0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11,... Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II (Paperback, 2014 ed.)
Miroslaw Kutylowski, Jaideep Vaidya
R2,944 Discovery Miles 29 440 Ships in 10 - 15 working days

The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy.

Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11,... Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I (Paperback, 2014 ed.)
Miroslaw Kutylowski, Jaideep Vaidya
R3,036 Discovery Miles 30 360 Ships in 10 - 15 working days

The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy.

Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012,... Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Miroslaw Kutylowski, Moti Yung
R1,502 Discovery Miles 15 020 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.

Fundamentals of Computation Theory - 17th International Symposium, FCT 2009, Wroclaw, Poland, September 2-4, 2009, Proceedings... Fundamentals of Computation Theory - 17th International Symposium, FCT 2009, Wroclaw, Poland, September 2-4, 2009, Proceedings (Paperback, 2009 ed.)
Miroslaw Kutylowski, Maciej Gebala, Witold Charatonik
R1,492 Discovery Miles 14 920 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Symposium Fundamentals of Computation Theory, FCT 2009, held in Wroclaw, Poland in August 2009.

The 29 revised full papers were carefully reviewed and selected from 67 submissions. The papers address all current topics in computation theory such as automata and formal languages, design and analysis of algorithms, computational and structural complexity, semantics, logic, algebra and categories in computer science, circuits and networks, learning theory, specification and verification, parallel and distributed systems, concurrency theory, cryptography and cryptograhic protocols, approximation and randomized algorithms, computational geometry, quantum computation and information, bio-inspired computation.

Algorithmic Aspects of Wireless Sensor Networks - Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14,... Algorithmic Aspects of Wireless Sensor Networks - Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007, Revised Selected Papers (Paperback, 2008 ed.)
Miroslaw Kutylowski, Jacek Cichon, Przemylsaw Kubiak
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

Wireless ad-hoc sensor networks have recently become a very active research subject due to their high potential of providing diverse services to numerous - portant applications, including remote monitoring and tracking in environm- tal applications and low-maintenance ambient intelligence in everyday life. The e?ective and e?cient realization of such large-scale, complex ad-hoc networking environmentsrequiresintensive,coordinatedtechnicalresearchanddevelopment e?orts,especiallyinpower-aware,scalable,robust,wirelessdistributedprotocols, due to the unusual application requirements and the severe resource constraints of the sensor devices. On the other hand, a solid foundational background seems necessary for sensor networks to achieve their full potential. It is a challenge for abstract modeling, algorithmic design and analysis to achieve provably e?cient, sc- able and fault-tolerant realizations of such huge, highly dynamic, complex, n- conventionalnetworks.Variousfeatures,includingtheextremelylargenumberof sensor devices in the network, the severe power, computing and memory limi- tions,theirdense,randomdeploymentandfrequentfailures,posenewinteresting abstract modeling, algorithmic design, analysis and implementation challenges of great practical impact. This workshop aimed to bring together research contributions related to diversealgorithmicandcomplexitytheoreticaspects ofwirelesssensornetworks. This was the third event in the series. ALGOSENSORS 2004 washeld in Turku, Finland, ALGOSENSORS 2006 was held in Venice, Italy. Since its beginning, ALGOSENSORS has been collocated with ICALP. The Third International Workshop on Algorithmic Aspects of Wireless S- sor Networks (ALGOSENSORS 2007) was organized by Wrocla w University of Technology.TheworkshopwasheldonJuly14,2007,inconjunctionwithICALP 2007. After a careful review by the Program Committee of 25 submissions, 11 regular papers were accepted to ALGOSENSORS 2007. Apart from the regular talks, two keynote speeches were given at the workshop.

Mathematical Foundations of Computer Science 1999 - 24th International Symposium, MFCS'99 Szklarska Poreba, Poland,... Mathematical Foundations of Computer Science 1999 - 24th International Symposium, MFCS'99 Szklarska Poreba, Poland, September 6-10, 1999 Proceedings (Paperback, 1999 ed.)
Miroslaw Kutylowski, Leszek Pacholski, Tomasz Wierzbicki
R1,667 Discovery Miles 16 670 Ships in 10 - 15 working days

This volume contains papers selected for presentation during the 24th Interna tional Symposium on Mathematical Foundations of Computer Science held on September 6-10, 1999 in Szklarska Por DEGREESba, Poland. The symposium, organized alternately in the Czech Republic, Slovakia, and Poland, focuses on theoretical aspects and mathematical foundations of computer science. The scientific program of the symposium consists of five invited talks given by Martin Dyer, Dexter Kozen, Giovanni Manzini, Sergio Rajsbaum, and Mads Tofte, and 37 accepted papers chosen out of 68 submissions. The volume contains all accepted contributed papers, and three invited papers. The contributed papers have been selected for presentation based on their scientific quality, novelty, and interest for the general audience of MFCS par ticipants. Each paper has been reviewed by at least three independent referees - PC members and/or sub-referees appointed by them. The papers were se lected for presentation during a fully electronic virtual meeting of the program committee on May 7, 1999. The virtual PC meeting was supported by software written by Artur Zgoda, Ph.D. student at the University of Wroclaw. The entire communication and access to quite a sensitive database at PC headquarters in Wroclaw was secured by cryptographic protocols based on technology of certificates.

Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October... Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings (Paperback, 1st ed. 2022)
Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski
R1,494 Discovery Miles 14 940 Ships in 10 - 15 working days

This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022. The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field's foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications.

Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020,... Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings (Paperback, 1st ed. 2020)
Miroslaw Kutylowski, Jun Zhang, Chao Chen
R2,598 Discovery Miles 25 980 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020. The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions. The selected papers are devoted to topics such as secure operating system architectures, applications programming and security testing, intrusion and attack detection, cybersecurity intelligence, access control, cryptographic techniques, cryptocurrencies, ransomware, anonymity, trust, recommendation systems, as well machine learning problems. Due to the Corona pandemic the event was held virtually.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hampstead
Diane Keaton, Brendan Gleeson, … DVD R63 Discovery Miles 630
Sellotape Clear Tape - Double Value…
R22 R16 Discovery Miles 160
Snappy Tritan Bottle (1.5L)(Green)
R229 R179 Discovery Miles 1 790
Bennett Read Steam Iron (2200W)
R592 Discovery Miles 5 920
Elecstor B22 7W Rechargeable LED Bulb…
R69 Discovery Miles 690
Ghostbusters: Afterlife
Mckenna Grace Blu-ray disc  (1)
R171 R130 Discovery Miles 1 300
Sylvanian Families - Walnut Squirrel…
R749 R579 Discovery Miles 5 790
Marvel Spiderman Fibre-Tip Markers (Pack…
R57 Discovery Miles 570
JoyDivision Anal Beads Wave Short…
R479 R419 Discovery Miles 4 190
Baby Dove Body Wash Head To Toe Derma…
R99 Discovery Miles 990

 

Partners