You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability.
This book constitutes the refereed proceedings of the 17th International Symposium Fundamentals of Computation Theory, FCT 2009, held in Wroclaw, Poland in August 2009. The 29 revised full papers were carefully reviewed and selected from 67 submissions. The papers address all current topics in computation theory such as automata and formal languages, design and analysis of algorithms, computational and structural complexity, semantics, logic, algebra and categories in computer science, circuits and networks, learning theory, specification and verification, parallel and distributed systems, concurrency theory, cryptography and cryptograhic protocols, approximation and randomized algorithms, computational geometry, quantum computation and information, bio-inspired computation.
This book constitutes the thoroughly refereed post-proceedings of the7th International Workshop on Information Hiding, IH 2005, held in Barcelona, Spain in June 2005. The 28 revised full papers presented together with an invited talk werecarefully selected from 90 papers submitted. The papers are organized in topical sections on anonymity, watermarking, theory, watermark attacks, steganography, hiding in unusual content, steganalysis, software watermarking, and fingerprinting.
This book constitutes the refereed proceedings of the three workshops that were organized in conjunction with the International Conference on Business Information Systems, BIS 2011, which took place in Poznań, Poland, June 15-17, 2011. The 18 workshop papers presented were carefully reviewed and selected from 38 submissions. The topics covered are applications and economics of knowledge-based technologies (AKTB), business and IT alignment (BITA), and legal information systems (LIT). In addition, eight papers from the co-located Business Process and Services Computing Conference (BPSC) are also included in this volume.
This book contains the invited and contributed papers selected for presentation at SOFSEM 2021, the 47th International Conference on Current Trends in Theory and Practice of Computer Science, which was held online during January 25–28, 2021, hosted by the Free University of Bozen-Bolzano, Italy. The 33 full and 7 short papers included in the volume were carefully reviewed and selected from 100 submissions. They were organized in topical sections on: foundations of computer science; foundations of software engineering; foundations of data science and engineering; and foundations of algorithmic computational biology. The book also contains 5 invited papers.
This book constitutes the refereed proceedings of the 5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021, held in Be'er Sheva, Israel, in July 2021. The 22 full and 13 short papers presented together with a keynote paper in this volume were carefully reviewed and selected from 48 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
This book constitutes the reviewed proceedings of the Second International Workshop on Algorithmic Aspects of Wireless Sensor Networks, ALGOSENSORS 2006, held in Venice, Italy in July 2006, in association with ICALP 2006. Topics addressed are foundational and algorithmic aspects of the wireless sensor networks research. In particular, ALGOSENSORS focuses on abstract models, complexity-theoretic results and lower-bounds.
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and applications to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-Stamping, Certificate Validation & Revocation and Cryptographic Applications.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence.
This book constitutes the reviewed proceedings of the 5th International Workshop on Algorithmic Aspects of Wireless Sensor Networks, ALGOSENSORS 2009, held in Rhodes, Greece, July 10-11, 2009. The 21 full papers and two brief announcements were carefully selected from 41 submissions. This workshops aimed at bringing together research contributions related to diverse algorithmic and complexity-theoretic aspects of wireless sensor networks. The topics include but are not limited to optimization problems, noise and probability, robots and tours.