Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Information Security and Privacy
  • Language: en
  • Pages: 658

Information Security and Privacy

This book constitutes the refereed proceedings of the 28th Australasian Conference on Information Security and Privacy, ACISP 2023, held in Brisbane, QLD, Australia, during July 5-7, 2023. The 27 full papers presented were carefully revised and selected from 87 submissions. The papers present and discuss different aspects of symmetric-key cryptography, public-key cryptography, post-quantum cryptography, cryptographic protocols, and system security.

Advances in Cryptology – ASIACRYPT 2018
  • Language: en
  • Pages: 673

Advances in Cryptology – ASIACRYPT 2018

  • Type: Book
  • -
  • Published: 2018-11-22
  • -
  • Publisher: Springer

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Advances in Cryptology – EUROCRYPT 2022
  • Language: en
  • Pages: 842

Advances in Cryptology – EUROCRYPT 2022

The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May – 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.

Advances in Cryptology – ASIACRYPT 2020
  • Language: en
  • Pages: 912

Advances in Cryptology – ASIACRYPT 2020

The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic. The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

Computational Intelligence and Efficiency in Engineering Systems
  • Language: en
  • Pages: 435

Computational Intelligence and Efficiency in Engineering Systems

  • Type: Book
  • -
  • Published: 2015-03-10
  • -
  • Publisher: Springer

This carefully edited and reviewed volume addresses the increasingly popular demand for seeking more clarity in the data that we are immersed in. It offers excellent examples of the intelligent ubiquitous computation, as well as recent advances in systems engineering and informatics. The content represents state-of-the-art foundations for researchers in the domain of modern computation, computer science, system engineering and networking, with many examples that are set in industrial application context. The book includes the carefully selected best contributions to APCASE 2014, the 2nd Asia-Pacific Conference on Computer Aided System Engineering, held February 10-12, 2014 in South Kuta, Bali, Indonesia. The book consists of four main parts that cover data-oriented engineering science research in a wide range of applications: computational models and knowledge discovery; communications networks and cloud computing; computer-based systems; and data-oriented and software-intensive systems.

Cyberspace
  • Language: en
  • Pages: 186

Cyberspace

Parallel to the physical space in our world, there exists cyberspace. In the physical space, there are human and nature interactions that produce products and services. On the other hand, in cyberspace there are interactions between humans and computer that also produce products and services. Yet, the products and services in cyberspace don’t materialize—they are electronic, they are millions of bits and bytes that are being transferred over cyberspace infrastructure.

Postrevolutionary Iran
  • Language: en

Postrevolutionary Iran

The 1979 revolution fundamentally altered Iran’s political landscape as a generation of inexperienced clerics who did not hail from the ranks of the upper class—and were not tainted by association with the old regime—came to power. The actions and intentions of these truculent new leaders and their lay allies caused major international concern. Meanwhile, Iran’s domestic and foreign policy and its nuclear program have loomed large in daily news coverage. Despite global consternation, however, our knowledge about Iran’s political elite remains skeletal. Nearly four decades after the clergy became the state elite par excellence, there has been no empirical study of the recruitment, c...

The Iranian Political Language
  • Language: en
  • Pages: 411

The Iranian Political Language

  • Type: Book
  • -
  • Published: 2015-10-14
  • -
  • Publisher: Springer

In this detailed study of modern Iran, Yadullah Shahibzadeh examines changes in people's understanding of politics and democracy. The book aims to overcome the shortcomings of traditional historiography by challenging the monopoly of intellectuals' perspectives and demonstrating the intellectual and political agency of the ordinary people.

Fuzzy Sets, Fuzzy Logic, And Fuzzy Systems: Selected Papers By Lotfi A Zadeh
  • Language: en
  • Pages: 842

Fuzzy Sets, Fuzzy Logic, And Fuzzy Systems: Selected Papers By Lotfi A Zadeh

This book consists of selected papers written by the founder of fuzzy set theory, Lotfi A Zadeh. Since Zadeh is not only the founder of this field, but has also been the principal contributor to its development over the last 30 years, the papers contain virtually all the major ideas in fuzzy set theory, fuzzy logic, and fuzzy systems in their historical context. Many of the ideas presented in the papers are still open to further development. The book is thus an important resource for anyone interested in the areas of fuzzy set theory, fuzzy logic, and fuzzy systems, as well as their applications. Moreover, the book is also intended to play a useful role in higher education, as a rich source ...

Applied Cryptography and Network Security
  • Language: en
  • Pages: 562

Applied Cryptography and Network Security

This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.