0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (10)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 12 of 12 matches in All Departments

Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings (Paperback,... Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings (Paperback, 1st ed. 2018)
Liqun Chen, Mark Manulis, Steve Schneider
R1,540 Discovery Miles 15 400 Ships in 10 - 15 working days

This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.

E-Voting and Identity - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings (Paperback,... E-Voting and Identity - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings (Paperback, 2013 ed.)
James Heather, Steve Schneider, Vanessa Teague
R1,349 Discovery Miles 13 490 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.

Formal Aspects in Security and Trust - Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006,... Formal Aspects in Security and Trust - Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006, Revised Selected Papers (Paperback, 2007 ed.)
Theo Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust, FAST 2006, held in Hamilton, Ontario, Canada, August 26-27, 2006.

The 18 revised papers presented were carefully reviewed and selected from 47 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.

Formal Aspects in Security and Trust - Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005,... Formal Aspects in Security and Trust - Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers (Paperback, 2006 ed.)
Theo Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
R1,549 Discovery Miles 15 490 Ships in 10 - 15 working days


This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, held in Newcastle upon Tyne, UK in July 2005.

The 17 revised papers presented together with the extended abstract of 1 invited paper were carefully reviewed and selected from 37 submissions. The papers focus on formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.

ZB 2005: Formal Specification and Development in Z and B - 4th International Conference of B and Z Users, Guildford, UK, April... ZB 2005: Formal Specification and Development in Z and B - 4th International Conference of B and Z Users, Guildford, UK, April 13-15, 2005, Proceedings (Paperback, 2005 ed.)
Helen Treharne, Steve King, Martin Henson, Steve Schneider
R3,010 Discovery Miles 30 100 Ships in 10 - 15 working days

These proceedings record the papers presented at the 4th International Conf- ence of B and Z Users (ZB 2005), held in the city of Guildford in the south-east ofEngland. Thisconferencebuiltonthesuccessofthepreviousthreeconferences in this series, ZB 2000, held at the University of York in the UK, ZB 2002, held at theLaboratoire Logiciels Syst' emes R' eseaux within theInstitut d'Informatique et Math' ematique Appliqu' ees de Grenoble (LSR-IMAG) in Grenoble, France, and ? ZB 2003, held in Turku in Finland hosted by Abo Akademi University and the TurkuCentreforComputerScience(TUCS). ZB2005washeldattheUniversity of Surrey, Guildford, UK, hosted by the Department of Computing. The U- versity has always placed particular emphasis on the applicability of its research and its relationship with industrial partners. In this context it is building up its formal methods activity as an area of strategic importance, with the establi- ment of a new group within the Department of Computing, and also with its support for this conference. B and Z are two important formal methods that share a common conceptual origin; they are leading approaches in industry and academia for the speci?- tion and development (using formal re? nement) of computer-based systems. At ZB 2005 the B and Z communities met once again to hold a fourth joint c- ference that simultaneously incorporated the 15th International Z User Meeting and the 6th International Conference on the B Method.

Formal Aspects of Security - First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers... Formal Aspects of Security - First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers (Paperback, 2003 ed.)
Ali E. Abdallah, Peter Ryan, Steve Schneider
R1,498 Discovery Miles 14 980 Ships in 10 - 15 working days

Preface Formal Aspects of Security (FASec) was held at Royal Holloway, University of London, 18-20 December 2002. The occasion celebrated a Jubilee, namely the 25thanniversaryoftheestablishmentofBCS-FACS, theFormalAspectsofC- puting Science specialist group of the British Computer Society. FASec is one of a series of events organized by BCS-FACS to highlight the use of formal me- ods, emphasize their relevance to modern computing, and promote their wider application. As the architecture model of information systems evolves from - connected PCs, throughintranet (LAN) and internet (WAN), to mobile internet and grids, security becomes increasingly critical to all walks of society: c- merce, ?nance, health, transport, defence and science. It is no surprise therefore that security is one of the fastest-growing research areas in computer science. Theaudience ofFASec includes thosein the formalmethods community who have(orwouldliketodevelop)adeeper interestinsecurity, andthoseinsecurity who would like to understand how formal methods can make important cont- butions to some aspects of security. The scope of FASec is deliberately broad andcoverstopics that rangefrommodelling securityrequirementsthroughsp- i?cation, analysis, and veri?cations of cryptographic protocols to certi?ed code. The discussions at FASec 2002 encompassed many aspects of security: from theoretical foundations through support tools and on to applications. Formal methods has made a substantial contribution to this exciting ?eld in the pa

Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK,... Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.

Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK,... Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.

Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019,... Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I (Paperback, 1st ed. 2019)
Kazue Sako, Steve Schneider, Peter Y. A. Ryan
R1,628 Discovery Miles 16 280 Ships in 10 - 15 working days

The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019. The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in topical sections named as follows: Part I: machine learning; information leakage; signatures and re-encryption; side channels; formal modelling and verification; attacks; secure protocols; useful tools; blockchain and smart contracts. Part II: software security; cryptographic protocols; security models; searchable encryption; privacy; key exchange protocols; and web security.

Integrated Formal Methods - 13th International Conference, IFM 2017, Turin, Italy, September 20-22, 2017, Proceedings... Integrated Formal Methods - 13th International Conference, IFM 2017, Turin, Italy, September 20-22, 2017, Proceedings (Paperback, 1st ed. 2017)
Nadia Polikarpova, Steve Schneider
R2,738 Discovery Miles 27 380 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Integrated Formal Methods, IFM 2017, held in Turin, Italy, in September 2017. The 24 full papers and 4 short papers presented were carefully reviewed and selected from 61 submissions. They are organized in topical sections on cyber-physical systems, software verification tools, safety-critical systems, concurrency and distributed systems, program verification techniques, formal modeling, and verified software..

Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016.... Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (Paperback, 1st ed. 2016)
Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider
R1,583 Discovery Miles 15 830 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions.ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy.

Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019,... Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II (Paperback, 1st ed. 2019)
Kazue Sako, Steve Schneider, Peter Y. A. Ryan
R1,575 Discovery Miles 15 750 Ships in 10 - 15 working days

The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019. The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in topical sections named as follows:Part I: machine learning; information leakage; signatures and re-encryption; side channels; formal modelling and verification; attacks; secure protocols; useful tools; blockchain and smart contracts.Part II: software security; cryptographic protocols; security models; searchable encryption; privacy; key exchange protocols; and web security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Moon Bag (Black)
R57 Discovery Miles 570
I Will Not Be Silenced
Karyn Maughan Paperback R350 R260 Discovery Miles 2 600
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
- (Subtract)
Ed Sheeran CD R165 R74 Discovery Miles 740
Cable Guy Ikon "Light Up" Deadpool…
R599 R549 Discovery Miles 5 490
Elecstor 18W In-Line UPS (Black)
R999 R404 Discovery Miles 4 040
Everyday Fresh - Meals In Minutes
Donna Hay Paperback R450 R341 Discovery Miles 3 410
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Die Wonder Van Die Skepping - Nog 100…
Louie Giglio Hardcover R279 R210 Discovery Miles 2 100
M3GAN
Allison Williams, Violet McGraw, … DVD R133 Discovery Miles 1 330

 

Partners