0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Adaptive Cryptographic Access Control (Hardcover, 2010 ed.): Anne V. D. M. Kayem, Selim G Akl, Patrick Martin Adaptive Cryptographic Access Control (Hardcover, 2010 ed.)
Anne V. D. M. Kayem, Selim G Akl, Patrick Martin
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential.

The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control presents the challenges of designing hierarchical cryptographic key management algorithms to implement Adaptive Access Control in dynamic environments and suggest solutions that will overcome these challenges.

Adaptive Cryptographic Access Control is a cutting-edge book focusing specifically on this topic in relation to security and cryptographic access control. Both the theoretical and practical aspects and approaches of cryptographic access control are introduced in this book. Case studies and examples are provided throughout this book.

Adaptive Cryptographic Access Control (Paperback, 2010 ed.): Anne V. D. M. Kayem, Selim G Akl, Patrick Martin Adaptive Cryptographic Access Control (Paperback, 2010 ed.)
Anne V. D. M. Kayem, Selim G Akl, Patrick Martin
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential. The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control presents the challenges of designing hierarchical cryptographic key management algorithms to implement Adaptive Access Control in dynamic environments and suggest solutions that will overcome these challenges. Adaptive Cryptographic Access Control is a cutting-edge book focusing specifically on this topic in relation to security and cryptographic access control. Both the theoretical and practical aspects and approaches of cryptographic access control are introduced in this book. Case studies and examples are provided throughout this book.

Unconventional Computation - 6th International Conference, UC 2007, Kingston, Canada, August 13-17, 2007, Proceedings... Unconventional Computation - 6th International Conference, UC 2007, Kingston, Canada, August 13-17, 2007, Proceedings (Paperback, 2007 ed.)
Selim G Akl, Cristian S. Calude, Michael J. Dinneen, Grzegorz Rozenberg, H. Todd Wareham
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Unconventional Computation, UC 2007, held in Kingston, Canada, in August 2007.

The 17 revised full papers presented together with 4 invited papers were carefully reviewed and selected for inclusion in the book. All current aspects of unconventional computation are addressed - theory as well as experiments and applications. Typical topics are: natural computing including quantum, cellular, molecular, neural and evolutionary computing; chaos and dynamical systems based computing; and various proposals for computations that go beyond the Turing model.

Algorithms and Data Structures - 4th International Workshop, WADS '95, Kingston, Canada, August 16 - 18, 1995. Proceedings... Algorithms and Data Structures - 4th International Workshop, WADS '95, Kingston, Canada, August 16 - 18, 1995. Proceedings (Paperback, 1995 ed.)
Selim G Akl, Frank Dehne, Joerg-Rudiger Sack, Nicola Santoro
R1,755 Discovery Miles 17 550 Ships in 10 - 15 working days

This volume constitutes the proceedings of the Fourth International Workshop on Algorithms and Data Structures, WADS '95, held in Kingston, Canada in August 1995.
The book presents 40 full refereed papers selected from a total of 121 submissions together with invited papers by Preparata and Bilardi, Sharir, Toussaint, and Vitanyi and Li. The book addresses various aspects of algorithms, data structures, computational geometry, scheduling, computational graph theory, and searching.

Advances in Computing and Information - ICCI '90 - International Conference on Computing and Information Niagara Falls,... Advances in Computing and Information - ICCI '90 - International Conference on Computing and Information Niagara Falls, Canada, May 23-26, 1990. Proceedings (Paperback, 1990 ed.)
Selim G Akl, Frantisek Fiala, Waldemar W Koczkodaj
R1,705 Discovery Miles 17 050 Ships in 10 - 15 working days

This volume contains selected and invited papers presented at the International Conference on Computing and Information, ICCI '90, Niagara Falls, Ontario, Canada, May 23-26, 1990. ICCI conferences provide an international forum for presenting new results in research, development and applications in computing and information. Their primary goal is to promote an interchange of ideas and cooperation between practitioners and theorists in the interdisciplinary fields of computing, communication and information theory. The four main topic areas of ICCI '90 are: - Information and coding theory, statistics and probability, - Foundations of computer science, theory of algorithms and programming, - Concurrency, parallelism, communications, networking, computer architecture and VLSI, - Data and software engineering, databases, expert systems, information systems, decision making, and AI methodologies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Imtiaz Sooliman And The Gift Of The…
Shafiq Morton Paperback  (1)
R360 R332 Discovery Miles 3 320
Gugu Gets a Star
Wendy Maartens Paperback  (1)
R100 R91 Discovery Miles 910
Looking for the Good War - American…
Elizabeth D. Samet Paperback R500 R469 Discovery Miles 4 690
Scripture History for Youth
Esther Copley Paperback R678 Discovery Miles 6 780
The Cold War in Retrospect - The…
Roger S. Whitcomb Hardcover R2,789 Discovery Miles 27 890
UNITEK C14059BK USB cable 2 m C Black…
R250 R175 Discovery Miles 1 750
Eight Days In July - Inside The Zuma…
Qaanitah Hunter, Kaveel Singh, … Paperback  (1)
R360 R337 Discovery Miles 3 370
Dimension-Based Quality Analysis and…
Falk Ralph Schiffner Hardcover R1,521 Discovery Miles 15 210
Music and Human-Computer Interaction
Simon Holland, Katie Wilkie, … Hardcover R3,614 Discovery Miles 36 140
Paleomagnetism, Volume 73 - Continents…
Michael W. McElhinny, Phillip L. McFadden Hardcover R1,494 Discovery Miles 14 940

 

Partners