You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 16th International Conference on Artificial Reality and Telexistence, ICAT 2006, held in Hangzhou, China in November/December 2006. The 138 revised papers cover anthropomorphic intelligent robotics, artificial life, augmented reality, distributed and collaborative VR system, motion tracking, real time computer simulation virtual reality, as well as VR interaction and navigation techniques.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009. The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.
This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010. The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006. Coverage in the 30 revised full papers includes public key crypto applications and virus protection, cyber indication and intrusion detection, biometrics and security trust management, secure software and systems, smart cards and secure hardware, and mobile security.
This book constitutes the refereed proceedings of the 4th International Conference on COTS-Based Software Systems, ICCBSS 2005, held in Bilbao, Spain in February 2005. The 28 revised full papers presented together with summaries of panels, workshops, tutorials, and posters were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on COTS at business, integration and interoperability, evaluation and requirements, safety and dependability, architecture and design, COTS management, and open source software.
workshop.
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.
This book constitutes the refereed proceedings of the 5th International Workshop on Information Security Applications, WISA 2004, held in Jeju Island, Korea in August 2004. The 36 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 169 submissions. The papers are organized in topical sections on network and computer security, public key systems, intrusion detection, watermarking and anti-spamming, digital rights management, e-commerce security, efficient implementations, anonymous communication, and side channel attacks.