You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010. The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.
The rise of the economic power of the ethnic Chinese, known also as overseas Chinese, Chinese overseas or Chinese diaspora, was a late 20th century phenomenon. It was partly the result of the rise of the Four Little Asian Dragons in the 1970s, and was speeded up by the tempo of globalization towards the end of that century. This book explores the ethnic identity and boundary of the Chinese as minority groups in foreign lands, and as sub-groups among the Chinese themselves. It examines prominent personalities that had wielded considerable influence in the ethnic Chinese communities in the economic, social and educational arenas. It also discusses the type of politics that had impacted their relationship with their mother country — China.Containing 16 papers presented at various international conferences in Singapore, Malaysia, Hong Kong, China and Taiwan as keynote speeches and research findings which are predominantly unpublished in English, this book provides fresh perspectives and re-interpretations on the issues of ethnicity, leadership and politics in the ethnic Chinese worlds.
During the 1920s, China's intellectuals called for a new literature, system of thought and orientation towards modern life: the May Fourth Movement or the New Culture Movement spilled beyond China to the overseas Chinese communities. This work analyzes the New Culture Movement from a diaspora perspective of the overseas Chinese in Singapore.
This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.* The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. *Due to the COVID-19 pandemic the conference was held online.
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection. Homomorphic encryption has the potential to be a game-changer for the industry and cloud industry. HE method in cloud computing is presented in this book as a solution to increase the security of the data. Moreover, this book provides details about the set of fundamentals of cryptography, classical HE systems, properties of HE schemes, challenges and opportunities in HE methods, key infrastructure, problem of key management, key sharing, current algorithmic strategies and its limitation in implementation for solving complex problems in financial cryptography, application in blockchain, multivariate cryptosystems based on quadratic equations to avoid the explosion of the coefficients.
This succinct, readable introduction to Chinese migration traces the huge population movements both within China and beyond its borders over thousands of years. Distinguished historian Diana Lary explores these migrations and the key roles they have played in Chinese history. She sees migration as a broad spectrum of movement, from short-term and short-range to permanent and long-range, and as a powerful vehicle for the transfer of commodities, culture, religion, and political influence. Her book will be compelling for all readers who want to understand the context for the present internal and international migrations that have changed the face of China itself and its international relations.
This book constitutes the proceedings of the 6th International Conference on Information Security Practice and Experience, ISPEC 2010, held in Seoul, Korea, in May 2010. The 28 papers presented in this volume were carefully reviewed and selected from 91 submissions. They are grouped in sections on cryptanalysis, algorithms and implementations, network security, access control, identity management, trust management, public key cryptography, and security applications.
This book constitutes the refereed proceedings of the 21th International Conference on Information and Communications Security, ICICS 2019, held in Beijing, China, in December 2019. The 47 revised full papers were carefully selected from 199 submissions. The papers are organized in topics on malware analysis and detection, IoT and CPS security enterprise network security, software security, system security, authentication, applied cryptograph internet security, machine learning security, machine learning privacy, Web security, steganography and steganalysis.
This book constitutes the proceedings of the 11th International Conference on Network and System Security, NSS 2017, held in Helsinki, Finland, in August 2017. The 24 revised full papers presented in this book were carefully reviewed and selected from 83 initial submissions. The papers are organized in topical sections on Cloud and IoT Security; Network Security; Platform and Hardware Security; Crypto and Others; and Authentication and Key Management. This volume also contains 35 contributions of the following workshops: Security Measurements of Cyber Networks (SMCN-2017); Security in Big Data (SECBD-2017); 5G Security and Machine Learning (IW5GS-2017); of the Internet of Everything (SECIOE-2017).