Artificial Intelligence and Security in Computing Systems - 9th International Conference, ACS '2002 Miedzyzdroje, Poland October 23-25, 2002 Proceedings (Paperback, Softcover reprint of the original 1st ed. 2003)


Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. -Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems. -Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects).

R4,565

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles45650
Mobicred@R428pm x 12* Mobicred Info
Free Delivery
Delivery AdviceShips in 10 - 15 working days



Product Description

Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. -Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems. -Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects).

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Springer-Verlag New York

Country of origin

United States

Series

The Springer International Series in Engineering and Computer Science, 752

Release date

March 2013

Availability

Expected to ship within 10 - 15 working days

First published

2003

Editors

,

Dimensions

235 x 155 x 17mm (L x W x T)

Format

Paperback

Pages

302

Edition

Softcover reprint of the original 1st ed. 2003

ISBN-13

978-1-4613-4847-4

Barcode

9781461348474

Categories

LSN

1-4613-4847-1



Trending On Loot