Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Theory of Cryptography
  • Language: en
  • Pages: 739

Theory of Cryptography

  • Type: Book
  • -
  • Published: 2018-11-07
  • -
  • Publisher: Springer

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Computer Science – Theory and Applications
  • Language: en
  • Pages: 364

Computer Science – Theory and Applications

  • Type: Book
  • -
  • Published: 2018-05-24
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 13th International Computer Science Symposium in Russia, CSR 2018, held in Moscow, Russia, in May 2018. The 24 full papers presented together with 7 invited lectures were carefully reviewed and selected from 42 submissions. The papers cover a wide range of topics such as algorithms and data structures; combinatorial optimization; constraint solving; computational complexity; cryptography; combinatorics in computer science; formal languages and automata; algorithms for concurrent and distributed systems; networks; and proof theory and applications of logic to computer science.

Principles of Security and Trust
  • Language: en
  • Pages: 258

Principles of Security and Trust

  • Type: Book
  • -
  • Published: 2019-04-02
  • -
  • Publisher: Springer

This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems.

The Theory and Practice of Social Machines
  • Language: en
  • Pages: 268

The Theory and Practice of Social Machines

  • Type: Book
  • -
  • Published: 2019-02-14
  • -
  • Publisher: Springer

Social machines are a type of network connected by interactive digital devices made possible by the ubiquitous adoption of technologies such as the Internet, the smartphone, social media and the read/write World Wide Web, connecting people at scale to document situations, cooperate on tasks, exchange information, or even simply to play. Existing social processes may be scaled up, and new social processes enabled, to solve problems, augment reality, create new sources of value, and disrupt existing practice. This book considers what talents one would need to understand or build a social machine, describes the state of the art, and speculates on the future, from the perspective of the EPSRC pr...

Cyber Space and Outer Space Security
  • Language: en
  • Pages: 293

Cyber Space and Outer Space Security

  • Type: Book
  • -
  • Published: 2024-10-31
  • -
  • Publisher: CRC Press

This book delves into cutting-edge research in cyberspace and outer space security, encompassing both theoretical and experimental aspects. It provides mitigation measures and strategies to address the identified challenges within. It covers a spectrum of topics including techniques and strategies for enhancing cyberspace security, combating ransomware attacks, and securing autonomous vehicles. Additionally, it explores security and surveillance systems involving autonomous vehicles, resilience schemes against security attacks using blockchain for autonomous vehicles, security analysis of autonomous drones (UAVs), the cybersecurity kill chain, the internet of drones (IoD), and cyberspace sol...

Applied Cryptography and Network Security
  • Language: en
  • Pages: 715

Applied Cryptography and Network Security

  • Type: Book
  • -
  • Published: 2018-06-11
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.

Handbook of Sharing Confidential Data
  • Language: en
  • Pages: 338

Handbook of Sharing Confidential Data

  • Type: Book
  • -
  • Published: 2024-10-09
  • -
  • Publisher: CRC Press

Statistical agencies, research organizations, companies, and other data stewards that seek to share data with the public face a challenging dilemma. They need to protect the privacy and confidentiality of data subjects and their attributes while providing data products that are useful for their intended purposes. In an age when information on data subjects is available from a wide range of data sources, as are the computational resources to obtain that information, this challenge is increasingly difficult. The Handbook of Sharing Confidential Data helps data stewards understand how tools from the data confidentiality literature—specifically, synthetic data, formal privacy, and secure compu...

Explainable AI: Interpreting, Explaining and Visualizing Deep Learning
  • Language: en
  • Pages: 435

Explainable AI: Interpreting, Explaining and Visualizing Deep Learning

The development of “intelligent” systems that can take decisions and perform autonomously might lead to faster and more consistent decisions. A limiting factor for a broader adoption of AI technology is the inherent risks that come with giving up human control and oversight to “intelligent” machines. For sensitive tasks involving critical infrastructures and affecting human well-being or health, it is crucial to limit the possibility of improper, non-robust and unsafe decisions and actions. Before deploying an AI system, we see a strong need to validate its behavior, and thus establish guarantees that it will continue to perform as expected when deployed in a real-world environment. ...

Programming Languages and Systems
  • Language: en
  • Pages: 851

Programming Languages and Systems

  • Type: Book
  • -
  • Published: 2015-03-31
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 24th European Symposium on Programming, ESOP 2015, which took place in London, UK, in April 2015, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015. The 33 papers presented in this volume were carefully reviewed and selected from 113 submissions.

Research in Computational Molecular Biology
  • Language: en
  • Pages: 293

Research in Computational Molecular Biology

This book constitutes the proceedings of the 24th Annual Conference on Research in Computational Molecular Biology, RECOMB 2020, held in Padua, Italy, in May 2020. The 13 regular and 24 short papers presented were carefully reviewed and selected from 206 submissions. The papers report on original research in all areas of computational molecular biology and bioinformatics.