0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (8)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 12 of 12 matches in All Departments

Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019,... Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings (Paperback, 1st ed. 2019)
Robert H. Deng, Valerie Gauthier-Umana, Martin Ochoa, Moti Yung
R2,591 Discovery Miles 25 910 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques.

Leakage Resilient Password Systems (Paperback, 2015 ed.): Yingjiu Li, Qiang Yan, Robert H. Deng Leakage Resilient Password Systems (Paperback, 2015 ed.)
Yingjiu Li, Qiang Yan, Robert H. Deng
R1,760 Discovery Miles 17 600 Ships in 10 - 15 working days

This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP systems. Quantitative analysis proves that a secure LRP system in practical settings imposes a considerable amount of cognitive workload unless certain secure channels are involved. The book introduces a secure and practical LRP system, named Cover Pad, for password entry on touch-screen mobile devices. Cover Pad leverages a temporary secure channel between a user and a touch screen which can be easily realized by placing a hand shielding gesture on the touch screen. The temporary secure channel is used to deliver a hidden message to the user for transforming each password symbol before entering it on the touch screen. A user study shows the impact of these testing conditions on the users' performance in practice. Finally, this book introduces a new LRP system named ShadowKey. Shadow Key is designed to achieve better usability for leakage resilient password entry. It leverages either a permanent secure channel, which naturally exists between a user and the display unit of certain mobile devices, or a temporary secure channel, which can be easily realized between a user and a touch screen with a hand-shielding gesture. The secure channel protects the mappings between original password symbols and associated random symbols. Unlike previous LRP system users, Shadow Key users do not need to remember anything except their passwords. Leakage Resilient Password Systems is designed for professionals working in the security industry. Advanced-level students studying computer science and electrical engineering will find this brief full of useful material.

Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013,... Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings (Paperback, 2013 ed.)
Robert H. Deng, Tao Feng
R1,615 Discovery Miles 16 150 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks.

Information Security, Practice and Experience - 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010,... Information Security, Practice and Experience - 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings (Paperback, Edition.)
Jin Kwak, Robert H. Deng, Guilin Wang, Yoojae Won
R1,618 Discovery Miles 16 180 Ships in 10 - 15 working days

The 6th International Conference on Information Security Practice and Expe- ence (ISPEC 2010) was held in Seoul, Korea, May 12-13, 2010. The ISPEC conference series is an established forum that brings together - searchers and practitioners to provide a con?uence of new information security technologies, including their applications and their integration with IT systems invariousverticalsectors.Inpreviousyears,ISPEChastakenplaceinSingapore (2005), Hangzhou, China (2006), Hong Kong, China (2007), Sydney, Australia (2008),andXi'an, China (2009).For all sessions,as this one,the conferencep- ceedings were published by Springer in the Lecture Notes in Computer Science series. In total, 91 papers from 18 countries were submitted to ISPEC 2010, and 28 were selected for inclusion in the proceedings (acceptance rate 30%). The accepted papers cover multiple topics of information security and applied cr- tography. Each submission was anonymously reviewed by at least three revi- ers. We are grateful to the Program Committee, which was composed of more than 56 well-known security experts from 16 countries; we heartily thank them as well as all external reviewers for their time and valued contributions to the tough and time-consuming reviewing process. The conference was hosted by Soonchunhyang University, Korea, supported by Korea Internet & Security Agency (KISA), Korea; Electronics and Telec- munications Research Institute (ETRI), Korea, in Corporation with Korea - stitute of Information Security & Cryptography (KIISC), Korea, and sponsored by Korea Communications Commission (KCC), Korea. We sincerely thank the HonoraryChair and the General Chairs of ISPEC 2010 for their strong support.

Information Security - 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings (Paperback, 2005... Information Security - 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings (Paperback, 2005 ed.)
Jianying Zhou, Robert H. Deng, Feng Bao
R1,830 Discovery Miles 18 300 Ships in 10 - 15 working days

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought together individuals from academia and - dustry involvedin manyresearchdisciplines of information security to foster the exchange of ideas. During recent years this conference has tried to place special emphasis on the practical aspects of information security, and since it passed from being an international workshop to being an international conference in 2001, it has become one of the most relevant forums at which researchers meet and discuss emerging security challenges and solutions. Advised by the ISC Steering Committee, and in order to provide students with more opportunities for publication, ISC 2005 accepted extra student papers - sides the regular papers. The initiative was very well accepted by the young sector of the scienti?c community, and we hope that the success of this idea will remainfornextISCevents. AnotherimportantfactorforthesuccessofISC2005 was that selected papers in the proceedings will be invited for submission to a special issue of the InternationalJournalof InformationSecurity. The result was an incredible response to the call for papers; we received 271 submissions, the highest since ISC events started. It goes without saying that the paper selection process was more competitive and di?cult than ever before - only 33 regular papers were accepted, plus 5 student papers for a special student session.

