You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.
The focus of the book is on completed implementations of agent-based software systems. Here, agent technology is considered broadly, starting from development of agent platforms, all the way through systems actually implemented. The covered topics also include lessons learned during implementation of agent platforms and the reflection on the process of development and application of agent-based systems. The book includes 10 chapters where interested reader can find discussion of important issues encountered during development of well-known agent platforms such as JADE and Jadex as well as some interesting experiences in developing a new platform that combines software agent and Web Services. Furthermore, the book shows readers several valuable examples of applications based on multi-agent systems including simulations, agents in autonomous negotiations and agents in public administration modelling. We believe that the book will prove useful to the researchers, professors and the practitioners in all disciplines including science and technology.
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops: – AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security – AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security – AIoTS: 4th ACNS Workshop on Artificial Intelligence and Industrial IoT Security – CIMSS: 2nd ACNS Workshop on Critical Infrastructure and Manufacturing System Security – Cloud S&P: 4th ACNS Workshop on Cloud Security and Privacy – SCI: 3rd ACNS Workshop on Secure Cryptographic Implementation – SecMT: 3rd ACNS Workshop on Security in Mobile Technologies – SiMLA: 4th ACNS Workshop on Security in Machine Learning and its Applications
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in September 2013. The 16 revised full papers and 4 short papers were thoroughly reviewed and selected from 57 submissions. The papers are structured in the following topical sections: new challenges, natural disasters, smart grids, threats and risk, and SCADA/ICS and sensors.
The 2004 International Symposium on Computational and Information Sciences (CIS 2004) aimed at bringing researchers in the area of computational and - formation sciences together to exchange new ideas and to explore new ground. The goal of the conference was to push the application of modern computing technologies to science, engineering, and information technologies to a new level of sophistication and understanding. Theinitialideatoorganizesuchaconferencewithafocusoncomputationand applicationswasoriginatedbyDr.JunZhang,duringhisvisittoChinainAugust 2003, in consultation with a few friends, including Dr. Jing Liu at the Chinese Academy of Sciences, Dr. Jun-Hai Yong at Tsinghua University, D...
Communication networks and computer systems research is entering a new phase in which many of the established models and techniques of the last twenty years are being challenged. The research community is continuing to free itself from past intellectual constraints so that it may fully exploit the convergence of computing and communications. Evaluating the performance of emerging communications and computer systems constitutes a huge challenge. Thus, current research provides a set of heterogeneous tools and techniques embracing the uncertainties of time and space varying environments when the requests for diverse services are made in real time, and with very different quality of service exp...
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information Infrastructure Security, CRITIS 2010, held in Athens, Greece in September 2010. The 12 revised full papers and two poster papers presented went through two rounds of reviewing and improvement and were selected from 30 submissions. The papers included address various techniques to realize the security of systems, communications, and data.
This book constitutes the thoroughly refereed proceedings of the 27th International Conference on Computer Networks, CN 2020, held in June 2020. Due to the COVID-19 pandemic the conference was held virtually. The 14 full papers presented were carefully reviewed and selected from 34 submissions. They are organized according to the topical sections on computer networks; cybersecurity and quality of service; queueing theory and queueing networks.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on Critical Information Infrastructures Security, CRITIS 2008, held in Rome, Italy, in October 2008. The 39 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. All the contributions highlight the current development in the field of Critical (Information) Infrastructures and their Protection. Specifically they emphasized that the efforts dedicated to this topic are beginning to provide some concrete results. Some papers illustrated interesting and innovative solutions devoted to understanding, analyzing and modeling a scenario composed by several heterogeneous and interdependent infrastructures. Furthermore, issues concerning crisis management scenarios for interdependent infrastructures have been illustrated. Encouraging preliminarily results have been presented about the development of new technological solutions addressing self-healing capabilities of infrastructures, that is regarded as one of the most promising research topics to improve the infrastructures’ resilience.
This book comprises selected papers of the International Conferences, ASEA, DRBC and EL 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of advances in software engineering and its Application, disaster recovery and business continuity, education and learning.