You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Advances the understanding of management methods, information technology, and their joint application in business processes.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.
This book constitutes the refereed proceedings of the International Conference on Information Networking, ICOIN 2005 held in Jeju Island, Korea in January/February 2005. The conference focused on convergence in broadband and mobile networking. The 96 revised full papers presented were carefully reviewed and selected from 427 submissions. The papers are organized in topical sections on wireless LAN, security, TCP and congestion control, wireless ad-hoc network routing, network measurement, routing, power control in wireless networks, quality of service, high speed networks, wireless ad-hoc networks, network design, peer-to-peer networks, and applications and services.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.
This book constitutes the refereed proceedings of the 10th International Symposium on Engineering Secure Software and Systems, ESSoS 2018, held in Paris, France, in June 2018. The 10 papers, consisting of 7 regular and 3 idea papers, were carefully reviewed and selected from 26 submissions. They focus on the construction of secure software, which is becoming an increasingly challenging task due to the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies, and the progress of attack vectors.
This book constitutes the refereed proceedings of the 15th International Conference on Information Security Practice and Experience, ISPEC 2019, held in Kuala Lumpur, Malaysia, in November 2019. The 21 full and 7 short papers presented in this volume were carefully reviewed and selected from 68 submissions. They were organized into the following topical sections: Cryptography I, System and Network Security, Security Protocol and Tool, Access Control and Authentication, Cryptography II, Data and User Privacy, Short Paper I, and Short Paper II.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.
The International Conference on Networking (ICN 2005) was the fourth conf- ence in its series aimed at stimulating technical exchange in the emerging and important ?eld of networking. On behalf of the International Advisory C- mittee, it is our great pleasure to welcome you to the proceedings of the 2005 event. Networking faces dramatic changes due to the customer-centric view, the venue of the next generation networks paradigm, the push from ubiquitous n- working,andthenewservicemodels.Despitelegacyproblems,whichresearchers and industry are still discovering and improving the state of the art, the ho- zon has revealed new challenges that some of the authors tackled through their submissions...
Provides the most thorough examination of Internet technologies and applications for researchers in a variety of related fields. For the average Internet consumer, as well as for experts in the field of networking and Internet technologies.
This book highlights contemporary state of research in multi-disciplinary areas in Physics, Biomedical Sciences, Chemical Engineering, Mechanical Engineering, Computer Science/Engineering, Life Sciences, and Healthcare. The accepted submissions to the 8th IRC Conference on Science, Engineering and Technology (IRC-SET 2022) that were presented on 6th August 2022, are published in this conference proceedings. The papers presented here were shortlisted after extensive rounds of rigorous reviews by a panel of esteemed individuals who are pioneers and experts in their respective domains.