0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (8)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 10 of 10 matches in All Departments

Security and Privacy for Next-Generation Wireless Networks (Hardcover, 1st ed. 2019): Sheng Zhong, Hong Zhong, Xinyi Huang,... Security and Privacy for Next-Generation Wireless Networks (Hardcover, 1st ed. 2019)
Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, …
R2,791 Discovery Miles 27 910 Ships in 10 - 15 working days

This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techniques in different emerging networks from the interconnection view of human and cyber-physical world. This book includes 7 chapters from prominent international researchers working in this subject area. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless security and privacy related issues Recent advances in wireless communication technologies have enabled the large-scale deployment of next-generation wireless networks, and many other wireless applications are emerging. The next generation of mobile networks continues to transform the way people communicate and access information. As a matter of fact, next-generation emerging networks are exploiting their numerous applications in both military and civil fields. For most applications, it is important to guarantee high security of the deployed network in order to defend against attacks from adversaries, as well as the privacy intrusion. The key target in the development of next-generation wireless networks is to promote the integration of the human, cyber, and physical worlds. Previous work in Cyber Physical Systems (CPS) considered the connection between the cyber world and the physical world. In the recent studies, human involvement brings new channels and initiatives in this interconnection. In this integration process, security and privacy are critical issues to many wireless network applications, and it is a paramount concern for the growth of next-generation wireless networks. This is due to the open nature of wireless communication and the involvement of humans. New opportunities for tackling these security and privacy issues in next-generation wireless networks will be achieved by leveraging the properties of interaction among human, computers and things.

Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014,... Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings (Paperback, 2014 ed.)
Xinyi Huang, Jianying Zhou
R3,116 Discovery Miles 31 160 Ships in 10 - 15 working days

This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.

Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings (Paperback,... Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings (Paperback, 2013 ed.)
Javier Lopez, Xinyi Huang, Ravi Sandhu
R1,621 Discovery Miles 16 210 Ships in 10 - 15 working days

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).

Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October... Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings (Paperback, 1st ed. 2022)
Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski
R1,494 Discovery Miles 14 940 Ships in 10 - 15 working days

This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022. The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field's foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications.

Applied Cryptography in Computer and Communications - First EAI International Conference, AC3 2021, Virtual Event, May 15-16,... Applied Cryptography in Computer and Communications - First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings (Paperback, 1st ed. 2021)
Bo Chen, Xinyi Huang
R2,169 Discovery Miles 21 690 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the First International Conference on Applied Cryptography in Computer and Communications, AC3 2021, and the First International Workshop on Security for Internet of Things (IoT). The conference was held in May 2021 and due to COVID-19 pandemic virtually.The 15 revised full papers were carefully reviewed and selected from 42 submissions. The papers present are grouped in 4 tracks on blockchain; authentication; secure computation; practical crypto application. They detail technical aspects of applied cryptography, including symmetric cryptography, public-key cryptography, cryptographic protocols, cryptographic implementations, cryptographic standards and practices.

Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings... Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings (Paperback, 1st ed. 2019)
Joseph K. Liu, Xinyi Huang
R1,602 Discovery Miles 16 020 Ships in 10 - 15 working days

This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.

Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings... Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings (Paperback, 1st ed. 2019)
Yi Mu, Robert H. Deng, Xinyi Huang
R1,545 Discovery Miles 15 450 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security, CANS 2019, held in Fuzhou, China, in October 2019. The 21 full papers and 8 short papers were carefully reviewed and selected from 55 submissions. The papers focus on topics such as homomorphic encryption; SIKE and Hash; lattice and post-quantum cryptography; searchable encryption; blockchains, cloud security; secret sharing and interval test, LWE; encryption, data aggregation, and revocation; and signature, ML, payment, and factorization.

Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018,... Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Fuchun Guo, Xinyi Huang, Moti Yung
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018. The 31 full papers presented together with 5 short papers and 1 invited paper were carefully reviewed and selected from 93 submissions. The papers cover topics in the field of blockchain and crypto currency; lattice-based cryptology; symmetric cryptology; applied cryptography; information security; assymetric encryption; and foundations.

Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings... Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings (Paperback, 1st ed. 2016)
Xinyi Huang, Yang Xiang, Kuan-Ching Li
R2,370 Discovery Miles 23 700 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Grid and Pervasive Computing, GPC 2016, held in Seoul, Korea, in May 2016. The 20 revised papers were carefully reviewed and selected from 94 submissions. The conference contains various aspects including green computing, cloud computing, virtualisation, data and storage, and network security.

Machine Learning for Cyber Security - Second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019,... Machine Learning for Cyber Security - Second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings (Paperback, 1st ed. 2019)
Xiaofeng Chen, Xinyi Huang, Jun Zhang
R1,504 Discovery Miles 15 040 Ships in 10 - 15 working days

This book constitutes the proceedings of the Second International Conference on Machine Learning for Cyber Security, ML4CS 2019, held in Xi'an, China in September 2019. The 23 revised full papers and 3 short papers presented were carefully reviewed and selected from 70 submissions. The papers detail all aspects of machine learning in network infrastructure security, in network security detections and in application software security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ab Wheel
R209 R149 Discovery Miles 1 490
Cable Guy Ikon "Light Up" PlayStation…
R599 R549 Discovery Miles 5 490
Multi-Functional Bamboo Standing Laptop…
R1,399 R669 Discovery Miles 6 690
Bostik Double-Sided Tape (18mm x 10m…
 (1)
R31 Discovery Miles 310
Cadac Pizza Stone (33cm)
 (18)
R398 Discovery Miles 3 980
Discovering Daniel - Finding Our Hope In…
Amir Tsarfati, Rick Yohn Paperback R280 R210 Discovery Miles 2 100
Bostik Clear Gel (25ml)
R40 R23 Discovery Miles 230
The Faraway Tree Adventures - 10-Book…
Enid Blyton Paperback R1,050 R923 Discovery Miles 9 230
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840

 

Partners