Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Advances in Artificial Reality and Tele-Existence
  • Language: en
  • Pages: 1367

Advances in Artificial Reality and Tele-Existence

This book constitutes the refereed proceedings of the 16th International Conference on Artificial Reality and Telexistence, ICAT 2006, held in Hangzhou, China in November/December 2006. The 138 revised papers cover anthropomorphic intelligent robotics, artificial life, augmented reality, distributed and collaborative VR system, motion tracking, real time computer simulation virtual reality, as well as VR interaction and navigation techniques.

Technical Reports Awareness Circular : TRAC.
  • Language: en
  • Pages: 746

Technical Reports Awareness Circular : TRAC.

  • Type: Book
  • -
  • Published: 1987
  • -
  • Publisher: Unknown

None

Information Security Applications
  • Language: en
  • Pages: 396

Information Security Applications

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009. The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.

Verdictsearch California Reporter
  • Language: en
  • Pages: 568

Verdictsearch California Reporter

  • Type: Book
  • -
  • Published: 2008
  • -
  • Publisher: Unknown

None

Information Security Applications
  • Language: en
  • Pages: 363

Information Security Applications

This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010. The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.

Information Security Applications
  • Language: en
  • Pages: 418

Information Security Applications

This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006. Coverage in the 30 revised full papers includes public key crypto applications and virus protection, cyber indication and intrusion detection, biometrics and security trust management, secure software and systems, smart cards and secure hardware, and mobile security.

COTS-Based Software Systems
  • Language: en
  • Pages: 328

COTS-Based Software Systems

This book constitutes the refereed proceedings of the 4th International Conference on COTS-Based Software Systems, ICCBSS 2005, held in Bilbao, Spain in February 2005. The 28 revised full papers presented together with summaries of panels, workshops, tutorials, and posters were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on COTS at business, integration and interoperability, evaluation and requirements, safety and dependability, architecture and design, COTS management, and open source software.

Information Security Applications
  • Language: en
  • Pages: 344

Information Security Applications

workshop.

Information Security Applications
  • Language: en
  • Pages: 381

Information Security Applications

  • Type: Book
  • -
  • Published: 2012-11-15
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.

Information Security Applications
  • Language: en
  • Pages: 482

Information Security Applications

This book constitutes the refereed proceedings of the 5th International Workshop on Information Security Applications, WISA 2004, held in Jeju Island, Korea in August 2004. The 36 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 169 submissions. The papers are organized in topical sections on network and computer security, public key systems, intrusion detection, watermarking and anti-spamming, digital rights management, e-commerce security, efficient implementations, anonymous communication, and side channel attacks.