Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Trusted Systems
  • Language: en
  • Pages: 374

Trusted Systems

This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

Information Security and Cryptology
  • Language: en
  • Pages: 549

Information Security and Cryptology

  • Type: Book
  • -
  • Published: 2015-03-27
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.

Cryptology and Network Security
  • Language: en
  • Pages: 392

Cryptology and Network Security

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability.

Information Security and Cryptology
  • Language: en
  • Pages: 314

Information Security and Cryptology

This book constitutes the refereed proceedings of the Second SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006, held in Beijing, China in November/December 2006. The 23 revised full papers cover digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.

Business Information Systems
  • Language: en
  • Pages: 330

Business Information Systems

  • Type: Book
  • -
  • Published: 2012-05-17
  • -
  • Publisher: Springer

This book contains the refereed proceedings of the 15th International Conference on Business Information Systems, BIS 2012, held in Vilnius, Lithuania, in May 2012. The 26 revised full papers were carefully reviewed and selected from 70 submissions. They are grouped into nine sessions on business process discovery, business process verification, service architectures, collaborative BIS, data management, Web search applications, BIS in finance, decision support, and specific BIS issues. The volume is completed by an invited paper on "Information Systems and Business and Information Systems Engineering."

Information Security
  • Language: en
  • Pages: 427

Information Security

This book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020. The 23 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers cover topics of research in theory and applications of information security, such as Security and privacy and Network security as well.

Computer Security - ESORICS 2007
  • Language: en
  • Pages: 639

Computer Security - ESORICS 2007

This book constitutes the refereed proceedings of the 12th European Symposium on Research in Computer Security, ESORICS 2007, held in Dresden, Germany in September 2007. It features 39 revised full papers. ESORICS is confirmed as the European research event in computer security. It presents original research contributions, case studies and implementation experiences that address any aspect of computer security, in theory, mechanisms, applications, or practical experience.

SOFSEM 2014: Theory and Practice of Computer Science
  • Language: en
  • Pages: 548

SOFSEM 2014: Theory and Practice of Computer Science

  • Type: Book
  • -
  • Published: 2014-01-20
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 40th International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2014, held in Nový Smokovec, Slovakia, in January 2014. The 40 revised full papers presented in this volume were carefully reviewed and selected from 104 submissions. The book also contains 6 invited talks. The contributions covers topics as: Foundations of Computer Science, Software and Web Engineering, as well as Data, Information and Knowledge Engineering and Cryptography, Security and Verification.

Trusted Systems
  • Language: en
  • Pages: 126

Trusted Systems

This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully reviewed and selected from 19 submissions. The papers are organized in topical section on automated analysis, security and trust, mobile trust, security of distributed systems, evaluation and analysis, and embedded security.

Information Security and Privacy
  • Language: en
  • Pages: 674

Information Security and Privacy

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic.