Siu Ming Yiu - Böcker
Visar alla böcker från författaren Siu Ming Yiu. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
Del 11058 - Lecture Notes in Computer Science
Network and System Security
12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings
Häftad, Engelska, 2018
940 kr
Skickas inom 10-15 vardagar
This book constitutes the proceedings of the 12th International Conference on Network and System Security, NSS 2018, held in Hong Kong, China, in August 2018. The 26 revised full papers and 9 short papers presented in this book were carefully reviewed and selected from 88 initial submissions. The papers cover a wide range of topics in the field, including blockchain, mobile security, applied cryptography, authentication, biometrics, IoT, privacy, and education.
Del 8782 - Lecture Notes in Computer Science
Provable Security
8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
Häftad, Engelska, 2014
553 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.
Del 8783 - Lecture Notes in Computer Science
Information Security
17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings
Häftad, Engelska, 2014
553 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.