|
Showing 1 - 11 of
11 matches in All Departments
|
The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers (Hardcover, 2009 ed.)
Vashek Matyas, Simone Fischer-Hubner, Daniel Cvrcek, Petr Svenda
|
R2,904
Discovery Miles 29 040
|
Ships in 10 - 15 working days
|
What constitutes an identity, how do new technologies affect
identity, how do we manage identities in a globally networked
information society? The increasing div- sity of information and
communication technologies and their equally wide range of usage in
personal, professional and official capacities raise challenging
questions of identity in a variety of contexts. The aim of the
IFIP/FIDIS Summer Schools has been to encourage young a- demic and
industry entrants to share their own ideas about privacy and
identity m- agement and to build up collegial relationships with
others. As such, the Summer Schools have been introducing
participants to the social implications of information technology
through the process of informed discussion. The 4th International
Summer School took place in Brno, Czech Republic, during September
1-7, 2008. It was organized by IFIP (International Federation for
Infor- tion Processing) working groups 9.2 (Social Accountability),
9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in
cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk
University in Brno. The focus of the event was on security and
privacy issues in the Internet environment, and aspects of identity
m- agement in relation to current and future technologies in a
variety of contexts.
|
Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Vashek Matyas, Petr Svenda, Frank Stajano, Bruce Christianson, Jonathan Anderson
|
R1,529
Discovery Miles 15 290
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed post-workshop
proceedings of the 26th International Workshop on Security
Protocols, held in Cambridge, UK, in March 2018. The volume
consists of 17 thoroughly revised invited papers presented together
with the respective transcripts of discussions. The theme of this
year's workshop was fail-safe and fail-deadly concepts in protocol
design. The topics covered included failures and attacks; novel
protocols; threat models and incentives; cryptomoney; and the
interplay of cryptography and dissent.
|
Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyas
|
R2,388
Discovery Miles 23 880
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed post-workshop
proceedings of the 25th International Workshop on Security
Protocols, held in Cambridge, UK, in March 2017. The volume
consists of 16 thoroughly revised invited papers presented together
with the respective transcripts of discussions. The theme of this
year's workshop was multi-objective security and the topics covered
included security and privacy, formal methods and theory of
security, systems security, network security, software and
application security, human and societal aspects of security and
privacy, security protocols, web protocol security, and mobile and
wireless security.
|
Security Protocols XXII - 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Bruce Christianson, James Malcolm, Vashek Matyas, Petr Svenda, Frank Stajano, …
|
R2,583
Discovery Miles 25 830
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed post-workshop
proceedings of the 22nd International Workshop on Security
Protocols, held in Cambridge, UK, in March 2014. After an
introduction the volume presents 18 revised papers each followed by
a revised transcript of the presentation and ensuing discussion at
the event. The theme of this year's workshop is "Collaborating with
the Enemy".
This book constitutes the thoroughly refereed post-proceedings of
the 17th International Workshop on Security Protocols, SP 2009,
held in Cambridge, UK, in April 2009. The 17 revised full papers
presented together with edited transcriptions of some of the
discussions following the presentations have gone through multiple
rounds of reviewing, revision, and selection. The theme of this
workshop was "Brief Encounters". In the old days, security
protocols were typically run first as preliminaries to, and later
to maintain, relatively stable continuing relationships between
relatively unchanging individual entities. Pervasive computing,
e-bay and second life have shifted the ground: we now frequently
desire a secure commitment to a particular community of entities,
but relatively transient relationships with individual members of
it, and we are often more interested in validating attributes than
identity. The papers and discussions in this volume examine the
theme from the standpoint of various different applications and
adversaries.
|
The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers (Paperback, 2009)
Vashek Matyas, Simone Fischer-Hubner, Daniel Cvrcek, Petr Svenda
|
R2,873
Discovery Miles 28 730
|
Ships in 10 - 15 working days
|
What constitutes an identity, how do new technologies affect
identity, how do we manage identities in a globally networked
information society? The increasing div- sity of information and
communication technologies and their equally wide range of usage in
personal, professional and official capacities raise challenging
questions of identity in a variety of contexts. The aim of the
IFIP/FIDIS Summer Schools has been to encourage young a- demic and
industry entrants to share their own ideas about privacy and
identity m- agement and to build up collegial relationships with
others. As such, the Summer Schools have been introducing
participants to the social implications of information technology
through the process of informed discussion. The 4th International
Summer School took place in Brno, Czech Republic, during September
1-7, 2008. It was organized by IFIP (International Federation for
Infor- tion Processing) working groups 9.2 (Social Accountability),
9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in
cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk
University in Brno. The focus of the event was on security and
privacy issues in the Internet environment, and aspects of identity
m- agement in relation to current and future technologies in a
variety of contexts.
This book constitutes the thoroughly refereed post-proceedings of
the 16th International Workshop on Security Protocols, SP 2008,
held in Cambridge, UK, in April 2008. The 17 revised full papers
presented together with edited transcriptions of some of the
discussions following the presentations have gone through multiple
rounds of reviewing, revision, and selection. The theme of this
workshop was "Remodelling the Attacker" with the intention to tell
the students at the start of a security course that it is very
important to model the attacker, but like most advice to the young,
this is an oversimplification. Shouldn't the attacker's capability
be an output of the design process as well as an input? The papers
and discussions in this volume examine the theme from the
standpoint of various different applications and adversaries.
|
Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Jonathan Anderson, Frank Stajano, Bruce Christianson, Vashek Matyas
|
R2,268
Discovery Miles 22 680
|
Ships in 10 - 15 working days
|
The volume LNCS 12287 constitutes the proceedings of the 27th
International Workshop on Security Protocols, held in Cambridge,
UK, in April 2019. The volume consists of 16 thoroughly revised
invited papers presented together with the respective transcripts
of discussions. The theme of this year's workshop was "Security
Protocols for Humans" The topics covered included Designing for
Humans and Understanding Humans, Human Limitations in Security,
Secure sharing and collaboration and much more.
|
Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Jonathan Anderson, Vashek Matyas, Bruce Christianson, Frank Stajano
|
R2,170
Discovery Miles 21 700
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed post-workshop
proceedings of the 24 th International Workshop on Securit
Protocols, held in Brno, Czech Republic, in April 2016. The 13
thoroughly revised papers presented together with the respective
transcripts of discussions have been carefully reviewed. The theme
of the workshop was Evolving Security - considering that security
protocols evolve with their changing requirements, their changing
mechanisms and attackers' changing agendas and capabilities.
|
Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Bruce Christianson, Petr Svenda, Vashek Matyas, James Malcolm, Frank Stajano, …
|
R2,560
Discovery Miles 25 600
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed post-workshop
proceedings of the 23rd International Workshop on Security
Protocols, held in Cambridge, UK, in March/April 2015. After an
introduction the volume presents 18 revised papers each followed by
a revised transcript of the presentation and ensuing discussion at
the event. The theme of this year's workshop is "Information
Security in Fiction and in Fact".
|
Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings (Paperback, 2014 ed.)
Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont
|
R2,491
Discovery Miles 24 910
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 4th
International Conference on Security, Privacy, and Applied
Cryptography Engineering held in Pune, India, in October 2014. The
19 papers presented together with two invited papers were carefully
reviewed and selected from 66 submissions. The papers are organized
in topical sections on cryptographic building blocks; mini
tutorial; attacks and countermeasures; tools and methods; and
secure systems and applications.
|
You may like...
Roots Music
Mark F. DeWitt
Paperback
R1,568
Discovery Miles 15 680
|