Information Security Practice and Experience - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005,... Information Security Practice and Experience - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Paperback, 2005 ed.)
Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou
R1,624 Discovery Miles 16 240 Ships in 10 - 15 working days

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission, reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference

Information and Communications Security - 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings... Information and Communications Security - 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings (Paperback, 2002 ed.)
Robert H. Deng, Feng Bao, Jianying Zhou
R1,817 Discovery Miles 18 170 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Conference on Information and Communication Security, ICICS 2002, held in Singapore in December 2002. The 41 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on system security, crypto systems, security protocols, fingerprinting and watermarking, efficient implementation of algorithms, access control, and cryptanalysis and cryptographic techniques.

Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings (Paperback,... Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings (Paperback, 1st ed. 2020)
Willy Susilo, Robert H. Deng, Fuchun Guo, Yannan Li, Rolly Intan
R1,626 Discovery Miles 16 260 Ships in 10 - 15 working days

This book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020. The 23 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers cover topics of research in theory and applications of information security, such as Security and privacy and Network security as well.

Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings... Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings (Paperback, 1st ed. 2019)
Yi Mu, Robert H. Deng, Xinyi Huang
R1,663 Discovery Miles 16 630 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security, CANS 2019, held in Fuzhou, China, in October 2019. The 21 full papers and 8 short papers were carefully reviewed and selected from 55 submissions. The papers focus on topics such as homomorphic encryption; SIKE and Hash; lattice and post-quantum cryptography; searchable encryption; blockchains, cloud security; secret sharing and interval test, LWE; encryption, data aggregation, and revocation; and signature, ML, payment, and factorization.

Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18,... Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings (Paperback, 1st ed. 2016)
Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang
R2,738 Discovery Miles 27 380 Ships in 10 - 15 working days

This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.

Handbook of Blockchain, Digital Finance, and Inclusion, Volume 1 - Cryptocurrency, FinTech, InsurTech, and Regulation... Handbook of Blockchain, Digital Finance, and Inclusion, Volume 1 - Cryptocurrency, FinTech, InsurTech, and Regulation (Paperback)
David Lee, Robert H. Deng
R3,211 Discovery Miles 32 110 Ships in 12 - 17 working days

Handbook of Blockchain, Digital Finance, and Inclusion, Volume 1: Cryptocurrency, FinTech, InsurTech, and Regulation explores recent advances in digital banking and cryptocurrency, emphasizing mobile technology and evolving uses of cryptocurrencies as financial assets. Contributors go beyond summaries of standard models to describe new banking business models that will be sustainable and will likely dictate the future of finance. The volume not only emphasizes the financial opportunities made possible by digital banking, such as financial inclusion and impact investing, but it also looks at engineering theories and developments that encourage innovation. Its ability to illuminate present potential and future possibilities make it a unique contribution to the literature.

Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2 - ChinaTech, Mobile Security, and Distributed Ledger... Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2 - ChinaTech, Mobile Security, and Distributed Ledger (Paperback)
David Lee, Robert H. Deng
R3,174 Discovery Miles 31 740 Ships in 12 - 17 working days

Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2: ChinaTech, Mobile Security, and Distributed Ledger emphasizes technological developments that introduce the future of finance. Descriptions of recent innovations lay the foundations for explorations of feasible solutions for banks and startups to grow. The combination of studies on blockchain technologies and applications, regional financial inclusion movements, advances in Chinese finance, and security issues delivers a grand perspective on both changing industries and lifestyles. Written for students and practitioners, it helps lead the way to future possibilities.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mathematical Methods And Models In…
Vladislav Mantic Hardcover R5,068 Discovery Miles 50 680
A Hope for Philosophy - The European…
Ye Xiushan Hardcover R7,604 Discovery Miles 76 040
Scanning Probe Microscopy of Soft Matter…
V.V. Tsukruk Hardcover R4,922 R3,918 Discovery Miles 39 180
The Ascent of Man - A Philosophy of…
James F. Harris Paperback R1,407 Discovery Miles 14 070
The Humanistic Background of Science
Philipp Frank Paperback R895 Discovery Miles 8 950
Polymer Chemistry - International…
Timothy P. Lodge, Paul C. Hiemenz Paperback R1,332 Discovery Miles 13 320
Handbook of Spin Transport and Magnetism
Evgeny Y. Tsymbal, Igor Zutic Hardcover R6,651 Discovery Miles 66 510
The Art of Jihad - Realism in Islamic…
Malik Mufti Paperback R851 Discovery Miles 8 510
The Philosophy of Descartes
A. Boyce Gibson Paperback R1,204 Discovery Miles 12 040
Means Without End - A Critical Survey of…
Gregory H. Davis Paperback R1,210 Discovery Miles 12 100

 

Partners