De Aller-Bedste Bøger - over 12 mio. danske og engelske bøger
Levering: 1 - 2 hverdage

Bøger i Security and Cryptology serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II
     
    972,95 kr.

    The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017.

  • - 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings
     
    614,95 kr.

    Constitutes the refereed proceedings of the 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Application, CARDIS 2010, held in Passau, Germany, in April 2010.

  • - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010
     
    574,95 kr.

    Constitutes the refereed proceedings of the 6th International Conference on Information Systems Security, ICISS 2010, held in Gandhinagar, India, in December 2010.

  • - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings
     
    620,95 kr.

    This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019.

  • - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part III
     
    1.149,95 kr.

    The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.

  • - 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers
     
    581,95 kr.

    This book constitutes the carefully refereed and revised selected papers of the 5th Canada-France ETS Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012.

  • - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers
     
    888,95 kr.

    This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions.

  • - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings
     
    891,95 kr.

    The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security.

  • - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I
     
    1.104,95 kr.

    The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016.

  • - 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings
     
    581,95 kr.

    This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions.

  • - 16th International Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings
     
    572,95 kr.

    This book constitutes the refereed proceedings of the 16th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2019, held in Linz, Austria, in August 2019 in conjunction with DEXA 2019. The 11 full papers presented were carefully reviewed and selected from 24 submissions.

  • - 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers
     
    583,95 kr.

    This book constitutes the revised selected papers of the 12th International Symposium on Foundations and Practice of Security, FPS 2019, held in Toulouse, France, in November 2019.The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 50 submissions.

  • - Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers
     
    616,95 kr.

    This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2014, held in Istanbul, Turkey, in September 2014. The 10 full papers presented were carefully reviewed and selected from 24 submissions.

  • - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger
     
    898,95 kr.

    This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015.

  • - 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers
     
    1.097,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions.

  • - 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings
     
    871,95 kr.

    This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. provable security; secure protocol; systems security; and security in hardware.

  • - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings
     
    580,95 kr.

    This book constitutes the refereed proceedings of the 5thInternational Conference on Security, Privacy, and Applied CryptographyEngineering, SPACE 2015, held in Jaipur, India, in October 2015. The 17 full papers presented in this volume werecarefully reviewed and selected from 57 submissions.

  • - 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings
     
    1.107,95 kr.

    This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015. The 28 full papers were carefully reviewed and selected from 119 submissions.

  • - 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers
     
    619,95 kr.

  • - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings
     
    813,95 kr.

    This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015. and security analysis, risk management and usability.

  • - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings
     
    793,95 kr.

    This bookconstitutes the refereed proceedings of the Second International Conference onSecurity Standardisation Research, SSR 2015, held in Tokyo, Japan, in December2015. The 13papers presented in this volume were carefully reviewed and selected from 18submissions. analysis on cryptographic algorithm; andtrust and formal analysis.

  • - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings
     
    844,95 kr.

    This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience.

  • - 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings
     
    921,95 kr.

    This book constitutes the thoroughly refereedpost-conference proceedings of the 16th International Conference on InformationSecurity, ISC 2013, held in Dallas, Texas, in November 2013. The 16 revised full papers presented together with 14short papers were carefully reviewed and selected from 70 submissions.

  • - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers
     
    942,95 kr.

    Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereedpost-conference proceedings of the 6th International Conference on TrustedSystems, INTRUST 2014, held in Beijing, China, in December 2014.The conference brings together academic and industrialresearchers, designers, and implementers with end-users of trusted systems, inorder to foster the exchange of ideas in this challenging and fruitful area.The revised full papers focus on the theory, technologies and applications oftrusted systems and cover all aspects of trusted computing systems, includingtrusted modules, platforms, networks, services and applications, from theirfundamental features and functionalities to design principles, architecture andimplementation technologies.   /* Style Definitions */ table.MsoNormalTable{mso-style-name:"Table Normal";mso-tstyle-rowband-size:0;mso-tstyle-colband-size:0;mso-style-noshow:yes;mso-style-priority:99;mso-style-qformat:yes;mso-style-parent:"";mso-padding-alt:0in 5.4pt 0in 5.4pt;mso-para-margin:0in;mso-para-margin-bottom:.0001pt;mso-pagination:widow-orphan;font-size:11.0pt;font-family:"Calibri","sans-serif";mso-ascii-font-family:Calibri;mso-ascii-theme-font:minor-latin;mso-fareast-font-family:"Times New Roman";mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Times New Roman";mso-bidi-theme-font:minor-bidi;}

  • - Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers
     
    739,95 kr.

    This book contains revised selected papers fromthe Second International Conference on Cryptology and Information Security inthe Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented inthis volume were carefully reviewed and selected from 27 submissions.

  • - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings
     
    793,95 kr.

    Thisbook constitutes the refereed proceedings of the 7th International Workshop onPost-Quantum Cryptography, PQCrypto 2016, held in Fukuoka, Japan, in February2016. The 16 revised full papers presented were carefully reviewed and selectedfrom 42 submissions.

  • - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers
     
    982,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015. The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions.

  • - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers
     
    558,95 kr.

  • - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings
     
    793,95 kr.

    This book constitutes the refereed proceedings of the 8th International Symposium on Engineering Secure Software and Systems, ESSoS 2016, held in London, UK, in April 2016.

  • - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers
     
    594,95 kr.

    This bookcontains revised selected papers from the 22nd International Conference onSelected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada inAugust 2015. The 26 full papers and 3 short papers presented in this volume were carefullyreviewed and selected from 91 submissions. short papers;