Vi bøger
Levering: 1 - 2 hverdage

Bøger i Security and Cryptology serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • - Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers
     
    645,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Information Theoretic Security, ICITS 2007, held in Madrid, Spain, in May 2007. There were one invited keynote speech and 3 invited talks to the conference.

  • - 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings
     
    1.135,95 kr.

    This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009. The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 109 submissions.

  • - 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings
     
    582,95 kr.

  • - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers
     
    719,95 kr.

    This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008.

  • - 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings
     
    597,95 kr.

    This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.

  • - 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings
     
    580,95 kr.

    Covers the proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India. This book includes such topics as access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, and operating system security.

  • - Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings
     
    645,95 kr.

    This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008.

  • - 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers
    af Seokhie Hong
    580,95 kr.

    Constitutes the proceedings of the 17th International Workshop on Fast Software Encryption, held in Seoul, Korea, in February 2010.

  • - 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers
     
    580,95 kr.

    ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Information Theoretic Security. Needless to say, information t- oretically secure cryptosystems are secure even if the factoring assumption or the discrete log assumption is broken.

  • - First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings
     
    696,95 kr.

    This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010. The 19 papers presented together with four invited talks were carefully reviewed and selected from 62 submissions.

  • - 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings
     
    1.115,95 kr.

    Constitutes the proceedings of the 15th European Symposium on Computer Security held in Athens, Greece in September 2010.

  • - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings
     
    580,95 kr.

    This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010. The 17 papers presented were carefully reviewed and selected from 47 submissions.

  • - 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers
     
    580,95 kr.

    IH 2010 was the 12th Information Hiding Conference, held in Calgary, Canada, June 28-30, 2010.

  • - 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers
     
    580,95 kr.

    Constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2009, held in Pisa, Italy, in September 2009.

  • - 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings
     
    592,95 kr.

    This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016.

  • - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings
     
    872,95 kr.

    The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.

  • - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers
     
    786,95 kr.

    This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions.

  • - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
     
    786,95 kr.

    This book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Workshop on Quantitative Aspects in Security Assurance, QASA 2016, held in Heraklion, Crete, Greece, in September 2016.

  • - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings
     
    769,95 kr.

    This book constitutes the thoroughly refereed conference proceedings of the First International Joint Conference on Electronic Voting, E-Vote-ID 2016, held in Bregenz, Austria, in October 2016. The 14 full papers presented were carefully reviewed and selected from 57 submissions.

  • - 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers
     
    1.103,95 kr.

    This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016. The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions.

  • - First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings
     
    980,95 kr.

    This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems;

  • - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers
     
    746,95 kr.

  • - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I
     
    1.157,95 kr.

    The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions.

  • - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III
     
    981,95 kr.

    The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions.

  • - FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers
     
    577,95 kr.

    This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010.

  • - 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18-19, 2019, Revised Selected Papers
     
    577,95 kr.

    This book constitutes the refereed and revised post-conference proceedings of the 7th International Workshop on Code-Based Cryptography, CBC 2019, held in Darmstadt, Germany, in May 2019. The eight papers presented in this book were carefully reviewed and selected from numerous submissions.

  • - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings
     
    583,95 kr.

  • - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers
     
    716,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011.

  • - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012, Proceedings
     
    603,95 kr.

    This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. efficient two-party and multi-party computation;

  • - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
     
    804,95 kr.

    This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.