You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the Third International Information Security Practice and Experience Conference, ISPEC 2007, held in Hong Kong, China, May 2007. The 24 revised full papers presented with two invited papers cover cryptanalysis, signatures, network security and security management, privacy and applications, cryptographic algorithms and implementations, authentication and key management, as well as cryptosystems.
This book constitutes the refereed proceedings of the 9th Australasian Conference on Information Security and Privacy, ACISP 2004, held in Sydney, Australia in July 2004. The 41 revised full papers presented were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on broadcast encryption and traitor tracing, private information retrieval and oblivious transfer, trust and secret sharing, cryptanalysis, digital signatures, cryptosystems, fast computation, mobile agents security, protocols, security management, and access control and authorization.
This book constitutes the refereed proceedings of the 25th International Computer Symposium on New Trends in Computer Technologies and Applications, ICS 2022, which took place in Taoyuan, Taiwan, in December 2022. ICS is one of the largest joint international IT symposia held in Taiwan. Founded in 1973, it is intended to provide a forum for researchers, educators, and professionals to exchange their discoveries and practices, and to explore future trends and applications in computer technologies. The biannual symposium offers a great opportunity to share research experiences and to discuss potential new trends in the IT industry. The 58 full papers and one invited paper presented in this volume were carefully reviewed and selected from 137 submissions. The papers have been organized in the following topical sections: Invited Paper; Algorithms, Bioinformatics, and Computation Theory; Cloud Computing and Big Data; Computer Vision and Image Processing; Cryptography and Information Security; Electronics and Information Technology; Mobile Computation and Wireless Communication; Ubiquitous Cybersecurity and Forensics.
The two volume proceedings of CCIS 698 and 699 constitutes revised selected papers from the 4th International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem, GRMSE 2016, held in Hong Kong, China, in November 2016. The total of 118 papers presented in these proceedings were carefully reviewed and selected from 311 submissions. The contributions were organized in topical sections named: smart city in resource management and sustainable ecosystem; spatial data acquisition through RS and GIS in resource management and sustainable ecosystem; ecological and environmental data processing and management; advanced geospatial model and analysis for understanding ecological and environmental processes; applications of geo-informatics in resource management and sustainable ecosystem.
The book covers a wide range of topics in Computer Science and Information Technology including swarm intelligence, artificial intelligence, evolutionary algorithms, and bio-inspired algorithms. It is a collection of papers presented at the First International Conference on Intelligent Computing and Communication (ICIC2) 2016. The prime areas of the conference are Intelligent Computing, Intelligent Communication, Bio-informatics, Geo-informatics, Algorithm, Graphics and Image Processing, Graph Labeling, Web Security, Privacy and e-Commerce, Computational Geometry, Service Orient Architecture, and Data Engineering.
This book consists of sixty-seven selected papers presented at the 2015 International Conference on Software Engineering and Information Technology (SEIT2015), which was held in Guilin, Guangxi, China during June 26-28, 2015. The SEIT2015 has been an important event and has attracted many scientists, engineers and researchers from academia, government laboratories and industry internationally. The papers in this book were selected after rigorous review.SEIT2015 focuses on six main areas, namely, Information Technology, Computer Intelligence and Computer Applications, Algorithm and Simulation, Signal and Image Processing, Electrical Engineering and Software Engineering. SEIT2015 aims to provide a platform for the global researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.This conference has been a valuable opportunity for researchers to share their knowledge and results in theory, methodology and applications of Software Engineering and Information Technology.
This book constitutes the refereed proceedings of the 8th Italian Conference on Theoretical Computer Science, ICTCS 2003, held in Bertinoro, Italy in October 2003. The 27 revised full papers presented together with an invited paper and abstracts of 2 invited talks were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on program design-models and analysis, algorithms and complexity, semantics and formal languages, and security and cryptography.
This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle,WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference . The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are organized in topical sections on privacy protection and quantification, security in cloud and sensor networks and secure data managment technologies.
This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs, anti-virus, and other security products, internet and web services security, cyber-attack and cyber-terrorism, other security research, together with the articles from the workshops MoWiN 2009, NASSUE 2009, IAWSN 2009, WNGS 2009 & CGMS 2009, SHCI-ISA 2009.
The 2nd Annual 2016 International Conference on Mechanical Engineering and Control System (MECS2016) was successfully held in Wuhan, China in 2016.The MECS2016 is one of the leading international conferences for presenting novel and fundamental advances in the fields of Mechanical Engineering and Control System attended by more than 80 participants from China, South Korea, Taiwan, Japan, Malaysia, and Saudi Arabia. The MECS2016 program includes 4 keynote speeches, 98 oral and poster presentations, covering a wide spectrum of topics from mechanics engineering, control engineering and technology, to automation and mechatronics. However, after reviewed and careful consideration, only 70 articles are included in this proceedings.