Utvidet returrett til 31. januar 2025

Bøker i Security and Cryptology-serien

Filter
Filter
Sorter etterSorter Serierekkefølge
  • - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers
     
    1 291,-

  • - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings
     
    759,-

    Thisbook constitutes the refereed proceedings of the Cryptographer''s Track at theRSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March2016.The26 papers presented in this volume were carefully reviewed and selected from 76submissions. The focus of the track is on following subjects: secure keyexchange schemes, authenticated encryption, searchable symmetric encryption,digital signatures with new functionality, secure multi party computation, howto verify procedures, side-channel attacks on elliptic curve cryptography, hardwareattacks and security, structure-preserving signatures, lattice cryptography, cryptanalysisof symmetric key encryption, message authentication code and PRF-security, and securityof public key encryption.

  • - 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers
     
    590,-

    This book constitutes the thoroughly refereedpost-conference proceedings of the 8th International Conference on Security forInformation Technology and Communications, SECITC 2015, held in Bucharest, Romania,in June 2015. The 17 revised full papers were carefully reviewed andselected from 36 submissions.

  • - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I
     
    648,-

    The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions.

  • - 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings
     
    655,-

    This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory and Practices, WISTP 2015, held in Heraklion, Crete, Greece, in August 2015.

  • - 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings
     
    590,-

    This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. trust and privacy issues in mobile environments; and privacy requirements and privacy audit.

  • - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
     
    655,-

    This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The papers provide the latest results in research, development and applications in the field of information security and cryptology.

  • - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings
     
    576,-

    This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions.

  • - Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings
     
    572,-

  • - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings
     
    648,-

    This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions.

  • - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings
     
    655,-

    This book constitutes the refereed proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016, held in Hyderabad, India, in December 2016. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering.

  • - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings
     
    648,-

    This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions.

  • - First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21-22, 2015 Revised Selected Papers
     
    655,-

    This book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First Workshop on the Security of Cyber Physical Systems, WOS-CPS 2015, held in Vienna, Austria, in September 2015 in conjunction with ESORICS 2015, the 20th annual European Symposium on Research in Computer Security.The 6 revised full papers and 2 short papers of CyberICS 2015 presented together with 3 revised full papers of WOS-CPS 2015 were carefully reviewed and selected from 28 initial submissions. CyberICS 2015 focuses on topics covering ICSs, including cyber protection and cyber defense of SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers, PLCs, and other industrial control system. WOS-CPS 2015 deals with the Security of Cyber Physical Systems, that exist everywhere around us, and range in size, complexity and criticality, from embedded systems used in smart vehicles, to SCADA systems in smart grids to control systems in water distribution systems, to smart transportation systems etc.  

  • - 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers
     
    576,-

    This book constitutesrevised selected papers from the 10th International Conference on CriticalInformation Infrastructures Security, CRITIS 2015, held in Berlin, Germany, inOctober 2015. They are organized in topical sections named: critical informationinfrastructure protection; critical infrastructure resilience assessment;

  • - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings
     
    648,-

    This bookconstitutes the thoroughly refereed proceedings of the 8th International Conference on theTheory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2016,held in Fes, Morooco, in April 2016. The 18papers presented in this book were carefully reviewed and selected from 65submissions.

  • - Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers
     
    648,-

    This book constitutes the thoroughly refereedpost-conference proceedings of the Third Annual Privacy Forum, APF 2015, heldin Luxembourg, Luxembourg, in October 2015. The 11 revised full papers presented in this volume werecarefully reviewed and selected from 24 submissions.

  • - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings
     
    561,-

  • - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings
     
    655,-

    This bookconstitutes the refereed proceedings of the 16th International Conference onCryptology in India, INDOCRYPT 2015, held in Bangalore, India, in December 2015.The 19 revised full papers presented in this book were carefully reviewed andselected from 60 submissions. The papers are organized in topical sections on publickey encryption;

  • - 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings
     
    590,-

    Thisbook constitutes the proceedings of the 20th Nordic Conference on Secure ITSystems, held in Stockholm, Sweden, in October 2015. The11 full papers presented together with 5 short papers in this volume werecarefully reviewed and selected from 38 submissions.

  • - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
     
    655,-

    The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions.

  • - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings
     
    759,-

    This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015.

  • - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings
     
    648,-

    This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017. The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy.

  • - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers
     
    664,-

    This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017.The 39 full papers presented were carefully reviewed and selected from 96 submissions. They feature the outcome of the 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, the 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, the Second Workshop on Secure Voting Systems, VOTING 2017, the First Workshop on Trusted Smart Contracts, WTSC 2017, and the First Workshop on Targeted Attacks, TA 2017.The papers are grouped in topical sections named: encrypted computing and applied homomorphic cryptography; bitcoin and blockchain research; advances in secure electronic voting schemes; trusted smart contracts; targeted attacks.

  • - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings
     
    655,-

    This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing;

  • - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings
     
    655,-

    This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017. software security and risk management;

  • - 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings
     
    655,-

    They are organized in the following topics: software security, intrusion detection, systems security, android security, cybercrime, cloud security, network security.

  • - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers
     
    648,-

    This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions.

  • - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings
     
    655,-

    This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. malware analysis;

  • - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I
     
    655,-

    The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017.

  • - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II
     
    1 175,-

    The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. obfuscation and functional encryption; provable security for symmetric cryptography;

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.