Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher der Reihe Security and Cryptology

Filter
Filter
Ordnen nachSortieren Reihenfolge der Serie
  • - 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings
     
    55,00 €

    Constitutes the refereed proceedings of the 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Application, CARDIS 2010, held in Passau, Germany, in April 2010.

  • - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings
     
    49,00 €

    This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019.

  • - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part III
     
    96,00 €

    The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.

  • - 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers
     
    50,00 €

    This book constitutes the carefully refereed and revised selected papers of the 5th Canada-France ETS Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012.

  • - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers
     
    50,00 €

    This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions.

  • - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings
     
    50,00 €

    The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security.

  • - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I
     
    95,00 €

    The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016.

  • - 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings
     
    50,00 €

    This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions.

  • - 16th International Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings
     
    49,00 €

    This book constitutes the refereed proceedings of the 16th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2019, held in Linz, Austria, in August 2019 in conjunction with DEXA 2019. The 11 full papers presented were carefully reviewed and selected from 24 submissions.

  • - 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers
     
    50,00 €

    This book constitutes the revised selected papers of the 12th International Symposium on Foundations and Practice of Security, FPS 2019, held in Toulouse, France, in November 2019.The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 50 submissions.

  • - Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers
     
    41,00 €

    This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2014, held in Istanbul, Turkey, in September 2014. The 10 full papers presented were carefully reviewed and selected from 24 submissions.

  • - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger
     
    50,00 €

    This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015.

  • - 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers
     
    60,00 €

    This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions.

  • - 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings
     
    50,00 €

    This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. provable security; secure protocol; systems security; and security in hardware.

  • - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings
     
    50,00 €

    This book constitutes the refereed proceedings of the 5thInternational Conference on Security, Privacy, and Applied CryptographyEngineering, SPACE 2015, held in Jaipur, India, in October 2015. The 17 full papers presented in this volume werecarefully reviewed and selected from 57 submissions.

  • - 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings
     
    67,00 €

    This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015. The 28 full papers were carefully reviewed and selected from 119 submissions.

  • - 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers
     
    41,00 €

  • - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings
     
    48,00 €

    This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015. and security analysis, risk management and usability.

  • - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings
     
    48,00 €

    This bookconstitutes the refereed proceedings of the Second International Conference onSecurity Standardisation Research, SSR 2015, held in Tokyo, Japan, in December2015. The 13papers presented in this volume were carefully reviewed and selected from 18submissions. analysis on cryptographic algorithm; andtrust and formal analysis.

  • - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings
     
    50,00 €

    This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience.

  • - 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings
     
    50,00 €

    This book constitutes the thoroughly refereedpost-conference proceedings of the 16th International Conference on InformationSecurity, ISC 2013, held in Dallas, Texas, in November 2013. The 16 revised full papers presented together with 14short papers were carefully reviewed and selected from 70 submissions.

  • - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers
     
    50,00 €

    Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereedpost-conference proceedings of the 6th International Conference on TrustedSystems, INTRUST 2014, held in Beijing, China, in December 2014.The conference brings together academic and industrialresearchers, designers, and implementers with end-users of trusted systems, inorder to foster the exchange of ideas in this challenging and fruitful area.The revised full papers focus on the theory, technologies and applications oftrusted systems and cover all aspects of trusted computing systems, includingtrusted modules, platforms, networks, services and applications, from theirfundamental features and functionalities to design principles, architecture andimplementation technologies.   /* Style Definitions */ table.MsoNormalTable{mso-style-name:"Table Normal";mso-tstyle-rowband-size:0;mso-tstyle-colband-size:0;mso-style-noshow:yes;mso-style-priority:99;mso-style-qformat:yes;mso-style-parent:"";mso-padding-alt:0in 5.4pt 0in 5.4pt;mso-para-margin:0in;mso-para-margin-bottom:.0001pt;mso-pagination:widow-orphan;font-size:11.0pt;font-family:"Calibri","sans-serif";mso-ascii-font-family:Calibri;mso-ascii-theme-font:minor-latin;mso-fareast-font-family:"Times New Roman";mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Times New Roman";mso-bidi-theme-font:minor-bidi;}

  • - Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers
     
    50,00 €

    This book contains revised selected papers fromthe Second International Conference on Cryptology and Information Security inthe Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented inthis volume were carefully reviewed and selected from 27 submissions.

  • - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings
     
    50,00 €

    Thisbook constitutes the refereed proceedings of the 7th International Workshop onPost-Quantum Cryptography, PQCrypto 2016, held in Fukuoka, Japan, in February2016. The 16 revised full papers presented were carefully reviewed and selectedfrom 42 submissions.

  • - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers
     
    53,00 €

    This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015. The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions.

  • - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers
     
    43,00 €

  • - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings
     
    50,00 €

    This book constitutes the refereed proceedings of the 8th International Symposium on Engineering Secure Software and Systems, ESSoS 2016, held in London, UK, in April 2016.

  • - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers
     
    60,00 €

    This bookcontains revised selected papers from the 22nd International Conference onSelected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada inAugust 2015. The 26 full papers and 3 short papers presented in this volume were carefullyreviewed and selected from 91 submissions. short papers;

  • - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings
     
    56,00 €

    This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. multi-party computation; outsourcing computation; two-party computation;

  • - 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
     
    50,00 €

    This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016.The 13 full papers together with 2 short papers were carefully reviewed and selected from 34 submissions. the focus on the workshop was on following topics: access control, data protection, mobile security, privacy, security and trust policies, trust models.  

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.