You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008. The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signatures, AES, symmetric cryptography and hash functions, authentication as well as security protocols.
This book constitutes the refereed proceedings of the 8th Annual International Computing and Combinatorics Conference, COCOON 2002, held in Singapore in August 2002. The 60 revised full papers presented together with three invited contributions were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on complexity theory, discrete algorithms, computational biology and learning theory, radio networks, automata and formal languages, Internet networks, computational geometry, combinatorial optimization, and quantum computing.
This book provides comprehensive coverage of the latest trends/advances in subjective and objective quality evaluation for traditional visual signals, such as 2D images and video, as well as the most recent challenges for the field of multimedia quality assessment and processing, such as mobile video and social media. Readers will learn how to ensure the highest storage/delivery/ transmission quality of visual content (including image, video, graphics, animation, etc.) from the server to the consumer, under resource constraints, such as computation, bandwidth, storage space, battery life, etc.
This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2003, held in Taipei, Taiwan in November/December 2003. The 32 revised full papers presented together with one invited paper were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on public key cryptography, number theory, efficient implementations, key management and protocols, hash functions, group signatures, block cyphers, broadcast and multicast, foundations and complexity theory, and digital signatures.
This book constitutes the refereed proceedings of the 5th International Symposium on Security in Computing and Communications, SSCC 2017, held in Manipal, India, in September 2017. The 21 revised full papers presented together with 13 short papers were carefully reviewed and selected from 84 submissions. The papers focus on topics such as cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security.
Hash functions are the cryptographer’s Swiss Army knife. Even though they play an integral part in today’s cryptography, existing textbooks discuss hash functions only in passing and instead often put an emphasis on other primitives like encryption schemes. In this book the authors take a different approach and place hash functions at the center. The result is not only an introduction to the theory of hash functions and the random oracle model but a comprehensive introduction to modern cryptography. After motivating their unique approach, in the first chapter the authors introduce the concepts from computability theory, probability theory, information theory, complexity theory, and infor...
Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents general principles and application paradigms critical to the future of this field. The study of cryptography is motivated by and driven forward by security requirements. All the new directions of modern cryptography, including proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography have arisen from t...
The book examines how Fog will change the information technology industry in the next decade. Fog distributes the services of computation, communication, control and storage closer to the edge, access and users. As a computing and networking architecture, Fog enables key applications in wireless 5G, the Internet of Things, and big data. The authors cover the fundamental tradeoffs to major applications of fog. The book chapters are designed to motivate a transition from the current cloud architectures to the Fog (Chapter 1), and the necessary architectural components to support such a transition (Chapters 2-6). The rest of the book (Chapters 7-xxx) are dedicated to reviewing the various 5G an...
This book constitutes the refereed proceedings of the 12th International Conference on High-Performance Computing, HiPC 2005, held in Goa, India in December 2005. The 50 revised full papers presented were carefully reviewed and selected from 362 submissions. After the keynote section and the presentation of the 2 awarded best contributions the papers are organized in topical sections on algorithms, applications, architecture, systems software, communication networks, and systems and networks.
This lecture introduces fundamental principles of online multiplayer games, primarily massively multiplayer online role-playing games (MMORPGs), suitable for students and faculty interested both in designing games and in doing research on them. The general focus is human-centered computing, which includes many human-computer interaction issues and emphasizes social computing, but also, looks at how the design of socio-economic interactions extends our traditional notions of computer programming to cover human beings as well as machines. In addition, it demonstrates a range of social science research methodologies, both quantitative and qualitative, that could be used by students for term pap...