You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book features a selection of the best papers presented at two SIEV seminars held in Venice, Italy, in September 2017 and 2018, in the context of the Urbanpromo Green events. Bringing together experts from a diverse range of fields – economics, appraisal, architecture, energy, urban planning, sociology, and the decision sciences – and government representatives, the seminars encouraged reflections on the role of future cites in terms of sustainable development, with a particular focus on improving collective and individual well-being. The book provides a multidisciplinary approach to contemporary green urban agendas and urban sustainability, and addresses the demand for policies and strategies to strengthen resilience through concrete measures to reduce energy consumption, mitigate pollution, promote social inclusion and create urban identity.
This book examines the role of the evaluation models in decision-making processes for the construction of circular cities in the digital revolution. In particular, the book explores the need for a rethinking of development models proposed by the circular economy which requires the valorization of natural, social and economic capital. Urban environment represents a crucial field of analysis in which applying the circular-economy principles in order to steer a course towards a sustainable economy characterized by processes meant to create value instead of extracting it, which put a step forward in the pathway towards a better future in terms of economic, environmental and social effects and de...
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.
This book constitutes the refereed proceedings of the 15th International Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS '95, held in Bangalore, India in December 1995. The volume presents 31 full revised research papers selected from a total of 106 submissions together with full papers of four invited talks. Among the topics covered are algorithms, software technology, functional programming theory, distributed algorithms, term rewriting and constraint logic programming, complexity theory, process algebras, computational geometry, and temporal logics and verification theory.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.
Mycrypt 2005 was held in Kuala Lumpur, Malaysia during September 28 –30 2005, ...
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.
This book constitutes the refereed proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2003, held in Warsaw, Poland in May 2003. The 37 revised full papers presented together with two invited papers were carefully reviewed and selected from 156 submissions. The papers are organized in topical sections on cryptanalysis, secure multi-party communication, zero-knowledge protocols, foundations and complexity-theoretic security, public key encryption, new primitives, elliptic curve cryptography, digital signatures, information-theoretic cryptography, and group signatures.