0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (10)
  • R2,500 - R5,000 (8)
  • -
Status
Brand

Showing 1 - 18 of 18 matches in All Departments

Introduction to Security Reduction (Hardcover, 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Hardcover, 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R4,852 Discovery Miles 48 520 Ships in 12 - 17 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

Cyber Security Meets Machine Learning (Hardcover, 1st ed. 2021): Xiaofeng Chen, Willy Susilo, Elisa Bertino Cyber Security Meets Machine Learning (Hardcover, 1st ed. 2021)
Xiaofeng Chen, Willy Susilo, Elisa Bertino
R3,615 Discovery Miles 36 150 Ships in 12 - 17 working days

Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.

Advances in Cyber Security: Principles, Techniques, and Applications (Hardcover, 1st ed. 2019): Kuan-Ching Li, Xiaofeng Chen,... Advances in Cyber Security: Principles, Techniques, and Applications (Hardcover, 1st ed. 2019)
Kuan-Ching Li, Xiaofeng Chen, Willy Susilo
R4,493 Discovery Miles 44 930 Ships in 10 - 15 working days

This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes. Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.

Introduction to Security Reduction (Paperback, Softcover reprint of the original 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Paperback, Softcover reprint of the original 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R4,468 Discovery Miles 44 680 Ships in 10 - 15 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

Provable Security - 12th International Conference, ProvSec 2018,  Jeju, South Korea, October 25-28, 2018, Proceedings... Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings (Paperback, 1st ed. 2018)
Joonsang Baek, Willy Susilo, Jong-Kil Kim
R1,510 Discovery Miles 15 100 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications.

Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018,... Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings (Paperback, 1st ed. 2018)
Willy Susilo, Guomin Yang
R2,951 Discovery Miles 29 510 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.

Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014.... Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings (Paperback, 2014 ed.)
Willy Susilo, Yi Mu
R2,795 Discovery Miles 27 950 Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.

Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings (Paperback,... Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings (Paperback, 2013 ed.)
Willy Susilo, Reza Reyhanitabar
R1,488 Discovery Miles 14 880 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.

Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012.... Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings (Paperback, 2012 ed.)
Willy Susilo, Yi Mu, Jennifer Seberry
R1,520 Discovery Miles 15 200 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.

Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings... Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings (Paperback, 2008 ed.)
Yi Mu, Willy Susilo, Jennifer Seberry
R1,528 Discovery Miles 15 280 Ships in 10 - 15 working days

The 13th Australasian Conference on Information Security and Privacy (ACISP 2008) was held at Wollongong, Australia, during July 7-9, 2008. The conference was sponsored by the Centre for Computer and Information Security of the University of Wollongong and the ResearchNetwork for a Secure Australia. The submission and review process was run using the iChair software, written by Thomas Baigneres and Matthieu Finiasz from EPFL, LASEC, Switzerland. We would like to thank them for letting us use their iChair software. The conferencereceived111submissions, out ofwhich the ProgramComm- tee selected 33 papers for presentation at the conference after a rigorous review process.Thesepapersareincludedintheproceedings.Theacceptedpaperscover a range of topics in information security, including authentication, key m- agement, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security. Theconferenceproceedingscontainrevisedversionsoftheselectedpapers.Since some of them were not checked again for correctness before publication, the - thors bear full responsibility for the contents of their papers. We would like to thank the authors of all papers for submitting their papers to the conference. In addition to the contributed papers, the program comprised three invited talks. The invited speakers were Xavier Boyen (Voltage, USA), Josef Pieprzyk (Macquarie University, Australia) and Nigel Phair (Australian High Tech Crime Centre). We would like to express our thanks to them.

