You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the First International Conference on Information Systems Security, ICISS 2005, held in Calcutta, India in December 2005. The 19 revised papers presented together with 4 invited papers and 5 ongoing project summaries were carefully reviewed and selected from 72 submissions. The papers discuss in depth the current state of the research and practice in information systems security and cover the following topics: authentication and access control, mobile code security, key management and cryptographic protocols, privacy and anonymity, intrusion detection and avoidance, security verification, database and application security and integrity, security in P2P, sensor and ad hoc networks, secure Web services, fault tolerance and recovery methods for security infrastructure, threats, vulnerabilities and risk management, and commercial and industrial security.
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce. Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital m...
This book focuses on protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees.
This book presents the proceedings of the International Computer Symposium 2014 (ICS 2014), held at Tunghai University, Taichung, Taiwan in December. ICS is a biennial symposium founded in 1973 and offers a platform for researchers, educators and professionals to exchange their discoveries and practices, to share research experiences and to discuss potential new trends in the ICT industry. Topics covered in the ICS 2014 workshops include: algorithms and computation theory; artificial intelligence and fuzzy systems; computer architecture, embedded systems, SoC and VLSI/EDA; cryptography and information security; databases, data mining, big data and information retrieval; mobile computing, wireless communications and vehicular technologies; software engineering and programming languages; healthcare and bioinformatics, among others. There was also a workshop on information technology innovation, industrial application and the Internet of Things. ICS is one of Taiwan's most prestigious international IT symposiums, and this book will be of interest to all those involved in the world of information technology.
Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas. Sample Chapter(s). Chapter 1: Authentication and Confidentiality in Wireless Ad Hoc Networks (260 KB). Contents: Authentication and Confidentiality; Privacy; Routing; Reliability; Network Management and Configuration. Readership: Researchers, industry practitioners, graduate and undergraduate students in networking, network security, distributed security and sensor ad hoc security.
"This reference is a comprehensive collection of recent case studies, theories, research on digital rights management, and its place in the world today"--
The volume and complexity of biological and biomedical research continues to grow exponentially with cutting-edge technologies such as high-throughput DNA sequencing. Unfortunately, bioinformatics analysis is often considered only after data has been generated, which significantly limits the ability to make sense of complex Big Data. This unique book introduces the idea of no-boundary thinking (NBT) in biological and biomedical research, which aims to access, integrate, and synthesize data, information, and knowledge from bioinformatics to define important problems and articulate impactful research questions. NBT encourages interdisciplinary thinking from the outset so that research is hypothesis-driven rather than data-driven. This interdisciplinary volume brings together a team of bioinformatics specialists who draw on their own experiences with NBT to illustrate the importance of collaborative science. It will help stimulate discussion and application of NBT, and will appeal to all biomedical researchers looking to maximize their use of bioinformatics for making scientific discoveries.
This book constitutes the refereed proceedings of the Third IEEE Pacific Rim Conference on Multimedia, PCM 2002, held in Hsinchu, Taiwan in December 2002. The 154 revised full papers presented were carefully reviewed and selected from 224 submissions. The papers are organized in topical sections on mobile multimedia, digitial watermarking and data hiding, motion analysis, mulitmedia retrieval techniques, image processing, mulitmedia security, image coding, mulitmedia learning, audio signal processing, wireless multimedia streaming, multimedia systems in the Internet, distance education and multimedia, Internet security, computer graphics and virtual reality, object tracking, face analysis, and MPEG-4.
This book constitutes the thoroughly refereed postproceedings of the Second International Workshop on Digital Watermarking, IWDW 2003, held in Seoul, Korea, in October 2004. The 44 revised full papers presented together with 4 invited articles were carefully selected during two rounds of reviewing and improvement from more than 90 submissions. The papers address all current aspects of digital watermarking, in particular theoretical modeling, robustness, capacity, imperceptibility and the human perceptual system, security and attacks, watermarking systems and implementations, and integration of digital watermarking in digital rights management.