You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents selected papers from the 10th International Conference on Information Science and Applications (ICISA 2019), held on December 16–18, 2019, in Seoul, Korea, and provides a snapshot of the latest issues regarding technical convergence and convergences of security technologies. It explores how information science is at the core of most current research as well as industrial and commercial activities. The respective chapters cover a broad range of topics, including ubiquitous computing, networks and information systems, multimedia and visualization, middleware and operating systems, security and privacy, data mining and artificial intelligence, software engineering and web technology, as well as applications and problems related to technology convergence, which are reviewed and illustrated with the aid of case studies. Researchers in academia, industry, and at institutes focusing on information science and technology will gain a deeper understanding of the current state of the art in information strategies and technologies for convergence security.
This eBook is a collection of articles from a Frontiers Research Topic. Frontiers Research Topics are very popular trademarks of the Frontiers Journals Series: they are collections of at least ten articles, all centered on a particular subject. With their unique mix of varied contributions from Original Research to Review Articles, Frontiers Research Topics unify the most influential researchers, the latest key findings and historical advances in a hot research area! Find out more on how to host your own Frontiers Research Topic or contribute to one as an author by contacting the Frontiers Editorial Office: frontiersin.org/about/contact.
This book constitutes selected papers from the 23rd International Conference on Information Security and Cryptology, ICISC 2020, held in Seoul, South Korea, in December 2020. Due to the COVID-19, the confere was held online. The total of 15 papers presented in this volume were carefully reviewed and selected from 51 submissions. The aim of this conference was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptology.
This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009. The 28 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on number theory, applications and protocols, multi-party protocols, identity-based encryption, signatures, encryption, new cryptosystems and optimizations, as well as group signatures and anonymous credentials.
This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008. The 33 revised full papers presented together with the abstract of 1 invited lecture were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash functions, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and analysis of stream ciphers.
This two-volume set LNCS 10305 and LNCS 10306 constitutes the refereed proceedings of the 14th International Work-Conference on Artificial Neural Networks, IWANN 2017, held in Cadiz, Spain, in June 2017. The 126 revised full papers presented in this double volume were carefully reviewed and selected from 199 submissions. The papers are organized in topical sections on Bio-inspired Computing; E-Health and Computational Biology; Human Computer Interaction; Image and Signal Processing; Mathematics for Neural Networks; Self-organizing Networks; Spiking Neurons; Artificial Neural Networks in Industry ANNI'17; Computational Intelligence Tools and Techniques for Biomedical Applications; Assistive R...
High voltage engineering is extremely important for the reliable design, safe manufacture and operation of electric devices, equipment and electric power systems. The 21st International Symposium on High Voltage Engineering, organized by the 90 years old Budapest School of High Voltage Engineering, provides an excellent forum to present results, advances and discussions among engineers, researchers and scientists, and share ideas, knowledge and expertise on high voltage engineering. The proceedings of the conference presents the state of the art technology of the field. The content is simultaneously aiming to help practicing engineers to be able to implement based on the papers and researchers to link and further develop ideas.
This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in Okinawa, Japan, in November 2013. The 20 revised selected papers presented in this volume were carefully reviewed and selected from 63 submissions. They are organized in topical sections named: software and system security, cryptanalysis, privacy and cloud computing, public key cryptosystems, and security protocols.
This book constitutes the refereed proceedings of the 10th International Conference on Computer Vision Systems, ICVS 2015, held in Copenhagen, Denmark, in July 2015. The 48 papers presented were carefully reviewed and selected from 92 submissions. The paper are organized in topical sections on biological and cognitive vision; hardware-implemented and real-time vision systems; high-level vision; learning and adaptation; robot vision; and vision systems applications.
Reflecting the rapid progress in the field, the book presents the current understanding of molecular mechanisms of post-transcriptional gene regulation thereby focusing on RNA processing mechanisms in eucaryotic cells. With chapters on mechanisms as RNA splicing, RNA interference, MicroRNAs, RNA editing and others, the book also discusses the critical role of RNA processing for the pathogenesis of a wide range of human diseases. The interdisciplinary importance of the topic makes the title a useful resource for a wide reader group in science, clinics as well as pharmaceutical industry.