|
|
Showing 1 - 3 of
3 matches in All Departments
This book contains revised versions of all the papers presented at
the 16th International Conference on Cryptology and Network
Security, CANS 2017, held in Hong Kong, China, in November/
December 2017. The 20 full papers presented together with 8 short
papers were carefully reviewed and selected from 88 submissions.
The full papers are organized in the following topical sections:
foundation of applied cryptography; processing encrypted data;
predicate encryption; credentials and authentication; web security;
Bitcoin and blockchain; embedded system security; anonymous and
virtual private networks; and wireless and physical layer security.
|
Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (Paperback, 2014 ed.)
Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu
|
R2,344
Discovery Miles 23 440
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 8th
International Conference on Provable Security, ProvSec 2012, held
in Chengdu, China, in September 2012. The 20 full papers and 7
short papers presented together with 2 invited talks were carefully
reviewed and selected from 68 submissions. The papers are grouped
in topical sections on fundamental, symmetric key encryption,
authentication, signatures, protocol, public key encryption, proxy
re-encryption, predicate encryption, and attribute-based
cryptosystem.
|
Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings (Paperback, 2014 ed.)
Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
|
R2,915
Discovery Miles 29 150
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 17th
International Conference on Information Security, ISC 2014, held in
Hong Kong, China, in October 2014. The 20 revised full papers
presented together with 16 short papers and two invited papers were
carefully reviewed and selected from 106 submissions. The papers
are organized in topical sections on public-key encryption,
authentication, symmetric key cryptography, zero-knowledge proofs
and arguments, outsourced and multi-party computations,
implementation, information leakage, firewall and forensics, Web
security, and android security.
|
|