Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Information Security and Cryptology
  • Language: en
  • Pages: 560

Information Security and Cryptology

This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.

Computational Intelligence and Security
  • Language: en
  • Pages: 1205

Computational Intelligence and Security

  • Type: Book
  • -
  • Published: 2006-06-18
  • -
  • Publisher: Springer

The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.

Public Key Infrastructures, Services and Applications
  • Language: en
  • Pages: 311

Public Key Infrastructures, Services and Applications

This book constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2009, held in Pisa, Italy, in September 2009. The 18 revised full papers presented together with an invited speech were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on certificate less encryption, certificates and revocation, cryptographic protocols, PKI in practice, encryption and auctions, reputation and user aspects, and digital signatures.

Wildlife Conservation in China
  • Language: en
  • Pages: 384

Wildlife Conservation in China

  • Type: Book
  • -
  • Published: 2014-12-18
  • -
  • Publisher: Routledge

Very little is known about the issue of wildlife conservation within China. Even China specialists get a meager ration of stories about pandas giving birth in zoos, or poachers in some remote setting being apprehended. But what does the future hold for China's wildlife? In this thoughtful work the leading U.S. expert on wildlife projects in Western China presents a multi-faceted assessment of the topic. Richard B. Harris draws on twenty years of experience working in China, and incorporates perspectives ranging from biology through Chinese history and tradition, to interpret wildlife conservation issues in a cultural context. In non-technical language, Harris shows that, particularly in its ...

Information and Communications Security
  • Language: en
  • Pages: 835

Information and Communications Security

This book constitutes the refereed proceedings of the 21th International Conference on Information and Communications Security, ICICS 2019, held in Beijing, China, in December 2019. The 47 revised full papers were carefully selected from 199 submissions. The papers are organized in topics on malware analysis and detection, IoT and CPS security enterprise network security, software security, system security, authentication, applied cryptograph internet security, machine learning security, machine learning privacy, Web security, steganography and steganalysis.

Geology of Fossil Fuels - Oil and Gas
  • Language: en
  • Pages: 372

Geology of Fossil Fuels - Oil and Gas

  • Type: Book
  • -
  • Published: 1997
  • -
  • Publisher: VSP

None

Information Security and Cryptology
  • Language: en
  • Pages: 411

Information Security and Cryptology

  • Type: Book
  • -
  • Published: 2014-10-24
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013. The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system security.

Philosophical Transactions of the Royal Society of London
  • Language: en
  • Pages: 690

Philosophical Transactions of the Royal Society of London

  • Type: Book
  • -
  • Published: 1988
  • -
  • Publisher: Unknown

None

Advances and Applications in Geospatial Technology and Earth Resources
  • Language: en
  • Pages: 406

Advances and Applications in Geospatial Technology and Earth Resources

  • Type: Book
  • -
  • Published: 2017-10-05
  • -
  • Publisher: Springer

This book discusses the latest advances and applications in geospatial technologies and earth resources for mine surveying and civil engineering. It also discusses mineral resources management and assesses many techniques such as unmanned aerial vehicles/drones, ground-penetrating radar, geographic information system (GIS) and GIS-based machine learning. The book gathers the proceedings of the International Conference on Geo-Spatial Technologies and Earth Resources (GTER 2017), which was co-organized by the Hanoi University of Mining and Geology (HUMG) and the International Society for Mine Surveying (ISM) and held in Hanoi, Vietnam, on October 5–6, 2017. GTER 2017 is technically co-sponso...

Network and System Security
  • Language: en
  • Pages: 810

Network and System Security

  • Type: Book
  • -
  • Published: 2013-05-27
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).