You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Les recherches en cryptographie se sont développées en France ces dernières années du fait de la nécessité de développer la sécurité de tous les échanges informatiques. Toutes les industries ainsi que les administrations sont concernées par ce développement : la sécurité des échanges informatiques ainsi que l’e-administration sont des exemples dans lesquels peut intervenir la cryptographie. Et les fonctions booléennes, en particulier, jouent un rôle central dans le design de la plupart des crypto-systèmes symétriques et leur sécurité. L’ouvrage en anglais, fruit d’un colloque international tenu à Roeun, fait le point sur ces différents systèmes.
This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.
This book constitutes the refereed proceedings of the Third International Conference on Autonomic and Trusted Computing, ATC 2006, held in Wuhan, China in September 2006. The 57 revised full papers presented together with two keynotes were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections.
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security.
Prominent international experts came together to present and debate the latest findings in the field at the 2007 International Workshop on Multimedia Content Analysis and Mining. This volume includes forty-six papers from the workshop as well as thirteen invited papers. The papers cover a wide range of cutting-edge issues, including all aspects of multimedia in the fields of entertainment, commerce, science, medicine, and public safety.
This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC 2004, held in Wuhan, China in October 2004. Also included are selected refereed papers from two workshops associated with NPC 2004. The 46 revised full papers and 23 revised short papers presented together with abstracts of 5 invited presentations were selected from a total of 338 submissions. The 25 workshop revised papers included also were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on grid computing, peer-to-peer computing, Web techniques, cluster computing, parallel programming environments, network architecture, network security, network storage, intelligent sensor networks, and multimedia modeling and security in next generation network information systems.
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography. *The conference was held virtually due to the COVID-19 pandemic.
This book constitutes the refereed proceedings of the First International Workshop on the Arithmetic of Finite Fields, WAIFI 2007, held in Madrid, Spain in June 2007. It covers structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, classification and construction of mappings over finite fields, curve algebra, cryptography, codes, and discrete structures.
We are delighted to introduce the proceedings of the EAI Urb-IoT 2021. The theme of the 2021 EAI Urb-IoT International Conference was "Future Technologies Inspired by AI and IoT Technologies: A Series of More Advanced and More Useful AI Applications". The proceedings include 27 full papers. The conference tracks were: Track 1 - Handwriting Recognition Based on Deep Learning; Track 2 - Application of artificial intelligence technology in the field of smart education; Track 3 - Algorithm Research of Machine Vision; Track 4 - Development of asset management system based on artificial intelligence technology; Track 5 - Research on Intelligent Water Conservancy System Using Artificial Intelligence Algorithm; Track 6 - Application of Internet of Things Technology in Engineering. We firmly believe that the 2021 EAI Urb-IoT International Conference provided a great forum for all researchers, developers and practitioners. We also expect future 2021 EAI Urb-IoT International Conferences to be equally successful.
This book constitutes the refereed procedings of the 6th International Conference on Autonomic and Trusted Computing, ATC 2009, held in Brisbane, Australia, in July 2009, co-located with UIC 2009, the 6th International Conference on Ubiquitous Intelligence and Computing. The 17 revised full papers presented together with one invited paper and one keynote talk were carefully reviewed and selected from 52 submissions. The regular papers are organized in topical sections on organic and autonomic computing, trusted computing, wireless sensor networks, and trust.