Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Information Security and Privacy
  • Language: en
  • Pages: 504

Information Security and Privacy

This book constitutes the refereed proceedings of the 9th Australasian Conference on Information Security and Privacy, ACISP 2004, held in Sydney, Australia in July 2004. The 41 revised full papers presented were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on broadcast encryption and traitor tracing, private information retrieval and oblivious transfer, trust and secret sharing, cryptanalysis, digital signatures, cryptosystems, fast computation, mobile agents security, protocols, security management, and access control and authorization.

Intelligent Systems and Applications
  • Language: en
  • Pages: 2244

Intelligent Systems and Applications

  • Type: Book
  • -
  • Published: 2015-04-14
  • -
  • Publisher: IOS Press

This book presents the proceedings of the International Computer Symposium 2014 (ICS 2014), held at Tunghai University, Taichung, Taiwan in December. ICS is a biennial symposium founded in 1973 and offers a platform for researchers, educators and professionals to exchange their discoveries and practices, to share research experiences and to discuss potential new trends in the ICT industry. Topics covered in the ICS 2014 workshops include: algorithms and computation theory; artificial intelligence and fuzzy systems; computer architecture, embedded systems, SoC and VLSI/EDA; cryptography and information security; databases, data mining, big data and information retrieval; mobile computing, wireless communications and vehicular technologies; software engineering and programming languages; healthcare and bioinformatics, among others. There was also a workshop on information technology innovation, industrial application and the Internet of Things. ICS is one of Taiwan's most prestigious international IT symposiums, and this book will be of interest to all those involved in the world of information technology.

Smart Wireless Sensor Networks
  • Language: en
  • Pages: 434

Smart Wireless Sensor Networks

The recent development of communication and sensor technology results in the growth of a new attractive and challenging area - wireless sensor networks (WSNs). A wireless sensor network which consists of a large number of sensor nodes is deployed in environmental fields to serve various applications. Facilitated with the ability of wireless communication and intelligent computation, these nodes become smart sensors which do not only perceive ambient physical parameters but also be able to process information, cooperate with each other and self-organize into the network. These new features assist the sensor nodes as well as the network to operate more efficiently in terms of both data acquisi...

Information Security and Privacy
  • Language: en
  • Pages: 546

Information Security and Privacy

This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003. The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on privacy and anonymity, elliptic curve cryptography, cryptanalysis, mobile and network security, digital signatures, cryptosystems, key management, and theory and hash functions.

Emergent Web Intelligence: Advanced Information Retrieval
  • Language: en
  • Pages: 496

Emergent Web Intelligence: Advanced Information Retrieval

This volume reviews cutting-edge technologies and insights related to XML-based and multimedia information access and data retrieval. And by applying new techniques to real-world scenarios, it details how organizations can gain competitive advantages.

Information Networking
  • Language: en
  • Pages: 1044

Information Networking

This book constitutes the thoroughly refereed post-proceedings of the International Conference on Information Networking, ICOIN 2003, held at Cheju Island, Korea in February 2003. The 100 revised full papers presented were carefully selected during two rounds of reviewing and revision. The papers are organized in topical sections on high-speed network technologies, enhanced Internet protocols, QoS in the Internet, mobile Internet, network security, network management, and network performance.

Geo-Spatial Knowledge and Intelligence
  • Language: en
  • Pages: 708

Geo-Spatial Knowledge and Intelligence

  • Type: Book
  • -
  • Published: 2018-06-12
  • -
  • Publisher: Springer

This two-volume set (CCIS 848 and CCIS 849) constitutes the thoroughly refereed proceedings of the 5th International Conference Geo-Spatial Knowledge and Intelligence, GSKI 2017, held in Chiang Mai, Thailand, in December 2018.The 142 full papers presented were carefully reviewed and selected from 579 submissions. They are organized in topical sections on smart city in resource management and sustainable ecosystem; spatial data acquisition through RS and GIS in resource management and sustainable ecosystem; ecological and environmental data processing and management; advanced geospatial model and analysis for understanding ecological and environmental process; applications of geo-informatics in resource management and sustainable ecosystem.

Personal Wireless Communications
  • Language: en
  • Pages: 544

Personal Wireless Communications

This book constitutes the refereed proceedings of the IFIP-TC6 11th International Conference on Personal Wireless Communications, PWC 2006. The book presents 25 revised full papers and 13 revised short papers, carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on mobile and wireless networking, QoS, ad-hoc, security, wireless LAN, cross-layer design, wireless sensor networks, physical layer, and mobile and wireless applications.

Protocols for Authentication and Key Establishment
  • Language: en
  • Pages: 343

Protocols for Authentication and Key Establishment

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Future Information Technology, Application, and Service
  • Language: en
  • Pages: 762

Future Information Technology, Application, and Service

This book is proceedings of the 7th FTRA International Conference on Future Information Technology (FutureTech 2012). The topics of FutureTech 2012 cover the current hot topics satisfying the world-wide ever-changing needs. The FutureTech 2012 is intended to foster the dissemination of state-of-the-art research in all future IT areas, including their models, services, and novel applications associated with their utilization. The FutureTech 2012 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in this area. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and p...