|
Showing 1 - 10 of
10 matches in All Departments
This book constitutes the proceedings of the 10th International
Conference on Information Security Practice and Experience, ISPEC
2014, held in Fuzhou, China, in May 2014. The 36 papers presented
in this volume were carefully reviewed and selected from 158
submissions. In addition the book contains 5 invited papers. The
regular papers are organized in topical sections named: network
security; system security; security practice; security protocols;
cloud security; digital signature; encryption and key agreement and
theory.
|
Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings (Paperback, 2013 ed.)
Javier Lopez, Xinyi Huang, Ravi Sandhu
|
R1,721
Discovery Miles 17 210
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 7th International
Conference on Network and System Security, NSS 2013, held in
Madrid, Spain, in June 2013. The 41 full papers presented were
carefully reviewed and selected from 176 submissions. The volume
also includes 7 short papers and 13 industrial track papers. The
paper are organized in topical sections on network security
(including: modeling and evaluation; security protocols and
practice; network attacks and defense) and system security
(including: malware and intrusions; applications security; security
algorithms and systems; cryptographic algorithms; privacy; key
agreement and distribution).
|
Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings (Paperback, 1st ed. 2022)
Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski
|
R1,584
Discovery Miles 15 840
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 8th International
Symposium on Security and Privacy in Social Networks and Big Data,
SocialSec 2022, which took place in Xi'an, China, in October 2022.
The 23 papers presented in this volume were carefully reviewed and
selected from 103 submissions. The papers were evaluated on the
basis of their significance, novelty, technical quality, as well as
on their practical impact or their level of advancement of the
field's foundations. They were organized in topical sections as
follows: Cryptography and its applications; Network security and
privacy protection; Data detection; Blockchain and its
applications.
This book constitutes the refereed post-conference proceedings of
the First International Conference on Applied Cryptography in
Computer and Communications, AC3 2021, and the First International
Workshop on Security for Internet of Things (IoT). The conference
was held in May 2021 and due to COVID-19 pandemic virtually.The 15
revised full papers were carefully reviewed and selected from 42
submissions. The papers present are grouped in 4 tracks on
blockchain; authentication; secure computation; practical crypto
application. They detail technical aspects of applied cryptography,
including symmetric cryptography, public-key cryptography,
cryptographic protocols, cryptographic implementations,
cryptographic standards and practices.
This book constitutes the proceedings of the 13th International
Conference on Network and System Security, NSS 2019, held in
Sapporo, Japan, in December 2019. The 36 full papers and 7 short
papers presented together with 4 invited papers in this book were
carefully reviewed and selected from 89 initial submissions. The
papers cover a wide range of topics in the field, including
authentication, access control, availability, integrity, privacy,
confidentiality, dependability and sustainability of computer
networks and systems.
|
Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings (Paperback, 1st ed. 2019)
Yi Mu, Robert H. Deng, Xinyi Huang
|
R1,639
Discovery Miles 16 390
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 18th
International Conference on Cryptology and Network Security, CANS
2019, held in Fuzhou, China, in October 2019. The 21 full papers
and 8 short papers were carefully reviewed and selected from 55
submissions. The papers focus on topics such as homomorphic
encryption; SIKE and Hash; lattice and post-quantum cryptography;
searchable encryption; blockchains, cloud security; secret sharing
and interval test, LWE; encryption, data aggregation, and
revocation; and signature, ML, payment, and factorization.
|
Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Fuchun Guo, Xinyi Huang, Moti Yung
|
R1,681
Discovery Miles 16 810
|
Ships in 10 - 15 working days
|
This book constitutes the post-conference proceedings of the 14th
International Conference on Information Security and Cryptology,
Inscrypt 2018, held in Fuzhou, China, in December 2018. The 31 full
papers presented together with 5 short papers and 1 invited paper
were carefully reviewed and selected from 93 submissions. The
papers cover topics in the field of blockchain and crypto currency;
lattice-based cryptology; symmetric cryptology; applied
cryptography; information security; assymetric encryption; and
foundations.
This timely book provides broad coverage of security and privacy
issues in the macro and micro perspective. In macroperspective, the
system and algorithm fundamentals of next-generation wireless
networks are discussed. In micro-perspective, this book focuses on
the key secure and privacy techniques in different emerging
networks from the interconnection view of human and cyber-physical
world. This book includes 7 chapters from prominent international
researchers working in this subject area. This book serves as a
useful reference for researchers, graduate students, and
practitioners seeking solutions to wireless security and privacy
related issues Recent advances in wireless communication
technologies have enabled the large-scale deployment of
next-generation wireless networks, and many other wireless
applications are emerging. The next generation of mobile networks
continues to transform the way people communicate and access
information. As a matter of fact, next-generation emerging networks
are exploiting their numerous applications in both military and
civil fields. For most applications, it is important to guarantee
high security of the deployed network in order to defend against
attacks from adversaries, as well as the privacy intrusion. The key
target in the development of next-generation wireless networks is
to promote the integration of the human, cyber, and physical
worlds. Previous work in Cyber Physical Systems (CPS) considered
the connection between the cyber world and the physical world. In
the recent studies, human involvement brings new channels and
initiatives in this interconnection. In this integration process,
security and privacy are critical issues to many wireless network
applications, and it is a paramount concern for the growth of
next-generation wireless networks. This is due to the open nature
of wireless communication and the involvement of humans. New
opportunities for tackling these security and privacy issues in
next-generation wireless networks will be achieved by leveraging
the properties of interaction among human, computers and things.
|
Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings (Paperback, 1st ed. 2016)
Xinyi Huang, Yang Xiang, Kuan-Ching Li
|
R2,529
Discovery Miles 25 290
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 8th
International Conference on Grid and Pervasive Computing, GPC 2016,
held in Seoul, Korea, in May 2016. The 20 revised papers were
carefully reviewed and selected from 94 submissions. The conference
contains various aspects including green computing, cloud
computing, virtualisation, data and storage, and network security.
|
Machine Learning for Cyber Security - Second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings (Paperback, 1st ed. 2019)
Xiaofeng Chen, Xinyi Huang, Jun Zhang
|
R1,595
Discovery Miles 15 950
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the Second International
Conference on Machine Learning for Cyber Security, ML4CS 2019, held
in Xi'an, China in September 2019. The 23 revised full papers and 3
short papers presented were carefully reviewed and selected from 70
submissions. The papers detail all aspects of machine learning in
network infrastructure security, in network security detections and
in application software security.
|
You may like...
The Car
Arctic Monkeys
CD
R387
Discovery Miles 3 870
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|