0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings... Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings (Paperback, 1st ed. 2018)
Robert Krimmer, Melanie Volkamer, Veronique Cortier, Rajeev Gore, Manik Hapsara, …
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018. The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers deal with topics connected with electronic voting including experiences and revisions of the real uses of E-voting systems and corresponding processes in elections.

Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration (Paperback, 2009 ed.): Veronique... Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration (Paperback, 2009 ed.)
Veronique Cortier, Claude Kirchner, Mitsuhiro Okada, Hideki Sakurada
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

The security issues set by the global digitization of our society have had, and will continue to have, a crucial impact at all levels of our social organization, including, just to mention a few, privacy, economics, environmental policies, national sovereignty, medical environments. The importance of the collaborations in the various ?elds of computer s- ence to solve these problems linked with other sciences and techniques is clearly recognized. Moreover, the collaborative work to bridge the formal theory and practical applications becomes increasingly important and useful. In this context, and since France and Japan have strong academic and ind- trial backgrounds in the theory and practice of the scienti?c challenges set by this digitized world, in 2005 we started a formal French-Japanese collaboration and workshop series on computer security. The three ?rst editions of these French-Japanese Computer Security wo- shops in Tokyo, September 5-7, 2005 and December 4-5, 2006 and in Nancy, March 13-14, 2008 were very fruitful and were accompanied by several imp- tant research exchanges between France and Japan. Because of this success, we launched a call for papers dedicated to computer security from it's foundation to practice, with the goal of gathering together ?nal versions of the rich set of papers and ideas presented at the workshops, yet opening the call to everyone interested in contributing in this context. This v- ume presents the selection of papers arising from this call and this international collaboration.

Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings... Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings (Paperback, 1st ed. 2019)
Robert Krimmer, Melanie Volkamer, Veronique Cortier, Bernhard Beckert, Ralf Kusters, …
R1,811 Discovery Miles 18 110 Ships in 10 - 15 working days

This book constitutes the proceedings of the 4th International Conference on Electronic Voting, E-Vote-ID 2019, held in Bregenz, Austria, in October 2019. The 13 revised full papers presented were carefully reviewed and selected from 45 submissions. The conference was organized in tracks on security, usability and technical issues, administrative, legal, political and social issues, elections and practical experiences, posters and e-voting system demo.

Formal Models and Techniques for Analyzing Security Protocols - A Tutorial (Paperback): Veronique Cortier, Steve Kremer Formal Models and Techniques for Analyzing Security Protocols - A Tutorial (Paperback)
Veronique Cortier, Steve Kremer
R2,140 Discovery Miles 21 400 Ships in 10 - 15 working days

Security protocols are distributed programs that are aimed at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking, and more recently electronic elections. Given the financial and societal impact in case of failure and the long history of design flaws in such protocols, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the presence of an arbitrary adversary. Formal Models and Techniques for Analyzing Security Protocols provides the reader with a tutorial on some modern techniques to model and automatically analyze security protocols. Given the large body of work in this area, it does not aim to be exhaustive so the focus is on some selected methods and results. The tutorial can be used as a basis for a master or graduate course on the topic, or as a primer for researchers from different areas to get an overview of the kinds of techniques that are available.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Professor Snape Wizard Wand - In…
 (8)
R832 Discovery Miles 8 320
Philips TAUE101 Wired In-Ear Headphones…
R124 Discovery Miles 1 240
Mellerware Non-Stick Vapour ll Steam…
R348 Discovery Miles 3 480
Eight Days In July - Inside The Zuma…
Qaanitah Hunter, Kaveel Singh, … Paperback  (1)
R340 R292 Discovery Miles 2 920
Dromex 3-Ply Medical Mask (Box of 50)
 (17)
R1,099 R399 Discovery Miles 3 990
Bossi Men's Briefcase Black
R799 R585 Discovery Miles 5 850
Too Beautiful To Break
Tessa Bailey Paperback R280 R224 Discovery Miles 2 240
Complete Snack-A-Chew Iced Dog Biscuits…
R114 Discovery Miles 1 140
Book Club 2 - The Next Chapter
Diane Keaton, Jane Fonda, … DVD R199 R49 Discovery Miles 490
Not available

 

Partners