|
Showing 1 - 6 of
6 matches in All Departments
|
Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings (Paperback, 1st ed. 2018)
Liqun Chen, Mark Manulis, Steve Schneider
|
R1,633
Discovery Miles 16 330
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 21st International
Conference on Information Security, ISC 2018, held in Guildford,
UK, in September 2018. The 26 full papers presented in this volume
were carefully reviewed and selected from 59 submissions. The book
also includes one invited talk in full-paper length. The papers
were organized in topical sections named: software security;
symmetric ciphers and cryptanalysis; data privacy and
anonymization; outsourcing and assisted computing; advanced
encryption; privacy-preserving applications; advanced signatures;
and network security.
This book constitutes the refereed proceedings of the 11th
International Conference on Cryptology and Network Security, CANS
2012, held in Darmstadt, Germany, in December 2012. The 22 revised
full papers, presented were carefully reviewed and selected from 99
submissions. The papers are organized in topical sections on
cryptanalysis; network security; cryptographic protocols;
encryption; and s-box theory.
This book constitutes the refereed proceedings of the 15th
International Conference on Practice and Theory in Public Key
Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012.
The 41 papers presented were carefully reviewed and selected from
188 submissions. The book also contains one invited talk. The
papers are organized in the following topical sections: homomorphic
encryption and LWE, signature schemes, code-based and multivariate
crypto, public key encryption: special properties, identity-based
encryption, public-key encryption: constructions, secure two-party
and multi-party computations, key exchange and secure sessions,
public-key encryption: relationships, DL, DDH, and more number
theory, and beyond ordinary signature schemes.
This book constitutes the refereed proceedings of the 17th
International Conference on Network and System Security, NSS 2023,
held in Canterbury, UK, August 14–16, 2023.The 12 full and 9
short papers presented together with 2 invited talks in this book
were carefully reviewed and selected from 64 submissions. They
focus on Attacks and Malware, Blockchain, Security through
Hardware, Machine learning and much more.
|
Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, …
|
R1,577
Discovery Miles 15 770
|
Ships in 10 - 15 working days
|
This book constitutes the refereed post-conference proceedings of
the Interdisciplinary Workshop on Trust, Identity, Privacy, and
Security in the Digital Economy, DETIPS 2020; the First
International Workshop on Dependability and Safety of Emerging
Cloud and Fog Systems, DeSECSys 2020; Third International Workshop
on Multimedia Privacy and Security, MPS 2020; and the Second
Workshop on Security, Privacy, Organizations, and Systems
Engineering, SPOSE 2020; held in Guildford, UK, in September 2020,
in conjunction with the 25th European Symposium on Research in
Computer Security, ESORICS 2020. A total of 42 papers was
submitted. For the DETIPS Workshop 8 regular papers were selected
for presentation. Topics of interest address various aspect of the
core areas in relation to digital economy. For the DeSECSys
Workshop 4 regular papers are included. The workshop had the
objective of fostering collaboration and discussion among
cyber-security researchers and practitioners to discuss the various
facets and trade-o s of cyber security. In particular,
applications, opportunities and possible shortcomings of novel
security technologies and their integration in emerging application
domains. For the MPS Workshop 4 regular papers are presented which
cover topics related to the security and privacy of multimedia
systems of Internet-based video conferencing systems (e.g., Zoom,
Microsoft Teams, Google Meet), online chatrooms (e.g., Slack), as
well as other services to support telework capabilities. For the
SPOSE Workshop 3 full papers were accepted for publication. They
reflect the discussion, exchange, and development of ideas and
questions regarding the design and engineering of technical
security and privacy mechanisms with particular reference to
organizational contexts.
This book constitutes the refereed proceedings of the 14th
International Conference on Applied Cryptography and Network
Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35
revised full papers included in this volume and presented together
with 2 invited talks, were carefully reviewed and selected from 183
submissions.ACNS is an annual conference focusing on innovative
research and current developments that advance the areas of applied
cryptography, cyber security and privacy.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|