Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Information Security and Privacy
  • Language: en
  • Pages: 472

Information Security and Privacy

  • Type: Book
  • -
  • Published: 2012-07-04
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.

Cryptography and Coding
  • Language: en
  • Pages: 432

Cryptography and Coding

This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with two invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation.

Algorithms and Computation
  • Language: en
  • Pages: 951

Algorithms and Computation

This book constitutes the refereed proceedings of the 15th International Symposium on Algorithms and Computation, ISAAC 2004, held in Hong Kong, China in December 2004. The 76 revised full papers presented were carefully reviewed and selected from 226 submissions. Among the topics addressed are computational geometry, graph computations, computational combinatorics, combinatorial optimization, computational complexity, scheduling, distributed algorithms, parallel algorithms, data structures, network optimization, randomized algorithms, and computational mathematics more generally.

Advances in Information and Computer Security
  • Language: en
  • Pages: 272

Advances in Information and Computer Security

  • Type: Book
  • -
  • Published: 2012-11-02
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012. The 16 revised selected papers presented in this volume were carefully reviewed and selected from 53 submissions. They are organized in topical sections named: implementation; encryption and key exchange; cryptanalysis; and secure protocols.

Fast Software Encryption
  • Language: en
  • Pages: 394

Fast Software Encryption

  • Type: Book
  • -
  • Published: 2010-06-27
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 17th International Workshop on Fast Software Encryption, held in Seoul, Korea, in February 2010.

Radio Frequency Identification System Security
  • Language: en
  • Pages: 148

Radio Frequency Identification System Security

  • Type: Book
  • -
  • Published: 2013-11-07
  • -
  • Publisher: IOS Press

Our reliance on ever more sophisticated computer systems for the management of data and information means that the field of security and privacy technology continues to be of crucial importance to us all. This book presents ten peer-reviewed papers from the 2013 workshop Radio Frequency Identification/Internet of Things Security (RFIDsec’13 Asia) held in Guangzhou, China, in November 2013. This is the fifth of a series of workshops organized by the Asian branch of RFIDsec, which provides a platform for researchers, enterprises and governments to investigate, discuss and propose new solutions for the security and privacy issues related to RFID/IoT technologies and applications. Topics covered include RFID authentication, mutual authentication and ownership transfer, security of RFID applications, NFC and the Internet of Things, as well as side channel attacks. The book will be of interest to all those whose work involves the security aspects of information management.

Applied Soft Computing and Communication Networks
  • Language: en
  • Pages: 268

Applied Soft Computing and Communication Networks

This book constitutes best selected research papers presented at the International Applied Soft Computing and Communication Networks (ACN 2019) held in Trivandrum, Kerala, India during December 18 – 21, 2019. The papers are organized in topical sections on real time and multimedia communications, security and privacy, network management and software-defined networks, Internet of Things (IoT) and cyber-physical systems, intelligent distributed systems, mobile computing and vehicle communications, surveillance networks and visual intelligence, and emerging topics. The book is a reference for researchers and scientists engaged in various fields of intelligent systems.

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks
  • Language: en
  • Pages: 237

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.

Cyberspace Safety and Security
  • Language: en
  • Pages: 381

Cyberspace Safety and Security

This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi’an, China, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104 initial submissions. The papers focus on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.

Graph Grammars and Their Application to Computer Science
  • Language: en
  • Pages: 724

Graph Grammars and Their Application to Computer Science

This volume contains papers selected from the contributions to the 4th International Workshop on Graph Grammars and Their Application to Computer Science. It is intended to provide a rich source of information on the stateof the art and newest trends to researchers active in the area and for scientists who would like to know more about graph grammars. The topics of the papers range from foundations through algorithmic and implemental aspects to various issues that arise in application areas like concurrent computing, functional and logic programming, software engineering, computer graphics, artificial intelligence and biology. The contributing authors are F.-J. Brandenburg, H. Bunke, T.C. Chen, M. Chytil, B. Courcelle, J. Engelfriet, H. G|ttler, A. Habel, D. Janssens, C. Lautemann, B. Mayoh, U. Montanari, M. Nagl, F. Parisi-Presicci, A. Paz, P. Prusinkiewics, M.R. Sleep, A. Rosenfeld, J. Winkowski and others.