Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Innovative Computing and Communications
  • Language: en
  • Pages: 633

Innovative Computing and Communications

None

Theory of Cryptography
  • Language: en
  • Pages: 813

Theory of Cryptography

The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.

Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough
  • Language: en
  • Pages: 515

Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough

This book provides a systematic and comprehensive overview of machine learning with cognitive science methods and technologies which have played an important role at the core of practical solutions for a wide scope of tasks between handheld apps, industrial process control, autonomous vehicles, environmental policies, life sciences, playing computer games, computational theory, and engineering development. The chapters in this book focus on readers interested in machine learning, cognitive and neuro-inspired computational systems – theories, mechanisms, and architecture, which underline human and animal behaviour, and their application to conscious and intelligent systems. In the current v...

Advances in Cryptology – ASIACRYPT 2021
  • Language: en
  • Pages: 784

Advances in Cryptology – ASIACRYPT 2021

The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.

Advances in Cryptology – EUROCRYPT 2024
  • Language: en
  • Pages: 483

Advances in Cryptology – EUROCRYPT 2024

None

Public-Key Cryptography – PKC 2024
  • Language: en
  • Pages: 424

Public-Key Cryptography – PKC 2024

None

Advances in Cryptology – EUROCRYPT 2020
  • Language: en
  • Pages: 805

Advances in Cryptology – EUROCRYPT 2020

The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic. The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.

Green AI-Powered Intelligent Systems for Disease Prognosis
  • Language: en
  • Pages: 418

Green AI-Powered Intelligent Systems for Disease Prognosis

  • Type: Book
  • -
  • Published: 2024-08-23
  • -
  • Publisher: IGI Global

Experts in Medicine are under new pressures of advancing their studies while also reducing the impact they leave on the environment. Researchers within the fields of bio-neuro informatics, healthcare, engineering, and medical sciences require a dynamic platform that bridges the realms of academia, science, industry, and innovation. Green AI-Powered Intelligent Systems for Disease Prognosis facilitates a crossroads for a diverse audience interested in these two seldom coalesced concepts. Academicians, scientists, researchers, professionals, decision-makers, and even aspiring scholars all find a space to contribute, collaborate, and learn within the platform that this book provides. The book's...

Theory of Cryptography
  • Language: en
  • Pages: 722

Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.

Computer Security – ESORICS 2020
  • Language: en
  • Pages: 774

Computer Security – ESORICS 2020

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.