0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings... Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings (Paperback, 1st ed. 2018)
Robert Krimmer, Melanie Volkamer, Veronique Cortier, Rajeev Gore, Manik Hapsara, …
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018. The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers deal with topics connected with electronic voting including experiences and revisions of the real uses of E-voting systems and corresponding processes in elections.

Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration (Paperback, 2009 ed.): Veronique... Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration (Paperback, 2009 ed.)
Veronique Cortier, Claude Kirchner, Mitsuhiro Okada, Hideki Sakurada
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

The security issues set by the global digitization of our society have had, and will continue to have, a crucial impact at all levels of our social organization, including, just to mention a few, privacy, economics, environmental policies, national sovereignty, medical environments. The importance of the collaborations in the various ?elds of computer s- ence to solve these problems linked with other sciences and techniques is clearly recognized. Moreover, the collaborative work to bridge the formal theory and practical applications becomes increasingly important and useful. In this context, and since France and Japan have strong academic and ind- trial backgrounds in the theory and practice of the scienti?c challenges set by this digitized world, in 2005 we started a formal French-Japanese collaboration and workshop series on computer security. The three ?rst editions of these French-Japanese Computer Security wo- shops in Tokyo, September 5-7, 2005 and December 4-5, 2006 and in Nancy, March 13-14, 2008 were very fruitful and were accompanied by several imp- tant research exchanges between France and Japan. Because of this success, we launched a call for papers dedicated to computer security from it's foundation to practice, with the goal of gathering together ?nal versions of the rich set of papers and ideas presented at the workshops, yet opening the call to everyone interested in contributing in this context. This v- ume presents the selection of papers arising from this call and this international collaboration.

Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings... Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings (Paperback, 1st ed. 2019)
Robert Krimmer, Melanie Volkamer, Veronique Cortier, Bernhard Beckert, Ralf Kusters, …
R1,811 Discovery Miles 18 110 Ships in 10 - 15 working days

This book constitutes the proceedings of the 4th International Conference on Electronic Voting, E-Vote-ID 2019, held in Bregenz, Austria, in October 2019. The 13 revised full papers presented were carefully reviewed and selected from 45 submissions. The conference was organized in tracks on security, usability and technical issues, administrative, legal, political and social issues, elections and practical experiences, posters and e-voting system demo.

Formal Models and Techniques for Analyzing Security Protocols - A Tutorial (Paperback): Veronique Cortier, Steve Kremer Formal Models and Techniques for Analyzing Security Protocols - A Tutorial (Paperback)
Veronique Cortier, Steve Kremer
R2,140 Discovery Miles 21 400 Ships in 10 - 15 working days

Security protocols are distributed programs that are aimed at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking, and more recently electronic elections. Given the financial and societal impact in case of failure and the long history of design flaws in such protocols, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the presence of an arbitrary adversary. Formal Models and Techniques for Analyzing Security Protocols provides the reader with a tutorial on some modern techniques to model and automatically analyze security protocols. Given the large body of work in this area, it does not aim to be exhaustive so the focus is on some selected methods and results. The tutorial can be used as a basis for a master or graduate course on the topic, or as a primer for researchers from different areas to get an overview of the kinds of techniques that are available.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Moon Bag [Black]
R57 Discovery Miles 570
Snappy Tritan Bottle (1.5L)(Coral)
R229 R180 Discovery Miles 1 800
Dig & Discover: Dinosaurs - Excavate 2…
Hinkler Pty Ltd Kit R304 R267 Discovery Miles 2 670
Bestway Hydro-Swim Squiggle Wiggle Dive…
R62 Discovery Miles 620
Kindle Wi-Fi 11th Gen 2022 eReader…
R3,399 R2,999 Discovery Miles 29 990
Tenet
John David Washington, Robert Pattinson Blu-ray disc  (1)
R54 Discovery Miles 540
Gloria
Sam Smith CD R407 Discovery Miles 4 070
Sony PlayStation 5 Pulse 3D Wireless…
R1,999 R1,899 Discovery Miles 18 990
Cable Guys Controller and Smartphone…
R399 R359 Discovery Miles 3 590
Butterfly A4 160gsm Board Pad - Syco…
R75 Discovery Miles 750

 

Partners