Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Autonomic and Trusted Computing
  • Language: en
  • Pages: 629

Autonomic and Trusted Computing

This book constitutes the refereed proceedings of the Third International Conference on Autonomic and Trusted Computing, ATC 2006, held in Wuhan, China in September 2006. The 57 revised full papers presented together with two keynotes were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections.

Autonomic and Trusted Computing
  • Language: en
  • Pages: 588

Autonomic and Trusted Computing

No fewer than 55 revised full papers are presented in this volume, all given at the 4th International Conference on Autonomic and Trusted Computing, held in Hong Kong, China in July 2007. The papers, presented together with one keynote lecture, were carefully reviewed and selected from 223 submissions. The papers are organized in topical sections on, among others, cryptography and signatures, autonomic computing and services, and secure and trusted computing.

Computing and Combinatorics
  • Language: en
  • Pages: 778

Computing and Combinatorics

  • Type: Book
  • -
  • Published: 2015-06-23
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 21st International Conference on Computing and Combinatorics, COCOON 2015, held in Beijing, China, in August 2015. The 49 revised full papers and 11 shorter papers presented were carefully reviewed and selected from various submissions. The papers cover various topics including algorithms and data structures; algorithmic game theory; approximation algorithms and online algorithms; automata, languages, logic and computability; complexity theory; computational learning theory; cryptography, reliability and security; database theory, computational biology and bioinformatics; computational algebra, geometry, number theory, graph drawing and information visualization; graph theory, communication networks, optimization and parallel and distributed computing.

BFCA '05
  • Language: en
  • Pages: 218

BFCA '05

Les recherches en cryptographie se sont développées en France ces dernières années du fait de la nécessité de développer la sécurité de tous les échanges informatiques. Toutes les industries ainsi que les administrations sont concernées par ce développement : la sécurité des échanges informatiques ainsi que l’e-administration sont des exemples dans lesquels peut intervenir la cryptographie. Et les fonctions booléennes, en particulier, jouent un rôle central dans le design de la plupart des crypto-systèmes symétriques et leur sécurité. L’ouvrage en anglais, fruit d’un colloque international tenu à Roeun, fait le point sur ces différents systèmes.

Information and Communications Security
  • Language: en
  • Pages: 683

Information and Communications Security

  • Type: Book
  • -
  • Published: 2018-04-17
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security.

Trusted Systems
  • Language: en
  • Pages: 362

Trusted Systems

  • Type: Book
  • -
  • Published: 2012-07-11
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.

Multimedia Content Analysis and Mining
  • Language: en
  • Pages: 526

Multimedia Content Analysis and Mining

  • Type: Book
  • -
  • Published: 2007-07-10
  • -
  • Publisher: Springer

Prominent international experts came together to present and debate the latest findings in the field at the 2007 International Workshop on Multimedia Content Analysis and Mining. This volume includes forty-six papers from the workshop as well as thirteen invited papers. The papers cover a wide range of cutting-edge issues, including all aspects of multimedia in the fields of entertainment, commerce, science, medicine, and public safety.

NPC 2004
  • Language: en
  • Pages: 713

NPC 2004

This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC 2004, held in Wuhan, China in October 2004. Also included are selected refereed papers from two workshops associated with NPC 2004. The 46 revised full papers and 23 revised short papers presented together with abstracts of 5 invited presentations were selected from a total of 338 submissions. The 25 workshop revised papers included also were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on grid computing, peer-to-peer computing, Web techniques, cluster computing, parallel programming environments, network architecture, network security, network storage, intelligent sensor networks, and multimedia modeling and security in next generation network information systems.

Information and Communications Security
  • Language: en
  • Pages: 609

Information and Communications Security

This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography. *The conference was held virtually due to the COVID-19 pandemic.

Arithmetic of Finite Fields
  • Language: en
  • Pages: 364

Arithmetic of Finite Fields

This book constitutes the refereed proceedings of the First International Workshop on the Arithmetic of Finite Fields, WAIFI 2007, held in Madrid, Spain in June 2007. It covers structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, classification and construction of mappings over finite fields, curve algebra, cryptography, codes, and discrete structures.