has taken place in China
(2007, 2005, 2003, 2001, 1997), USA (2006), Spain (2004), Singapore
(2002), and Australia (1999). On each occasion, as on this one, the
proceedings were published in the Springer LNCS series. In total,
125 papers from 33 countries were submitted to ICICS 2008, and 27
were accepted covering multiple disciplines of information security
and applied
cryptography(acceptancerate22%).EachsubmissiontoICICS2008wasano-
mously reviewed by three or four reviewers. We are grateful to the
Programme Committee,
whichwascomposedof57membersfrom12countries;wethankthem
aswellasallexternalrefereesfortheirtimeandvaluedcontributionstothetough
andtime-consuming reviewingprocess. In addition to the contributed
speakers, the programme also featured three invitedspeakers.We
aregratefulto JoshuaGuttman (The MITRE Corporation, USA), Peng Ning
(North Carolina State University, USA), and Nigel Smart (University
of Bristol, UK) for accepting our invitation to speak. ICICS 2008
was organised by the University of Birmingham and Hewlett Packard
Laboratories. We gratefully acknowledge sponsorship from the UK -
gineering and Physical Sciences Research Council (EPSRC), as well
as Hewlett Packard and the University of Birmin
The4thInformationSecurityPracticeandExperienceConference(ISPEC2008)
was held at Crowne Plaza, Darling Harbour, Sydney, Australia,
during April 21-23, 2008. The previous three conferences were held
in Singapore in 2005, Hangzhou, China in 2006 and Hong Kong, China
in 2007. As with the previous three conference proceedings, the
proceedings of ISPEC 2008 were published in the LNCS series by
Springer. Theconferencereceived95submissions,
outofwhichtheProgramCommittee selected 29 papers for presentation
at the conference. These papers are included in the proceedings.
The accepted papers cover a range of topics in mathem- ics,
computer science and security applications, including
authentication and digital signatures, privacy, encryption and
hash-function algorithms, security analysis, network security,
access control, security devices, pairing and elliptic
curve-basedsecuritypractice, securitycomputationandso forth.The
conference proceedings contain revised versions of the selected
papers. Since some of them were not checked again for correctness
before publication, the authors (and not the ProgramCommittee)bear
full responsibilityfor the contentsoftheir papers. In addition to
the contributed papers, the program comprised two invited
talks.TheinvitedspeakerswereVijayVaradharajan(MacquarieUniversity,
A- tralia) and Robert Huijie Deng (Singapore Management University,
Singapore). Special thanks are due to these speakers.
Wewouldliketothankallthepeoplewhohelpedwiththeconferenceprogram and
organization. First, we thank the Steering Committee for their
guidance on the general format of the conference. We also heartily
thank the Program Committee and the sub-reviewers listed on the
following pages for their hard e?orts and time contributed to the
review process, which took seven weeks. Each paper was carefully
evaluated by at least two or three people. There was signi?cant
online discussion about a large number of pape
This book provides a comprehensive guideline on dynamic analysis
and vibration control of axially moving systems. First, the
mathematical models of various axially moving systems describing
the string, beam, belt, and plate models are developed.
Accordingly, dynamical issues such as the equilibrium
configuration, critical velocity, stability, bifurcation, and
further chaotic dynamics are analyzed. Second, this book covers the
design of the control schemes based on the hitherto control
strategies for axially moving systems: feedback control using the
transfer function, variable structure control, control by
regulating the axial velocity, wave cancellation approach, boundary
control using the Lyapunov method, adaptive control, and hybrid
control methods. Finally, according to the contents discussed in
the book, specific aspects are outlined for initiating future
research endeavors to be undertaken concerning axially moving
systems. This book is useful to graduate students and researchers
in industrial sectors such as continuous manufacturing systems,
transport systems, power transmission systems, and lifting systems
not to mention in academia.
|
Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings (Paperback, 1st ed. 2022)
Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati
|
R3,072
Discovery Miles 30 720
|
Ships in 10 - 15 working days
|
This LNCS 13407 constitutes the refereed proceedings of the 24th
International Conference on Information and Communications
Security, ICICS 2022, held in Canterbury, UK,, in September 2022.
The 34 revised full papers presented in the book were carefully
selected from 150 submissions The papers are organized around the
following topics: Cryptography, Authentication, Privacy and
Anonymity, Attacks and Vulnerability Analysis, Artificial
Intelligence for Detection, and Network Security and Forensics.
This book provides a comprehensive guideline on dynamic analysis
and vibration control of axially moving systems. First, the
mathematical models of various axially moving systems describing
the string, beam, belt, and plate models are developed.
