Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher der Reihe Security and Cryptology

Filter
Filter
Ordnen nachSortieren Reihenfolge der Serie
  • - 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers
     
    50,00 €

    This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Security for Information Technology and Communications, SECITC 2016, held in Bucharest, Romania, in June 2016. The 16 revised full papers were carefully reviewed and selected from 35 submissions.

  • - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings
     
    53,00 €

    This book constitutes the refereed proceedings of the 7th International Conference on Decision and Game Theory for Security, GameSec 2016, held in New York, NY, USA, in November 2016. The 18 revised full papers presented together with 8 short papers and 5 poster papers were carefully reviewed and selected from 40 submissions.

  • - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings
     
    49,98 €

    This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016. The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions.

  • - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings
     
    53,00 €

    This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017. The 25 papers presented in this volume were carefully reviewed and selected from 77 submissions. CT-RSA has become a major publication venue in cryptography.

  • - Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers
     
    50,00 €

    Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications. The book provides selected papers of the Second International Workshop on Enterprise Security held in Vancouver, Canada, November 30-December 3, 2016 in conjunction with CloudCom 2015.The 11 papers provide a comprehensive research into various areas of enterprise security such as protection of data, privacy and rights, data ownership, trust, unauthorized access and big data ownership, studies and analysis to reduce risks imposed by data leakage, hacking and challenges of Cloud forensics.

  • - 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings
     
    53,00 €

    This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions.

  • - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II
     
    49,00 €

    The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions.

  • - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II
     
    50,00 €

    The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. and cloud computing and security; Part III: cloud computing and security;

  • - 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings
     
    55,00 €

    This book constitutes the refereed proceedings of the 5th International Workshop on Visualization for Cyber Security held on September 15, 2008, in Cambridge, Massachusetts, USA, in conjunction with the 11th International Symposium on Recent Advances in Intrusion Detection (RAID).

  • - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
     
    55,00 €

    This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard,Germany.The objective of this second conference was to develop new security concepts for complex application scenarios based on systems like handhelds, phones, smartcards, RFID-chips andsmartlabelshandinhandwiththeemergingtechnologyofubiquitousandpervasive computing. In particular the conference focused on methods and technologies conce- ing the identi?cation of risks, the de?nition of security policies, and the development of security and privacy measures, especially cryptographic protocols that are related to speci?c aspects of ubiquitous and pervasive computing like mobility, location-based services,adhocnetworking,resourceallocation/restriction,invisibility,andsecureha- ware/software platforms. We received 48 submissions. Each submission was reviewed by three independent reviewers and an electronic Program Committee meeting was held via the Internet. We are very grateful to the Program Committee members for their ef?ciency in processing the work and also for the quality of their reviews and discussions. Finally the Program Committee decided to accept 14 long papers and 3 short papers. Apart from the Program Committee, we would like to thank also the other persons who contributed to the success of this conference: the additional referees for revi- ing the papers, the authors for submitting the papers, and the local organizers, and in particular Hans-Peter Wagner, for the local organization of the conference in Boppard. SPC 2005 was hosted by the Bundesakademie fur ¿ of ¿ fentlicheVerwaltung of the Federal Ministry of the Interior, and was sponsored by the DFKI and BSI.

  • - Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings
     
    55,00 €

    On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA).

  • - Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings
     
    55,00 €

    For these proceedings the papers have been divided into four main categories, namely: - Implementation of trusted computing - Attestation - PKI for trusted computing - Applications of trusted computing The 15 papers included here were selected from a total of 33 submissions.

  • - Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers
     
    49,00 €

    This book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on Privacy, Security, and Trust in KDD, PinKDD 2008, held in Las Vegas, NV, USA, in March 2008 in conjunction with the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008.

  • - 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers
     
    50,00 €

  • - Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings
     
    74,00 €

    This book constitutes the refereed proceedings of the Third International Conference on Pairing-Based Cryptography, Pairing 2009, held in Palo Alto, CA, USA, in August 2009.

  • - 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers
     
    50,00 €

    This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Digital Watermarking, IWDW 2008, held in Busan, Korea, in November 2008. information theoretic, stochastic aspects of data hiding; combination of data hiding and cryptography; reversible data hiding; data hiding in special media;

  • - Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings
     
    55,00 €

    This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The papers are organized in topical sections on encryption, digital signature, cryptographic protocols and reduction and privacy.

  • - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings
     
    48,00 €

    This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014.

  • - International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings
     
    49,00 €

    This book constitutes the refereed proceedings of the International Workshop on Biosurveillance and Biosecurity, BioSecure 2008, held in Raleigh, NC, USA, in December 2008. biosurveillance models and outbreak detection; environmental biosurveillance and case studies.

  • - First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings
     
    69,00 €

    The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, public-key cryptography, pseudorandomness, analysis of stream ciphers, hash functions, broadcast encryption, and implementation.

  • - Second International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October 3-5, 2007
     
    59,00 €

    This volume contains the post-proceedings of the Second International Workshop on Critical Information Infrastructure Security (CRITIS 2007), that was held during October 3-5, 2007 in Benalmadena-Costa (Malaga), Spain, and was hosted by the University of Malaga, Computer Science Department.

  • - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012, Proceedings
     
    49,00 €

    This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012.

  • - 14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedings
     
    63,00 €

    This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions.

  • - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings
     
    76,00 €

    This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The articles are organized in topical sections on security and data protection in real systems; security and privacy in mobile and wireless networks; encryption key and password security;

  • - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers
     
    50,00 €

  • - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings
     
    58,00 €

    This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013. The 15 revised full papers presented together with 6 short papers the abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions.

  • - The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedings
     
    50,00 €

    This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, in February 2014.

  • - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers
     
    50,00 €

    This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions.

  • - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings
     
    50,00 €

    This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.

  • - Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings
     
    50,00 €

    This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.