You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents select proceedings of 11th International Conference on Information Science and Applications 2020 (ICISA 2020) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. Also the proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this book, readers can gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.
This wholly original reassessment of critical issues in modern Chinese history traces social, economic, and ecological change in inland North China during the late Qing dynasty and the Republic. Using many new sources, Kenneth Pomeranz argues that the development of certain regions entailed the systematic underdevelopment of other regions. He maps changes in local finance, farming, transportation, taxation, and popular protest, and analyzes the consequences for different classes, sub-regions, and genders. Pomeranz attributes these diverse developments to several causes: the growing but incomplete integration of North China into the world economy, the state's abandonment of many hinterland areas and traditional functions, and the effect of local social structures on these processes. He shows that hinterlands were made, not merely found, and were powerfully shaped by the strategies of local groups as well as outside forces.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.
The two-volume set IFIP AICT 419 and 420 constitutes the refereed post-conference proceedings of the 7th IFIP TC 5, WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2013, held in Beijing, China, in September 2013. The 115 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including Internet of things and cloud computing; simulation models and decision-support systems for agricultural production; smart sensor, monitoring, and control technology; traceability and e-commerce technology; computer vision, computer graphics, and virtual reality; the application of information and communication technology in agriculture; and universal information service technology and service systems development in rural areas.
Selected, peer reviewed papers from the 2013 International Conference on Civil, Architecture and Building Materials, (3rd CEABM 2013), May 24-26, 2013, Jinan, China
This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 142 full papers presented in this two-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: Artificial intelligence and internet of things. Part II: Internet of things, information security, big data and cloud computing, and information processing.
Selected, peer reviewed papers from the International Conference on Chemical, Material and Metallurgical Engineering (ICCMME 2011), December 23-25, 2011, Beihai, China
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.
The result of painstaking research by a renowned Sinologist, this compilation consists of over 3,100 biographical entries and detailed descriptions of individuals who used to play a decisive role in the People's Republic of China, including: -- Government officials, such as ministers or ambassadors -- Provincial cadres and cultural commissioners -- Party officials and functionaries of mass organizations Covering recently deceased personalities as well as figures who have retired, been exiled, disappeared, or withdrawn from public life for other reasons, Bartke has created an invaluable working tool for both historical and contemporary studies.