Aikaterini Mitrokotsa - Böcker
Visar alla böcker från författaren Aikaterini Mitrokotsa. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
Del 10674 - Lecture Notes in Computer Science
Secure IT Systems
22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings
Häftad, Engelska, 2017
551 kr
Skickas inom 10-15 vardagar
This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017. The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy.
Privacy and Security Issues in Data Mining and Machine Learning
International ECML/PKDD Workshop, PSDML 2010, Barcelona, Spain, September 24, 2010. Revised Selected Papers
Häftad, Engelska, 2011
551 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, PSDML 2010, held in Barcelona, Spain, in September 2010.The 11 revised full papers presented were carefully reviewed and selected from 21 submissions. The papers range from data privacy to security applications, focusing on detecting malicious behavior incomputer systems.
Progress in Cryptology -- AFRICACRYPT 2012
5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings
Häftad, Engelska, 2012
551 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.