Markedets billigste bøger
Levering: 1 - 2 hverdage

Bøger i Security and Cryptology serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • - 14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedings
     
    601,95 kr.

    This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions.

  • - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings
     
    630,95 kr.

    This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The articles are organized in topical sections on security and data protection in real systems; security and privacy in mobile and wireless networks; encryption key and password security;

  • - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers
     
    604,95 kr.

  • - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings
     
    580,95 kr.

    This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013. The 15 revised full papers presented together with 6 short papers the abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions.

  • - The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedings
     
    1.000,95 kr.

    This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, in February 2014.

  • - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers
     
    785,95 kr.

    This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions.

  • - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings
     
    775,95 kr.

    This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.

  • - Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings
     
    653,95 kr.

    This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining.

  • - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers
     
    1.089,95 kr.

    The papers are organized in topical sections on block ciphers, lightweight block ciphers, tweakable block ciphers, stream ciphers, hash functions, message authentication codes, provable security, implementation aspects, lightweight authenticated encryption, automated cryptanalysis, Boolean functions.

  • - 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009, Proceedings
     
    585,95 kr.

    On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 12th International Symposium on Recent Advances in Intrusion Detection systems (RAID 2009),which took place in Saint-Malo,France, during September 23-25.

  • - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers
     
    579,95 kr.

  • - 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008
     
    601,95 kr.

    This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008.

  • - FOSAD 2008/2009 Tutorial Lectures
     
    530,95 kr.

    This book presents tutorial lectures from three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009. Topics include cryptographic protocol analysis, identity management and electronic voting, and wireless security.

  • - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II
     
    579,95 kr.

    The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions.

  • - 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II
     
    1.068,95 kr.

    The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions.

  • - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers
     
    867,95 kr.

    This book constitutes the post-conference proceedings of the 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016, held in Paris, France, in October 2016. The 22 full papers and 8 short papers presented were carefully reviewed and selected from 58 submissions.

  • - 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings
     
    833,95 kr.

  • - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings
     
    560,95 kr.

    This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. physical layer security; network coding security;

  • - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers
     
    591,95 kr.

  • - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings
     
    925,95 kr.

    This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017.

  • - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I
     
    579,95 kr.

    The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018. The 49 revised papers presented were carefully reviewed and selected from 186 submissions.

  • - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II
     
    1.478,95 kr.

    The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography.

  • - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers
     
    888,95 kr.

    This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions.

  • - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings
     
    865,95 kr.

    This book constitutes the refereed proceedings of the 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018, held in Marrakesh, Morocco, in May 2018. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent.

  • - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings
     
    734,95 kr.

    This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions.

  • - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings
     
    1.159,95 kr.

    This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions.

  • - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings
     
    567,95 kr.

    This book constitutes the refereed proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2018, held in Regensburg, Germany, in September 2018 in conjunction with DEXA 2018. The 15 revised full papers presented were carefully reviewed and selected from 29 submissions.

  • - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings
     
    1.051,95 kr.

    This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. machine learning for computer security;

  • - 14th International Workshop, STM 2018, Barcelona, Spain, September 6-7, 2018, Proceedings
     
    563,95 kr.

    This book constitutes the proceedings of the 14th International Workshop on Security and Trust Management, STM 2018, held in Barcelona, Spain, in September 2018, and co-located with the 23rd European Symposium Research in Computer Security, ESORICS 2018. The focus of the workshop was on the following topics: cryptosystems and applied cryptography;

  • - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings
     
    607,95 kr.

    security investments, and cyber insurance for dependable and secure systems; security and privacy of wireless and mobile communications, including user location privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy;

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.