Information Security Practice and Experience - 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008... Information Security Practice and Experience - 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings (Paperback, 2008 ed.)
Liqun Chen, Yi Mu, Willy Susilo
R1,512 Discovery Miles 15 120 Ships in 10 - 15 working days

The4thInformationSecurityPracticeandExperienceConference(ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, Australia, during April 21-23, 2008. The previous three conferences were held in Singapore in 2005, Hangzhou, China in 2006 and Hong Kong, China in 2007. As with the previous three conference proceedings, the proceedings of ISPEC 2008 were published in the LNCS series by Springer. Theconferencereceived95submissions, outofwhichtheProgramCommittee selected 29 papers for presentation at the conference. These papers are included in the proceedings. The accepted papers cover a range of topics in mathem- ics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve-basedsecuritypractice, securitycomputationandso forth.The conference proceedings contain revised versions of the selected papers. Since some of them were not checked again for correctness before publication, the authors (and not the ProgramCommittee)bear full responsibilityfor the contentsoftheir papers. In addition to the contributed papers, the program comprised two invited talks.TheinvitedspeakerswereVijayVaradharajan(MacquarieUniversity, A- tralia) and Robert Huijie Deng (Singapore Management University, Singapore). Special thanks are due to these speakers. Wewouldliketothankallthepeoplewhohelpedwiththeconferenceprogram and organization. First, we thank the Steering Committee for their guidance on the general format of the conference. We also heartily thank the Program Committee and the sub-reviewers listed on the following pages for their hard e?orts and time contributed to the review process, which took seven weeks. Each paper was carefully evaluated by at least two or three people. There was signi?cant online discussion about a large number of pape

Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings... Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings (Paperback, 2007 ed.)
Willy Susilo, Joseph K. Liu, Yi Mu
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007.

The 10 revised full papers presented together with 7 short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.

Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022,... Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings (Paperback, 1st ed. 2022)
Khoa Nguyen, Guomin Yang, Fuchun Guo, Willy Susilo
R2,624 Discovery Miles 26 240 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings (Paperback,... Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings (Paperback, 1st ed. 2022)
Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan
R2,379 Discovery Miles 23 790 Ships in 10 - 15 working days

This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022. The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.

Cyber Security Meets Machine Learning (Paperback, 1st ed. 2021): Xiaofeng Chen, Willy Susilo, Elisa Bertino Cyber Security Meets Machine Learning (Paperback, 1st ed. 2021)
Xiaofeng Chen, Willy Susilo, Elisa Bertino
R2,754 Discovery Miles 27 540 Ships in 10 - 15 working days

Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.

Cyberspace Safety and Security - 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings... Cyberspace Safety and Security - 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings (Paperback, 1st ed. 2022)
Xiaofeng Chen, Jian Shen, Willy Susilo
R1,497 Discovery Miles 14 970 Ships in 10 - 15 working days

This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi'an, China, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104 initial submissions. The papers focus on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.

Information Security - 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings (Paperback,... Information Security - 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings (Paperback, 1st ed. 2021)
Joseph K. Liu, Sokratis Katsikas, Weizhi Meng, Willy Susilo, Rolly Intan
R2,229 Discovery Miles 22 290 Ships in 10 - 15 working days

This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security.

Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings (Paperback,... Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings (Paperback, 1st ed. 2020)
Willy Susilo, Robert H. Deng, Fuchun Guo, Yannan Li, Rolly Intan
R1,512 Discovery Miles 15 120 Ships in 10 - 15 working days

This book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020. The 23 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers cover topics of research in theory and applications of information security, such as Security and privacy and Network security as well.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Hunger Games 4 Book Paperback Box…
Suzanne Collins Paperback R818 Discovery Miles 8 180
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Tenet
John David Washington, Robert Pattinson, … DVD  (1)
R51 Discovery Miles 510
Vital BabyŽ NURTURE™ Protect & Care…
R123 R95 Discovery Miles 950
Speck Koi Filter Medium (3 X 5mm)(40kg)
R772 Discovery Miles 7 720
Lucky Metal Cut Throat Razer Carrier
R30 R18 Discovery Miles 180
Genie Blue Light Blocking Glasses…
R399 R299 Discovery Miles 2 990
Ron's Gone Wrong
DVD  (2)
R33 Discovery Miles 330
Zap! Kawaii Rock Painting Kit
Kit R250 R119 Discovery Miles 1 190

 

Partners