You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.
This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile application security and privacy.
This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully reviewed and selected from 1013 submissions. Overall, a total of 224 full and 81 short papers were accepted for ICAIS 2021; the other accepted papers are presented in CCIS 1422-1424. The papers were organized in topical sections as follows: Part I: Artificial intelligence; and big data Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on cryptanalysis; signature and signcryption; key exchange; private computations; cipher design and analysis; public key cryptography; network and system security; hardware security; and web security.
Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents
This book constitutes the thoroughly refereed post-proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2006, held in Guangzhou, China in November 2006. The 116 revised papers presented were carefully reviewed and selected from a total of 2078 initial submissions during two rounds of revision and improvement. The papers are organized in topical sections on bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information processing and intrusion detection, systems and security, image and signal processing, as well as pattern recognition.
This proceedings contains the papers presented at The 8th International Symposium on Practical Design of Ships and Other Floating Structures held in China in September 2001 - the first PRADS of the 21st Century. The overall aim of PRADS symposia is to advance the design of ships and other floating structures as a professional discipline and science by exchanging knowledge and promoting discussion of relevant topics in the fields of naval architecture and marine and offshore engineering. In line with the aim, in welcoming the new era, this Symposium is intended to increase international co-operation and give a momentum for the new development of design and production technology of ships and o...
This book constitutes the refereed proceedings of the Second SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006, held in Beijing, China in November/December 2006. The 23 revised full papers cover digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.
This book aims at the tiny machine learning (TinyML) software and hardware synergy for edge intelligence applications. It presents on-device learning techniques covering model-level neural network design, algorithm-level training optimization, and hardware-level instruction acceleration. Analyzing the limitations of conventional in-cloud computing would reveal that on-device learning is a promising research direction to meet the requirements of edge intelligence applications. As to the cutting-edge research of TinyML, implementing a high-efficiency learning framework and enabling system-level acceleration is one of the most fundamental issues. This book presents a comprehensive discussion of...
Annotation. This book constitutes the refereed proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2010, held in Singapore, in December 2010. The 35 revised full papers presented were carefully reviewed and selected from 216 submissions. The papers are organized in topical sections on hash attacks; symmetric-key cryptosystems; block and stream ciphers; protocols; key exchange; foundation; zero-knowledge; lattice-based cryptography; secure communication and computation; models, notions, and assumptions; and public-key encryption.