You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ICICS 2008, held in Birmingham, UK, in October 2008. The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on authentication, side channel analysis, cryptanalysis, access control, software security, system security, applied cryptography, and security protocols.
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methods in network security.
The purpose of this book is to provide an overview of AI research, ranging from basic work to interfaces and applications, with as much emphasis on results as on current issues. It is aimed at an audience of master students and Ph.D. students, and can be of interest as well for researchers and engineers who want to know more about AI. The book is split into three volumes: - the first volume brings together twenty-three chapters dealing with the foundations of knowledge representation and the formalization of reasoning and learning (Volume 1. Knowledge representation, reasoning and learning) - the second volume offers a view of AI, in fourteen chapters, from the side of the algorithms (Volume...
Formal methods have been applied successfully to the verification of medium-sized programs in protocol and hardware design. However, their application to more complex systems, resulting from the object-oriented and the more recent component-based software engineering paradigms, requires further development of specification and verification techniques supporting the concepts of reusability and modifiability. This book presents revised tutorial lectures given by invited speakers at the Second International Symposium on Formal Methods for Components and Objects, FMCO 2003, held in Leiden, The Netherlands, in November 2003. The 17 revised lectures by leading researchers present a comprehensive account of the potential of formal methods applied to large and complex software systems such as component-based systems and object systems. The book makes a unique contribution to bridging the gap between theory and practice in software engineering.
This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security.
This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. The 32 revised full papers presented were carefully reviewed and selected from 160 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.
Running to more than 360 pages, and complete with online files and updates, this book constitutes the thoroughly refereed post-proceedings of the 11th Asian Computing Science Conference, ASIAN 2006, held in Tokyo, Japan. The 17 revised full papers and 8 revised short papers presented together with 1 invited paper were carefully selected during two rounds of reviewing from 115 submissions. The papers cover theory, practice, applications, and experiences related to secure software.
This book constitutes the joint refereed proceedings of nine international workshops held as part of OTM 2005 in Agia Napa, Cyprus in October/November 2005.The 145 revised full papers presented were carefully reviewed and selected from a total of 268 submissions. Topics addressed are agents, Web services and ontologies merging (AWeSOMe 2005), context-aware mobile systems (CAMS 2005), grid computing and its application to data analysis (GADA 2005), inter-organizational systems and interoperability of enterprise software and applications (MIOS+INTEROP 2005), object-role modeling (ORM 2005), a PHD symposium (PhDS 2005), semantic-based geographical information systems (SeBGIS 2005), Web semantics (SWWS 2005), and ontologies, semantics and e-learning (WOSE 2005).
This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023. The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: · 1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) · 5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) · 4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) · 5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) · 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) · 5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) · 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) · 4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) · 5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)
This book constitutes the refereed proceedings of the 29th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2015, held in Fairfax, VA, USA, in July 2015. The 18 revised full papers and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: data anonymization and computation; access control and authorization; user privacy; authentication and information integration; privacy and trust; access control and usage policies; network and internet security; and information flow and inference.