|
Showing 1 - 5 of
5 matches in All Departments
|
Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Feng Liu, Shouhuai Xu, Moti Yung
|
R1,539
Discovery Miles 15 390
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the First International
Conference on Science of Cyber Security, SciSec 2018, held in
Beijing, China, in August 2018. The 11 full papers and 6 short
papers presented in this volume were carefully reviewed and
selected from 54 submissions. The papers focus on science of
security; cybersecurity dynamics; attacks and defenses; network
security; security metrics and measurements; and performance
enhancements.
|
Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Paperback, 1st ed. 2018)
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, …
|
R3,089
Discovery Miles 30 890
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 20th
International Conference on Information and Communications
Security, ICICS 2018, held in Lille, France, in October 2018. The
39 revised full papers and 11 short papers presented were carefully
selected from 202 submissions. The papers are organized in topics
on blockchain technology, malware, botnet and network security,
real-world cryptography, encrypted computing, privacy protection,
signature schemes, attack analysis and detection, searchable
encryption and identity-based cryptography, verifiable storage and
computing, applied cryptography, supporting techniques, formal
analysis and cryptanalysis, attack detection, and security
management.
|
Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Dongdai Lin, Shouhuai Xu, Moti Yung
|
R1,578
Discovery Miles 15 780
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed post-conference
proceedings of the 9th International Conference on Information
Security and Cryptology, Inscrypt 2013, held in Guangzhou, China,
in November 2013. The 21 revised full papers presented together
with 4 short papers were carefully reviewed and selected from 93
submissions. The papers cover the topics of Boolean function and
block cipher, sequence and stream cipher, applications: systems and
theory, computational number theory, public key cryptography, has
function, side-channel and leakage, and application and system
security.
|
Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers (Paperback, 1st ed. 2019)
Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung
|
R1,570
Discovery Miles 15 700
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the Second International
Conference on Science of Cyber Security, SciSec 2019, held in
Nanjing, China, in August 2019. The 20 full papers and 8 short
papers presented in this volume were carefully reviewed and
selected from 62 submissions. These papers cover the following
subjects: Artificial Intelligence for Cybersecurity, Machine
Learning for Cybersecurity, and Mechanisms for Solving Actual
Cybersecurity Problems (e.g., Blockchain, Attack and Defense;
Encryptions with Cybersecurity Applications).
|
Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings (Paperback, 1st ed. 2015)
Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang
|
R3,124
Discovery Miles 31 240
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 9th International
Conference on Network and System Security, NSS 2015, held in New
York City, NY, USA, in November 2015. The 23 full papers and 18
short papers presented were carefully reviewed and selected from
110 submissions. The papers are organized in topical sections on
wireless security and privacy; smartphone security; systems
security; applications security; security management; applied
cryptography; cryptosystems; cryptographic mechanisms; security
mechanisms; mobile and cloud security; applications and network
security.
|
You may like...
8 Months Left
James Patterson, Mike Lupica
Paperback
R370
R149
Discovery Miles 1 490
|