You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30–31, 2022. The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.
This book constitutes the refereed proceedings of the 9th International Conference on Cellular Automata for Research and Industry, ACRI 2010, held in Ascoli Piceno, Italy, in September 2010. The first part of the volume contains 39 revised papers that were carefully reviewed and selected from the main conference; they are organized according to six main topics: theoretical results on cellular automata, modeling and simulation with cellular automata, CA dynamics, control and synchronization, codes and cryptography with cellular automata, cellular automata and networks, as well as CA-based hardware. The second part of the volume comprises 35 revised papers dedicated to contributions presented during ACRI 2010 workshops on theoretical advances, specifically asynchronous cellular automata, and challenging application contexts for cellular automata: crowds and CA, traffic and CA, and the international workshop of natural computing.
This book constitutes the refereed proceedings of the 6th International Conference on Cellular Automata for Research and Industry, ACRI 2004, held in Amsterdam, The Netherlands in October 2004. The 60 revised full papers and 30 poster papers presented were carefully reviewed and selected from 150 submissions. The papers are devoted to methods and theory; evolved cellular automata; traffic, networks, and communication; applications in science and engineering; biomedical applications, natural phenomena and ecology; and social and economical applications.
This book constitutes the refereed proceedings of the 8th International Conference on Cellular Automata for Research and Industry, ACRI 2008, held in Yokohama, Japan, in September 2008. The 43 revised full papers and 22 revised poster papers presented together with 4 invited lectures were carefully reviewed and selected from 78 submissions. The papers focus on challenging problems and new research not only in theoretical but application aspects of cellular automata, including cellular automata tools and computational sciences. The volume also contains 11 extended abstracts dealing with crowds and cellular automata, which were presented during the workshop C&CA 2008. The papers are organized in topical sections on CA theory and implementation, computational theory, physical modeling, urban, environmental and social modeling, pedestrian and traffic flow modeling, crypto and security, system biology, CA-based hardware, as well as crowds and cellular automata.
This book constitutes the refereed proceedings of the 10th International Conference on Cellular Automata for Research and Industry, ACRI 2012, held in Santorini Island, Greece, in September 2012. The 88 revised papers were carefully selected from numerous submissions. In order to give a perspective in which both theoretical and applicational aspects of cellular automata contribute to the growth of the area, this book mirrors the structure of the conference, grouping the 88 papers into two main parts. The first part collects papers presented as part of the main conference and organized according to six main topics: theoretical results on cellular automata; cellular automata dynamics, control ...
This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes.
This book constitutes the proceedings of the Third International Conference on Mathematics and Computing, ICMC 2017, held in Haldia, India, in January 2017. The 35 papers presented in this volume were carefully reviewed and selected from 129 submissions. They were organized in topical sections named: security and privacy; computing; applied mathematics; and pure mathematics.
System-on-a-Chip (SOC) integrated circuits composed of embedded cores are now commonplace. Nevertheless, there remain several roadblocks to rapid and efficient system integration. Test development is seen as a major bottleneck in SOC design and manufacturing capabilities. Testing SOCs is especially challenging in the absence of standardized test structures, test automation tools, and test protocols. In addition, long interconnects, high density, and high-speed designs lead to new types of faults involving crosstalk and signal integrity. SOC (System-on-a-Chip) Testing for Plug and Play Test Automation is an edited work containing thirteen contributions that address various aspects of SOC testing. SOC (System-on-a-Chip) Testing for Plug and Play Test Automation is a valuable reference for researchers and students interested in various aspects of SOC testing.
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.