0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Computer Security -- ESORICS 2002 - 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16,... Computer Security -- ESORICS 2002 - 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings (Paperback, 2002 ed.)
Dieter Gollmann, Gunter Karjoth, Michael Waidner
R1,621 Discovery Miles 16 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th European Symposium on Research in Computer Security, ESORICS 2002, held in Zurich, Switzerland, in October 2002.The 16 revised full papers presented were carefully reviewed and selected for inclusion in the proceedings. Among the topics addressed are confidentiality, probabilistic non-inference, auctions, inference control, authentication, attacks on cryptographic hardware, privacy protection, model checking protocols, mobile code, formal security analysis, access control, and fingerprints and intrusion detection.

SEMPER - Secure Electronic Marketplace for Europe (Paperback, 2000 ed.): Gerard Lacoste, Birgit Pfitzmann, Michael Steiner,... SEMPER - Secure Electronic Marketplace for Europe (Paperback, 2000 ed.)
Gerard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner
R1,660 Discovery Miles 16 600 Ships in 10 - 15 working days

Some years ago, businesses could choose whether to migrate to electronic commerce, however, today it seems they have no choice. Predictions indicate that companies that do not make the necessary changes will be overrun by competition and ultimately fail. Therefore, we see more and more companies undergoing tremendous transformationin order to adapt to the new business paradigm. At the same time new companies are being established. One thing these companies have in common is the increased dependency on security technology. The invention of electronic commerce has changed the role of - curity technologies from being merely a protector to being also an enabler of electronic commerce, and it is clear that the development of security techn- ogy is a key enabler in the growth and deployment of electronic commerce. This has been recognised at European level (European Union 1997e). The launch of a comprehensive EU policy in the area of security in open networksisfairlyrecentwiththeadoptionofaCommunicationoncryptog- phy inOctober 1997(EuropeanUnion1997c). A veryimportantcomplement and support to the European policy is the European Commission s contri- tion to overcometechnological barriers by giving special importance to R&D (Research and Development) activities. The SEMPER project was launched in September 1995 and was funded partly by the European Community within the Advanced Communication Technologies and Services (ACTS) speci?c research programme part of the Fourth Framework Program (1994-1998). In this book the SEMPER project team presents in a coherent, integrated, and readable form the issues - dressed, themotivationfortheworkcarriedout, andthekeyresultsobtained. SEMPER is an innovative project in several aspects."

Computer Security - ESORICS 2000 - 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000... Computer Security - ESORICS 2000 - 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings (Paperback, 2000 ed.)
Frederic Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner
R1,641 Discovery Miles 16 410 Ships in 10 - 15 working days

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000.The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.

Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8,... Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II (Paperback, 1st ed. 2021)
Elisa Bertino, Haya Shulman, Michael Waidner
R3,270 Discovery Miles 32 700 Ships in 10 - 15 working days

The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021.The 71 full papers presented in this book were carefully reviewed and selected from 351 submissions. They were organized in topical sections as follows: Part I: network security; attacks; fuzzing; malware; user behavior and underground economy; blockchain; machine learning; automotive; anomaly detection; Part II: encryption; cryptography; privacy; differential privacy; zero knowledge; key exchange; multi-party computation.

Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8,... Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Elisa Bertino, Haya Shulman, Michael Waidner
R3,270 Discovery Miles 32 700 Ships in 10 - 15 working days

The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021. The conference was originally planned to take place in Darmstadt, Germany, but changed to an online event due to the COVID-19 pandemic. The 71 full papers presented in this book were carefully reviewed and selected from 351 submissions. They were organized in topical sections as follows: Part I: network security; attacks; fuzzing; malware; user behavior and underground economy; blockchain; machine learning; automotive; anomaly detection; Part II: encryption; cryptography; privacy; differential privacy; zero knowledge; key exchange; multi-party computation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Gender and Domestic Violence in the…
Ann Marie Bissessar, Camille Huggins Hardcover R4,242 Discovery Miles 42 420
Dog Behavior - Modern Science and Our…
James C Ha, Tracy L. Campion Paperback R1,062 R957 Discovery Miles 9 570
Indentured - Behind The Scenes At Gupta…
Rajesh Sundaram Paperback  (2)
R280 R259 Discovery Miles 2 590
The Origin of God
Laurence Gardner Hardcover R1,043 Discovery Miles 10 430
Girls Of Little Hope
Sam Beckbessinger, Dale Halvorsen Paperback R319 Discovery Miles 3 190
The Pyramid Approach - A Framework for…
George Woodrow Hardcover R1,992 Discovery Miles 19 920
Becoming an ECE. 101 Reasons Why I Love…
Jiji Talmas Hardcover R616 R560 Discovery Miles 5 600
Combinatorial Optimization - Theory and…
Bernhard Korte, Jens Vygen Hardcover R2,773 Discovery Miles 27 730
Contaminants of the Great Lakes
Jill Crossman, Chris Weisener Hardcover R10,419 Discovery Miles 104 190
Supply Chain Management in the Big Data…
Hing Kai Chan, Nachiappan Subramanian, … Hardcover R5,293 Discovery Miles 52 930

 

Partners