0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (7)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 10 of 10 matches in All Departments

Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014,... Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings (Paperback, 2014 ed.)
Xinyi Huang, Jianying Zhou
R3,334 Discovery Miles 33 340 Ships in 10 - 15 working days

This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.

Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings (Paperback,... Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings (Paperback, 2013 ed.)
Javier Lopez, Xinyi Huang, Ravi Sandhu
R1,721 Discovery Miles 17 210 Ships in 10 - 15 working days

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).

Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October... Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings (Paperback, 1st ed. 2022)
Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022. The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field's foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications.

Applied Cryptography in Computer and Communications - First EAI International Conference, AC3 2021, Virtual Event, May 15-16,... Applied Cryptography in Computer and Communications - First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings (Paperback, 1st ed. 2021)
Bo Chen, Xinyi Huang
R2,300 Discovery Miles 23 000 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the First International Conference on Applied Cryptography in Computer and Communications, AC3 2021, and the First International Workshop on Security for Internet of Things (IoT). The conference was held in May 2021 and due to COVID-19 pandemic virtually.The 15 revised full papers were carefully reviewed and selected from 42 submissions. The papers present are grouped in 4 tracks on blockchain; authentication; secure computation; practical crypto application. They detail technical aspects of applied cryptography, including symmetric cryptography, public-key cryptography, cryptographic protocols, cryptographic implementations, cryptographic standards and practices.

Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings... Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings (Paperback, 1st ed. 2019)
Joseph K. Liu, Xinyi Huang
R1,700 Discovery Miles 17 000 Ships in 10 - 15 working days

This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.

Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings... Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings (Paperback, 1st ed. 2019)
Yi Mu, Robert H. Deng, Xinyi Huang
R1,639 Discovery Miles 16 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security, CANS 2019, held in Fuzhou, China, in October 2019. The 21 full papers and 8 short papers were carefully reviewed and selected from 55 submissions. The papers focus on topics such as homomorphic encryption; SIKE and Hash; lattice and post-quantum cryptography; searchable encryption; blockchains, cloud security; secret sharing and interval test, LWE; encryption, data aggregation, and revocation; and signature, ML, payment, and factorization.

Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018,... Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Fuchun Guo, Xinyi Huang, Moti Yung
R1,681 Discovery Miles 16 810 Ships in 10 - 15 working days

This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018. The 31 full papers presented together with 5 short papers and 1 invited paper were carefully reviewed and selected from 93 submissions. The papers cover topics in the field of blockchain and crypto currency; lattice-based cryptology; symmetric cryptology; applied cryptography; information security; assymetric encryption; and foundations.

Security and Privacy for Next-Generation Wireless Networks (Hardcover, 1st ed. 2019): Sheng Zhong, Hong Zhong, Xinyi Huang,... Security and Privacy for Next-Generation Wireless Networks (Hardcover, 1st ed. 2019)
Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, …
R2,960 Discovery Miles 29 600 Ships in 10 - 15 working days

This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techniques in different emerging networks from the interconnection view of human and cyber-physical world. This book includes 7 chapters from prominent international researchers working in this subject area. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless security and privacy related issues Recent advances in wireless communication technologies have enabled the large-scale deployment of next-generation wireless networks, and many other wireless applications are emerging. The next generation of mobile networks continues to transform the way people communicate and access information. As a matter of fact, next-generation emerging networks are exploiting their numerous applications in both military and civil fields. For most applications, it is important to guarantee high security of the deployed network in order to defend against attacks from adversaries, as well as the privacy intrusion. The key target in the development of next-generation wireless networks is to promote the integration of the human, cyber, and physical worlds. Previous work in Cyber Physical Systems (CPS) considered the connection between the cyber world and the physical world. In the recent studies, human involvement brings new channels and initiatives in this interconnection. In this integration process, security and privacy are critical issues to many wireless network applications, and it is a paramount concern for the growth of next-generation wireless networks. This is due to the open nature of wireless communication and the involvement of humans. New opportunities for tackling these security and privacy issues in next-generation wireless networks will be achieved by leveraging the properties of interaction among human, computers and things.

Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings... Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings (Paperback, 1st ed. 2016)
Xinyi Huang, Yang Xiang, Kuan-Ching Li
R2,529 Discovery Miles 25 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Grid and Pervasive Computing, GPC 2016, held in Seoul, Korea, in May 2016. The 20 revised papers were carefully reviewed and selected from 94 submissions. The conference contains various aspects including green computing, cloud computing, virtualisation, data and storage, and network security.

Machine Learning for Cyber Security - Second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019,... Machine Learning for Cyber Security - Second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings (Paperback, 1st ed. 2019)
Xiaofeng Chen, Xinyi Huang, Jun Zhang
R1,595 Discovery Miles 15 950 Ships in 10 - 15 working days

This book constitutes the proceedings of the Second International Conference on Machine Learning for Cyber Security, ML4CS 2019, held in Xi'an, China in September 2019. The 23 revised full papers and 3 short papers presented were carefully reviewed and selected from 70 submissions. The papers detail all aspects of machine learning in network infrastructure security, in network security detections and in application software security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Frozen - Blu-Ray + DVD
Blu-ray disc R344 Discovery Miles 3 440
Sterile Wound Dressing
R5 Discovery Miles 50
Lucky Define - Plastic 3 Head…
R397 Discovery Miles 3 970
Jumbo Jan van Haasteren Comic Jigsaw…
 (3)
R499 R249 Discovery Miles 2 490
Bostik Glue Stick - Loose (25g)
R31 Discovery Miles 310
Speak Now - Taylor's Version
Taylor Swift CD R527 Discovery Miles 5 270
Google Nest Audio Smart Speaker…
R3,499 R2,899 Discovery Miles 28 990
Nuovo All-In-One Car Seat (Black)
R3,599 R3,049 Discovery Miles 30 490
World Be Gone
Erasure CD R185 R112 Discovery Miles 1 120
Moon Bag [Black]
R57 Discovery Miles 570

 

Partners