Accordingly, dynamical issues such as the equilibrium
configuration, critical velocity, stability, bifurcation, and
further chaotic dynamics are analyzed. Second, this book covers the
design of the control schemes based on the hitherto control
strategies for axially moving systems: feedback control using the
transfer function, variable structure control, control by
regulating the axial velocity, wave cancellation approach, boundary
control using the Lyapunov method, adaptive control, and hybrid
control methods. Finally, according to the contents discussed in
the book, specific aspects are outlined for initiating future
research endeavors to be undertaken concerning axially moving
systems. This book is useful to graduate students and researchers
in industrial sectors such as continuous manufacturing systems,
transport systems, power transmission systems, and lifting systems
not to mention in academia.
|
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider
|
R1,712
Discovery Miles 17 120
|
Ships in 10 - 15 working days
|
The two volume set, LNCS 12308 + 12309, constitutes the proceedings
of the 25th European Symposium on Research in Computer Security,
ESORICS 2020, which was held in September 2020. The conference was
planned to take place in Guildford, UK. Due to the COVID-19
pandemic, the conference changed to an online format. The total of
72 full papers included in these proceedings was carefully reviewed
and selected from 366 submissions. The papers were organized in
topical sections named: database and Web security; system security;
network security; software security; machine learning security;
privacy; formal modelling; applied cryptography; analyzing attacks;
post-quantum cryptogrphy; security analysis; and blockchain.
|
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider
|
R1,712
Discovery Miles 17 120
|
Ships in 10 - 15 working days
|
The two volume set, LNCS 12308 + 12309, constitutes the proceedings
of the 25th European Symposium on Research in Computer Security,
ESORICS 2020, which was held in September 2020. The conference was
planned to take place in Guildford, UK. Due to the COVID-19
pandemic, the conference changed to an online format. The total of
72 full papers included in these proceedings was carefully reviewed
and selected from 366 submissions. The papers were organized in
topical sections named: database and Web security; system security;
network security; software security; machine learning security;
privacy; formal modelling; applied cryptography; analyzing attacks;
post-quantum cryptogrphy; security analysis; and blockchain.
|
Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings (Paperback, 1st ed. 2018)
Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu
|
R3,317
Discovery Miles 33 170
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 19th
International Conference on Information and Communications
Security, ICICS 2017, held in Beijing, China, in December 2017. The
43 revised full papers and 14 short papers presented were carefully
selected from 188 submissions. The papers cover topics such as
Formal Analysis and Randomness Test; Signature Scheme and Key
Management; Algorithms; Applied Cryptography; Attacks and Attacks
Defense; Wireless Sensor Network Security; Security Applications;
Malicious Code Defense and Mobile Security; IoT Security;
Healthcare and Industrial Control System Security; Privacy
Protection; Engineering Issues of Crypto; Cloud and E-commerce
Security; Security Protocols; Network Security.
|
Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings (Paperback, 1st ed. 2016)
Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang
|
R2,715
Discovery Miles 27 150
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 12th International
Conference on Information Security and Practice and Experience,
ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25
papers presented in this volume were carefully reviewed and
selected from 75 submissions. They cover multiple topics in
information security, from technologies to systems and
applications.
This book constitutes the refereed proceedings of the 10th
International Conference on Provable Security, ProvSec 2016, held
in Nanjing, China, in November 2016. The 17 full papers and 6 short
papers presented were carefully reviewed and selected from 79
submissions. The papers are grouped in topical sections on
attribute/role-based cryptography, data in cloud, searchable
encryption, key management, encryption, leakage analysis,
homomorphic encryption.
This book constitutes the refereed proceedings of the Second
International Conference on Security Standardisation Research, SSR
2015, held in Tokyo, Japan, in December 2015. The 13 papers
presented in this volume were carefully reviewed and selected from
18 submissions. They are organized in topical sections named:
bitcoin and payment; protocol and API; analysis on cryptographic
algorithm; privacy; and trust and formal analysis.
Thisvolumecontainsthe15paperspresentedinthetechnicalstrandoftheTrust
2009 conference, held in Oxford, UK in April 2009. Trust 2009 was
the second international conference devoted to the technical and
socio-economic aspects of trusted computing. The conference had two
main strands, one devoted to technical aspects of trusted computing
(addressed by these proceedings), and the other devoted to
socio-economic aspects. Trust 2009 built on the successful Trust
2008 conference, held in Villach, Austria in March 2008. The
proceedings of Trust 2008, containing 14 papers, were published in
volume 4968 of the Lecture Notes in Computer Science series.
ThetechnicalstrandofTrust2009contained15originalpapersonthedesign
and application of trusted computing. For these proceedings the
papers have been divided into four main categories, namely: -
Implementation of trusted computing - Attestation - PKI for trusted
computing - Applications of trusted computing The 15 papers
included here were selected from a total of 33 submissions. The
refereeing process was rigorous, involving at least three (and
mostly more) independent reports being prepared for each
submission. We are very grateful to our hard-working and
distinguished Program Committee for doing such an excellent job in
a timely fashion. We believe that the result is a high-quality set
of papers, some of which have been signi?cantly improved as a
result of the refereeing process. We would also like to thank all
the authors who submitted their papers to the technical strand of
the Trust 2009 conference, all external referees, and all the
attendees of the conference.
|
You may like...
Tenet
John David Washington, Robert Pattinson, …
DVD
R53
Discovery Miles 530
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Morbius
Jared Leto, Matt Smith, …
DVD
R179
Discovery Miles 1 790
|