Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

In Autumn
  • Language: en
  • Pages: 12

In Autumn

  • Type: Book
  • -
  • Published: 1888
  • -
  • Publisher: Unknown

None

Fundamentals of Computation Theory
  • Language: en
  • Pages: 582

Fundamentals of Computation Theory

This book constitutes the refereed proceedings of the 12th International Symposium on Fundamentals of Computation Theory, FCT '99, held in Iasi, Romania in August/September 1999. The 42 revised full papers presented together with four invited papers were carefully selected from a total of 102 submissions. Among the topics addressed are abstract data types, algorithms and data structures, automata and formal languages, categorical and topological approaches, complexity, computational geometry, concurrency, cryptology, distributed computing, logics in computer science, process algebras, symbolic computation, molecular computing, quantum computing, etc.

SC.
  • Language: en
  • Pages: 768

SC.

  • Type: Book
  • -
  • Published: 1950
  • -
  • Publisher: Unknown

None

Information Security and Privacy
  • Language: en
  • Pages: 354

Information Security and Privacy

This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997. The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.

Information Security and Privacy
  • Language: en
  • Pages: 501

Information Security and Privacy

  • Type: Book
  • -
  • Published: 2006-12-30
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000. The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a total of 81 submissions. The book offers topical sections on network security, public key cryptography, cryptographic implementation issues, electronic commerce, key recovery, public key infrastructure, Boolean functions, intrusion detection, codes, digital signatures, secret sharing, and protocols.

Encyclopedia of Library and Information Science
  • Language: en
  • Pages: 396

Encyclopedia of Library and Information Science

  • Type: Book
  • -
  • Published: 1997-09-16
  • -
  • Publisher: CRC Press

The Biological Literature to An Uncertainty Principle for Information Seeking: A Qualitative Approach

Resources in Education
  • Language: en
  • Pages: 1280

Resources in Education

  • Type: Book
  • -
  • Published: 1979
  • -
  • Publisher: Unknown

None

Minutes of the North Ohio Conference of the Methodist Episcopal Church
  • Language: en
  • Pages: 780

Minutes of the North Ohio Conference of the Methodist Episcopal Church

  • Type: Book
  • -
  • Published: 1864
  • -
  • Publisher: Unknown

None

Customer Supply Center
  • Language: en
  • Pages: 566

Customer Supply Center

  • Type: Book
  • -
  • Published: 1998
  • -
  • Publisher: Unknown

None

Applied Cryptography and Network Security
  • Language: en
  • Pages: 592

Applied Cryptography and Network Security

  • Type: Book
  • -
  • Published: 2012-06-14
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.