Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Computing and Combinatorics
  • Language: en
  • Pages: 392

Computing and Combinatorics

  • Type: Book
  • -
  • Published: 2007-10-28
  • -
  • Publisher: Springer

The papers in this volume were selected for presentation at the Fourth Annual International Computing and Combinatorics Conference (COCOON’98), held on August 12–14, 1998, in Taipei. The topics cover most aspects of theoretical computer science and combinatorics related to computing. Submissions to the conference this year was only conducted electronically. Thanks to the excellent software developed by the system team of the Institute of Information Science, we were able to make virtually all communications through the World Wide Web. A total of 69 papers was submitted in time to be considered, of which 36 papers were accepted for presentation at the conference. In addition to these cont...

Fundamentals of Domination in Graphs
  • Language: en
  • Pages: 465

Fundamentals of Domination in Graphs

  • Type: Book
  • -
  • Published: 2013-12-16
  • -
  • Publisher: CRC Press

"Provides the first comprehensive treatment of theoretical, algorithmic, and application aspects of domination in graphs-discussing fundamental results and major research accomplishments in an easy-to-understand style. Includes chapters on domination algorithms and NP-completeness as well as frameworks for domination."

Applied Cryptography and Network Security
  • Language: en
  • Pages: 562

Applied Cryptography and Network Security

  • Type: Book
  • -
  • Published: 2011-06-14
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

Graph-Theoretic Concepts in Computer Science
  • Language: en
  • Pages: 364

Graph-Theoretic Concepts in Computer Science

The 18th International Workshop on Graph-Theoretic Concepts in Computer Science (WG '92) was held in Wiesbaden-Naurod, Germany, June 18-20, 1992. Itwas organized by the Department of Computer Science, Johann Wolfgang Goethe University, Frankfurt am Main. Contributions with original results inthe study and application of graph-theoretic concepts in various fields of computer science were solicited, and 72 papers were submitted and reviewed, from which 29 were selected for presentation at the workshop. The workshop was attended by 61 scientists from 16 countries. All 29 papers in the volume have undergone careful revision after the meeting, based on the discussions and comments from the audience and the referees. The volume is divided into parts on restricted graph classes, scheduling and related problems, parallel anbd distributed algorithms, combinatorial graph problems, graph decomposition, graph grammars and geometry, and modelling by graphs.

Information Security Practice and Experience
  • Language: en
  • Pages: 431

Information Security Practice and Experience

This book constitutes the refereed proceedings of the 4th International Information Security Practice and Experience Conference, ISPEC 2008, held in Sydney, Australia, in May 2008. The 29 revised full papers were carefully reviewed and selected from 95 submissions. The papers cover a wide range of topics in mathematics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve based security practice, security computation and so forth.

Secure Data Management
  • Language: en
  • Pages: 193

Secure Data Management

  • Type: Book
  • -
  • Published: 2006-09-12
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the Third VLDB 2006 International Workshop on Secure Data Management, SDM 2006, held in Seoul, Korea in September 2006 in conjunction with VLDB 2006. The book presents 13 revised full papers, organized in topical sections on privacy protection, privacy preserving data management, access control, and database security.

Security in Communication Networks
  • Language: en
  • Pages: 263

Security in Communication Networks

  • Type: Book
  • -
  • Published: 2003-07-01
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Security in Communication Networks, SCN 2002, held in Amalfi, Italy in September 2002. The 24 revised full papers presented together with two invited papers were carefully selected from 90 submissions during two rounds of reviewing and revision. The papers are organized in topical sections on forward security, foundations of cryptography, key management, cryptanalysis, systems security, digital signature schemes, zero knowledge, and information theory and secret sharing.

Provable Security
  • Language: en
  • Pages: 288

Provable Security

This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010. The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash function, protocol, encryption, and signcryption.

Security Aspects in Information Technology
  • Language: en
  • Pages: 199

Security Aspects in Information Technology

This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of 2 invited lectures were carefully reviewed and selected from 112 sumbissions. The papers address all current aspects in cryptography, security aspects in high performance computing and in networks as well. The papers are divided in topical sections on embedded security; digital rights management; cryptographic protocols; cryptanalysis/side channel attacks; and cipher primitives.

Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
  • Language: en
  • Pages: 234

Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems

  • Type: Book
  • -
  • Published: 2012-06-16
  • -
  • Publisher: Springer

This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security.