0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings... Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings (Paperback, 1st ed. 2018)
Robert Krimmer, Melanie Volkamer, Veronique Cortier, Rajeev Gore, Manik Hapsara, …
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018. The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers deal with topics connected with electronic voting including experiences and revisions of the real uses of E-voting systems and corresponding processes in elections.

Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration (Paperback, 2009 ed.): Veronique... Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration (Paperback, 2009 ed.)
Veronique Cortier, Claude Kirchner, Mitsuhiro Okada, Hideki Sakurada
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

The security issues set by the global digitization of our society have had, and will continue to have, a crucial impact at all levels of our social organization, including, just to mention a few, privacy, economics, environmental policies, national sovereignty, medical environments. The importance of the collaborations in the various ?elds of computer s- ence to solve these problems linked with other sciences and techniques is clearly recognized. Moreover, the collaborative work to bridge the formal theory and practical applications becomes increasingly important and useful. In this context, and since France and Japan have strong academic and ind- trial backgrounds in the theory and practice of the scienti?c challenges set by this digitized world, in 2005 we started a formal French-Japanese collaboration and workshop series on computer security. The three ?rst editions of these French-Japanese Computer Security wo- shops in Tokyo, September 5-7, 2005 and December 4-5, 2006 and in Nancy, March 13-14, 2008 were very fruitful and were accompanied by several imp- tant research exchanges between France and Japan. Because of this success, we launched a call for papers dedicated to computer security from it's foundation to practice, with the goal of gathering together ?nal versions of the rich set of papers and ideas presented at the workshops, yet opening the call to everyone interested in contributing in this context. This v- ume presents the selection of papers arising from this call and this international collaboration.

Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings... Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings (Paperback, 1st ed. 2019)
Robert Krimmer, Melanie Volkamer, Veronique Cortier, Bernhard Beckert, Ralf Kusters, …
R1,709 Discovery Miles 17 090 Ships in 10 - 15 working days

This book constitutes the proceedings of the 4th International Conference on Electronic Voting, E-Vote-ID 2019, held in Bregenz, Austria, in October 2019. The 13 revised full papers presented were carefully reviewed and selected from 45 submissions. The conference was organized in tracks on security, usability and technical issues, administrative, legal, political and social issues, elections and practical experiences, posters and e-voting system demo.

Formal Models and Techniques for Analyzing Security Protocols - A Tutorial (Paperback): Veronique Cortier, Steve Kremer Formal Models and Techniques for Analyzing Security Protocols - A Tutorial (Paperback)
Veronique Cortier, Steve Kremer
R2,019 Discovery Miles 20 190 Ships in 10 - 15 working days

Security protocols are distributed programs that are aimed at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking, and more recently electronic elections. Given the financial and societal impact in case of failure and the long history of design flaws in such protocols, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the presence of an arbitrary adversary. Formal Models and Techniques for Analyzing Security Protocols provides the reader with a tutorial on some modern techniques to model and automatically analyze security protocols. Given the large body of work in this area, it does not aim to be exhaustive so the focus is on some selected methods and results. The tutorial can be used as a basis for a master or graduate course on the topic, or as a primer for researchers from different areas to get an overview of the kinds of techniques that are available.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Divine Rivals
Rebecca Ross Paperback R390 R312 Discovery Miles 3 120
Volmaan: Omnibus - Troetelgedrog / Tande…
Jaco Jacobs Paperback R220 R189 Discovery Miles 1 890
Long Way Down
Jason Reynolds Paperback  (1)
R271 R214 Discovery Miles 2 140
Kattemaai 2: Annabel Gaan Skool Toe
Betsie Vos Paperback R150 R129 Discovery Miles 1 290
Percy Jackson And The Olympians - The…
Rick Riordan Paperback R300 Discovery Miles 3 000
Shadow Chasers - Book 1: Powers Of The…
Bontle Senne Paperback  (1)
R85 R67 Discovery Miles 670
Arena 13
Joseph Delaney Paperback  (2)
R270 R221 Discovery Miles 2 210
Children Of The Stone City
Beverley Naidoo Paperback R240 R192 Discovery Miles 1 920
Blue Lily, Lily Blue - The Raven Cycle…
Maggie Stiefvater Paperback  (1)
R240 R99 Discovery Miles 990
Hartklop - Die Ontwaking Van Winter…
Sunel Combrinck Paperback R270 R232 Discovery Miles 2 320

 

Partners