Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Foundations and Practice of Security
  • Language: en
  • Pages: 478

Foundations and Practice of Security

This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12–14, 2022. The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.

Formal Techniques for Networked and Distributed Systems - FORTE 2007
  • Language: en
  • Pages: 385

Formal Techniques for Networked and Distributed Systems - FORTE 2007

  • Type: Book
  • -
  • Published: 2007-07-07
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 27th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems, FORTE 2007, held in Tallinn, Estonia, in September 2007 co-located with TestCom/FATES 2007. It covers service oriented computing and architectures using formalized and verified approaches.

Foundations and Practice of Security
  • Language: en
  • Pages: 468

Foundations and Practice of Security

None

Applied Cryptography and Network Security
  • Language: en
  • Pages: 520

Applied Cryptography and Network Security

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.

Testing Software and Systems
  • Language: en
  • Pages: 235

Testing Software and Systems

This book constitutes the refereed proceedings of the 23rd IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2011, held in Paris, France, in November 2011. The 13 revised full papers presented together with 2 invited talks were carefully selected from 40 submissions. The papers address the conceptual, theoretic, and practical problems of testing software systems, including communication protocols, services, distributed platforms, middleware, controllers, and security infrastructures.

Computer and Information Sciences - ISCIS 2005
  • Language: en
  • Pages: 992

Computer and Information Sciences - ISCIS 2005

  • Type: Book
  • -
  • Published: 2005-11-16
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 20th International Symposium on Computer and Information Sciences, ISCIS 2005, held in Istanbul, Turkey in October 2005. The 92 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 491 submissions. The papers are organized in topical sections on computer networks, sensor and satellite networks, security and cryptography, performance evaluation, e-commerce and Web services, multiagent systems, machine learning, information retrieval and natural language processing, image and speech processing, algorithms and database systems, as well as theory of computing.

Testing of Software and Communication Systems
  • Language: en
  • Pages: 256

Testing of Software and Communication Systems

  • Type: Book
  • -
  • Published: 2009-11-03
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 21th IFIP WG 6.1 International Conference on Testing Communicating Systems, TESTCOM 2009, and the 9th International Workshop on Formal Approaches to Testing of Software, FATES 2009, jointly held in Eindhoven, The Netherlands, in November 2009. The 13 revised full papers presented together with 6 short papers were carefully selected from 37 submissions to both events. The papers cover new approaches, concepts, theories, methodologies, tools, and experiences in the field of testing of communicating systems and general software.

Foundations and Practice of Security
  • Language: en
  • Pages: 422

Foundations and Practice of Security

This book constitutes the revised selected papers of the 14th International Symposium on Foundations and Practice of Security, FPS 2021, held in Paris, France, in December 2021. The 18 full papers and 9 short paper presented in this book were carefully reviewed and selected from 62 submissions. They cover a range of topics such as Analysis and Detection; Prevention and Efficiency; and Privacy by Design. Chapters “A Quantile-based Watermarking Approach for Distortion Minimization”, “Choosing Wordlists for Password Guessing: An Adaptive Multi-Armed Bandit Approach” and “A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Data Privacy Management, Cryptocurrencies and Blockchain Technology
  • Language: en
  • Pages: 333

Data Privacy Management, Cryptocurrencies and Blockchain Technology

This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26–30, 2022. For DPM 2022, 10 full papers out of 21 submissions have been accepted for inclusion in this book. They were organized in topical sections as follows: differential privacy and data analysis; regulation, artificial intelligence, and formal verification; and leakage quantification and applications. The CBT 2022 workshop accepted 7 full papers and 3 short papers from 18 submissions. The papers were organized in the following topical sections: Bitcoin, lightning network and scalability; and anonymity, fault tolerance and governance; and short papers.

Computer Security. ESORICS 2023 International Workshops
  • Language: en
  • Pages: 518

Computer Security. ESORICS 2023 International Workshops

None