0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (7)
  • R2,500 - R5,000 (1)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Applications and Techniques in Information Security - 9th International Conference, ATIS 2018, Nanning, China, November 9-11,... Applications and Techniques in Information Security - 9th International Conference, ATIS 2018, Nanning, China, November 9-11, 2018, Proceedings (Paperback, 1st ed. 2018)
Qingfeng Chen, Jia Wu, Shichao Zhang, Changan Yuan, Lynn Batten, …
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.

Applications and Techniques in Information Security - 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October... Applications and Techniques in Information Security - 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings (Paperback, 1st ed. 2016)
Lynn Batten, Gang Li
R1,836 Discovery Miles 18 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016. The 10 revised full papers and three short papers presented together with two invited talks were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on invited speeches; attacks on data security systems; detection of attacks on data security systems; data security; data privacy.

Applications and Techniques in Information Security - 6th International Conference, ATIS 2015, Beijing, China, November 4-6,... Applications and Techniques in Information Security - 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings (Paperback, 1st ed. 2015)
Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, …
R2,460 Discovery Miles 24 600 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.

Applications and Techniques in Information Security - International Conference, ATIS 2014, Melbourne, Australia, November... Applications and Techniques in Information Security - International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings (Paperback, 2014 ed.)
Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren
R2,100 Discovery Miles 21 000 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.

Computational Intelligence, Cyber Security and Computational Models - Proceedings of ICC3 2015 (Paperback, 1st ed. 2016):... Computational Intelligence, Cyber Security and Computational Models - Proceedings of ICC3 2015 (Paperback, 1st ed. 2016)
Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, …
R8,051 Discovery Miles 80 510 Ships in 18 - 22 working days

This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December 17 - 19, 2015. This book enriches with innovations in broad areas of research like computational modeling, computational intelligence and cyber security. These emerging inter disciplinary research areas have helped to solve multifaceted problems and gained lot of attention in recent years. This encompasses theory and applications, to provide design, analysis and modeling of the aforementioned key areas.

Information Security and Privacy - 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings... Information Security and Privacy - 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (Paperback, 2006 ed.)
Lynn Batten, Reihaneh Safavi-Naini
R1,584 Discovery Miles 15 840 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical sections on stream ciphers, symmetric key ciphers, network security, cryptographic applications, secure implementation, signatures, theory, security applications, provable security, protocols, as well as hashing and message authentication.

Information Security and Privacy - 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings... Information Security and Privacy - 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings (Paperback, 2002 ed.)
Lynn Batten, Jennifer Seberry
R2,866 Discovery Miles 28 660 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th Australasian Conference on Information Security and Privacy, ACISP 2002, held in Melbourne, Australia, in July 2002.The 36 revised full papers presented together with one invited paper were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on key handling, trust and secret sharing, fast computation, cryptanalysis, elliptic curves, advanced encryption standard AES, security management, authentication, oblivious transfer, and dealing with adversaries.

Applications and Techniques in Information Security - 10th International Conference, ATIS 2019, Thanjavur, India, November... Applications and Techniques in Information Security - 10th International Conference, ATIS 2019, Thanjavur, India, November 22-24, 2019, Proceedings (Paperback, 1st ed. 2019)
V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, …
R1,417 Discovery Miles 14 170 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019.The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications.

Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7,... Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings (Paperback, 1st ed. 2017)
Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li
R1,994 Discovery Miles 19 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Longest March
Fred Khumalo Paperback R280 R221 Discovery Miles 2 210
Construction Workers, U.S.A.
Herbert Applebaum Hardcover R2,567 Discovery Miles 25 670
A Manifesto For Social Change - How To…
Moeletsi Mbeki, Nobantu Mbeki Paperback  (4)
R230 R209 Discovery Miles 2 090
An Inquiry Into the History…
Abraham Wivell Paperback R501 Discovery Miles 5 010
"Was deutsch und echt..." - Richard…
Kasper van Kooten Hardcover R3,274 Discovery Miles 32 740
Michael Angelo Buonarroti, Sculptor…
Charles Christopher Black Paperback R568 Discovery Miles 5 680
The Politics of Princely Entertainment…
Valeria De Lucca Hardcover R1,666 Discovery Miles 16 660
The Relentless Tenderness of Jesus
Brennan Manning, Larry Crabb Paperback R468 Discovery Miles 4 680
The New Kingdom
Wilbur Smith, Mark Chadbourn Hardcover  (1)
R298 Discovery Miles 2 980
Jonathan Edwards and Scripture…
David P. Barshinger, Douglas A Sweeney Hardcover R3,283 Discovery Miles 32 830

 

Partners