Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Bulletin of Electrical Engineering and Informatics
  • Language: en
  • Pages: 87

Bulletin of Electrical Engineering and Informatics

Table of Contents Using HBMO Algorithm to Optimal Sizing & Sitting of Distributed Generation in Power System Noradin Ghadimi 1 – 8 Management of Urban Parking Lot Energy Efficiency with the Application of Wind Turbine and LED lights Bekir Z Yuksek, Ulan Dakeev 9 – 14 Indirect Vector Control of Three Phase Induction Motor using PSIM Nagulapati Kiran 15 – 24 Improved Dynamic Response of Buck Converter using Fuzzy Controller Nagulapati Kiran, Ch Varaha Narasimha Raja 25 – 36 Sliding Mode Control of Buck Converter Nagulapati Kiran 37 – 44 Two Parameter Controller for a Single Machine Infinite Bus System Ch. Varaha Narasimha Raja 45 – 50 A Hybrid Hardware Verification Technique in FPGA Design Mojtaba.Dehghani Firouzabadi, Hossein Heidari 51 – 54 A Genuine Random Sequential Multi-signature Scheme Yonglong Tang 55 – 68

Public-Key Cryptography – PKC 2023
  • Language: en
  • Pages: 812

Public-Key Cryptography – PKC 2023

The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA. The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.

Public-Key Cryptography – PKC 2023
  • Language: en
  • Pages: 707

Public-Key Cryptography – PKC 2023

The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA. The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.

Proceedings of the First International Conference on Intelligent Computing and Communication
  • Language: en
  • Pages: 686

Proceedings of the First International Conference on Intelligent Computing and Communication

  • Type: Book
  • -
  • Published: 2016-11-21
  • -
  • Publisher: Springer

The book covers a wide range of topics in Computer Science and Information Technology including swarm intelligence, artificial intelligence, evolutionary algorithms, and bio-inspired algorithms. It is a collection of papers presented at the First International Conference on Intelligent Computing and Communication (ICIC2) 2016. The prime areas of the conference are Intelligent Computing, Intelligent Communication, Bio-informatics, Geo-informatics, Algorithm, Graphics and Image Processing, Graph Labeling, Web Security, Privacy and e-Commerce, Computational Geometry, Service Orient Architecture, and Data Engineering.

Cryptology and Network Security
  • Language: en
  • Pages: 392

Cryptology and Network Security

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability.

The Theory of Hash Functions and Random Oracles
  • Language: en
  • Pages: 788

The Theory of Hash Functions and Random Oracles

Hash functions are the cryptographer’s Swiss Army knife. Even though they play an integral part in today’s cryptography, existing textbooks discuss hash functions only in passing and instead often put an emphasis on other primitives like encryption schemes. In this book the authors take a different approach and place hash functions at the center. The result is not only an introduction to the theory of hash functions and the random oracle model but a comprehensive introduction to modern cryptography. After motivating their unique approach, in the first chapter the authors introduce the concepts from computability theory, probability theory, information theory, complexity theory, and infor...

Advances in Cryptology – ASIACRYPT 2007
  • Language: en
  • Pages: 594

Advances in Cryptology – ASIACRYPT 2007

  • Type: Book
  • -
  • Published: 2007-11-05
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December 2007. The papers are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast cryptography, mac and implementation, multiparty computation, block ciphers, foundation, public key encryption, and cryptanalysis.

Automata, Languages and Programming
  • Language: en
  • Pages: 752

Automata, Languages and Programming

The two-volume set LNCS 4051 and LNCS 4052 constitutes the refereed proceedings of the 33rd International Colloquium on Automata, Languages and Programming, ICALP 2006, held in Venice, Italy, July 2006. In all, these volumes present more 100 papers and lectures. Volume I (4051) presents 61 revised full papers together with 1 invited lecture, focusing on algorithms, automata, complexity and games, on topics including graph theory, quantum computing, and more.

CT-RSA 2003
  • Language: en
  • Pages: 432

CT-RSA 2003

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2003, CT-RSA 2003, held in San Francisco, CA, USA, in April 2003. The 26 revised full papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on key self-protection, message authentication, digital signatures, pairing based cryptography, multivariate and lattice problems, cryptographic architectures, new RSA-based cryptosystems, chosen-ciphertext security, broadcast encryption and PRF sharing, authentication structures, elliptic curves and pairings, threshold cryptography, and implementation issues.

Advances in Cryptology – EUROCRYPT 2021
  • Language: en
  • Pages: 849

Advances in Cryptology – EUROCRYPT 2021

The 3-volume-set LNCS 12696 – 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021. The 78 full papers included in these proceedings were accepted from a total of 400 submissions. They were organized in topical sections as follows: Part I: Best papers; public-key cryptography; isogenies; post-quantum cryptography; lattices; homomorphic encryption; symmetric cryptanalysis; Part II: Symmetric designs; real-world cryptanalysis; implementation issues; masking and secret-sharing; leakage, faults and tampering; quantum constructions and proofs; multiparty computation; Part III: Garbled circuits; indistinguishability obfuscation; non-malleable commitments; zero-knowledge proofs; property-preserving hash functions and ORAM; blockchain; privacy and law enforcement.