|
Showing 1 - 3 of
3 matches in All Departments
|
Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (Paperback, 2014 ed.)
Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu
|
R2,582
Discovery Miles 25 820
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 8th
International Conference on Provable Security, ProvSec 2012, held
in Chengdu, China, in September 2012. The 20 full papers and 7
short papers presented together with 2 invited talks were carefully
reviewed and selected from 68 submissions. The papers are grouped
in topical sections on fundamental, symmetric key encryption,
authentication, signatures, protocol, public key encryption, proxy
re-encryption, predicate encryption, and attribute-based
cryptosystem.
|
Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings (Paperback, 1st ed. 2018)
Man-Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, …
|
R2,737
Discovery Miles 27 370
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 12th International
Conference on Network and System Security, NSS 2018, held in Hong
Kong, China, in August 2018. The 26 revised full papers and 9 short
papers presented in this book were carefully reviewed and selected
from 88 initial submissions. The papers cover a wide range of
topics in the field, including blockchain, mobile security, applied
cryptography, authentication, biometrics, IoT, privacy, and
education.
|
Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings (Paperback, 2014 ed.)
Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
|
R3,219
Discovery Miles 32 190
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 17th
International Conference on Information Security, ISC 2014, held in
Hong Kong, China, in October 2014. The 20 revised full papers
presented together with 16 short papers and two invited papers were
carefully reviewed and selected from 106 submissions. The papers
are organized in topical sections on public-key encryption,
authentication, symmetric key cryptography, zero-knowledge proofs
and arguments, outsourced and multi-party computations,
implementation, information leakage, firewall and forensics, Web
security, and android security.
|
|