Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Future Generation Information Technology
  • Language: en
  • Pages: 436

Future Generation Information Technology

This book comprises selected papers of the Third International Conference on Future Generation Information Technology, FGIT 2011, held in Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of advances in information technology. They were selected from the following 13 conferences: ASEA 2011, BSBT 2011, CA 2011, CES3 2011, DRBC 2011, DTA 2011, EL 2011, FGCN 2011, GDC 2011, MulGraB 2011, SecTech 2011, SIP 2011 and UNESST 2011.

Grid and Pervasive Computing
  • Language: en
  • Pages: 987

Grid and Pervasive Computing

  • Type: Book
  • -
  • Published: 2013-11-13
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 8th International Conference on Grid and Pervasive Computing, GPC 2013, held in Seoul, Korea, in May 2013 and the following colocated workshops: International Workshop on Ubiquitous and Multimedia Application Systems, UMAS 2013; International Workshop DATICS-GPC 2013: Design, Analysis and Tools for Integrated Circuits and Systems; and International Workshop on Future Science Technologies and Applications, FSTA 2013. The 111 revised papers were carefully reviewed and selected from numerous submissions. They have been organized in the following topical sections: cloud, cluster and grid; middleware resource management; mobile peer-to-peer and pervasive computing; multi-core and high-performance computing; parallel and distributed systems; security and privacy; ubiquitous communications, sensor networking, and RFID; ubiquitous and multimedia application systems; design, analysis and tools for integrated circuits and systems; future science technologies and applications; and green and human information technology.

Computer Science and its Applications
  • Language: en
  • Pages: 962

Computer Science and its Applications

The 4th FTRA International Conference on Computer Science and its Applications (CSA-12) will be held in Jeju, Korea on November 22~25, 2012. CSA-12 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applications. CSA-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in CSA. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. CSA-12 is the next event in a series of highly successful International Conference on Computer Science and its Applications, previously held as CSA-11 (3rd Edition: Jeju, December, 2011), CSA-09 (2nd Edition: Jeju, December, 2009), and CSA-08 (1st Edition: Australia, October, 2008).

Personal Wireless Communications
  • Language: en
  • Pages: 544

Personal Wireless Communications

This book constitutes the refereed proceedings of the IFIP-TC6 11th International Conference on Personal Wireless Communications, PWC 2006. The book presents 25 revised full papers and 13 revised short papers, carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on mobile and wireless networking, QoS, ad-hoc, security, wireless LAN, cross-layer design, wireless sensor networks, physical layer, and mobile and wireless applications.

Information and Communications Security
  • Language: en
  • Pages: 500

Information and Communications Security

This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997. The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.

Computer Security
  • Language: en
  • Pages: 158

Computer Security

We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research ...

Advances in Computer Science and its Applications
  • Language: en
  • Pages: 1416

Advances in Computer Science and its Applications

These proceedings focus on various aspects of computer science and its applications, thus providing an opportunity for academic and industry professionals to discuss the latest issues and progress in this and related areas. The book includes theory and applications alike.

Information Technology Convergence, Secure and Trust Computing, and Data Management
  • Language: en
  • Pages: 301

Information Technology Convergence, Secure and Trust Computing, and Data Management

The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, 2012. The ITCS-12 will be the most comprehensive conference focused on the various aspects of advances in information technology convergence, applications, and services. The ITCS-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ITCS. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in ITCS. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. The ITCS-12 is the next event in a series of highly successful International Conference on Information Technology Convergence and Services(ITCS-11), previously held in Gwangju, Korea on October, 2011.

Agent and Multi-Agent Systems: Technologies and Applications
  • Language: en
  • Pages: 1065

Agent and Multi-Agent Systems: Technologies and Applications

This book constitutes the refereed proceedings of the First International Symposium on Agent and Multi-Agent Systems: Technologies and Applications, KES-AMSTA 2007, held in Wroclaw, Poland in May/June 2007. Coverage includes agent-oriented Web applications, mobility aspects of agent systems, agents for network management, agent approaches to robotic systems, as well as intelligent and secure agents for digital content management.

Protocols for Authentication and Key Establishment
  • Language: en
  • Pages: 343

Protocols for Authentication and Key Establishment

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.