You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009. The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.
This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.
There are few more important areas of current research than this, and here, Springer has published a double helping of the latest work in the field. That’s because the book contains the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, and the co-located 1st International Workshop on Usable Security, both held in Trinidad/Tobago in February 2007. Topics covered include payment systems and authentication.
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.
This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.
This book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017. The 34 papers presented in this volume were carefully reviewed and selected from 149 submissions. The topics focus on innovative research and current developments that advance the areas of applied cryptography, security analysis, cyber security and privacy, data and server security.
This new volume focuses on materials used for energy generation and includes a wide spectrum of applications to solve alternative energy issues. The book reviews the state-of-the-art issues in global energy problems and reports on advanced methods of preparation of nanoscale energy materials with explanations of the structure and properties. It highlights current developments in the energy sector from the materials angle along with new techniques. Topics include polymer nanocomposites with smart behavior and their applicability of in energy applications; magnetorheological and electrorheological properties of smart polymer systems and their energy-related applications; metal-organic frameworks-emerging porous materials for energy applications; applications of carbon nanotubes in energy harvesting and storage; new developments in piezoelectric materials; and much more.
Providing the reader with an up-to-date digest of the most important current research carried out in the field, this volume is compiled and written by leading experts from across the globe. It reviews the trends in electrochemical sensing and its applications and touches on research areas from a diverse range, including microbial fuel cells, 3D printing electrodes for energy conversion and electrochemical and electrochromic colour switching in metal complexes and polymers. Coverage is extensive and will appeal to a broad readership from chemists and biochemists to engineers and materials scientists. The reviews of established and current interests in the field make this book a key reference for researchers in this exciting and developing area.
This new book discusses a selection of advanced topics on carbon nanotubes—their extraordinary properties, structure, design, fabrication, development, engineering, functionalization, carbon nanotube enabled nanocomposites, characterization, and, moreover, their utility in many applications. The volume highlights the amazing potential of advanced CNT composites in automotive, aeronautics, spacecrafts, transistors replacing Si electronics, energy, purification, hydrogen storage, tissue regeneration, electrochemical supercapacitors, sensing, biomedical applications, agriculture, energy, and technical applications. The book specifically discusses the applications of carbon nanotubes for a greener environment, as well as applications for biomedical uses, in drug delivery, and in display technology. It also explores the uses of CNTs in the energy and aerospace industries, such as for solar energy conversion, as a lubricant additive for enhancing energy efficiency, and more. Other chapters explore the potential of carbon nanotubes in hydrogen storage and carbon nanotube electronics.
This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26 revised papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, biometrics, multimedia security, network security and authentication.