You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Today, it has become strikingly obvious that companies no longer operate in an environment where only risk return and volatility describe the business environment. The business has to deal with volatility plus uncertainty, plus complexity and ambiguity (VUCA): that requires new qualities, competencies, frameworks; and it demands a new mind set to deal with the VUCA environment in investment, funding and financing. This book builds on a new megatrend beyond resilience, called anti-fragility. We have had the black swan (financial crisis) and the red swan (COVID) - the Bank for International Settlement is preparing for regenerative capitalism, block chain based analysis of financial streams and...
Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. P...
This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Digital Watermarking, IWDW 2004, held in Seoul, Korea in October/November 2004. The 22 revised full papers presented together with 3 invited papers were carefully selected from over 60 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on systems, theory, authentication and steganography, cryptography, and methods.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2010, CT-RSA 2010, held in San Francisco, CA, USA in April 2010. The 25 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on public-key cryptography, side-channel attacks, cryptographic protocols, cryptanalysis, and symmetric cryptography.
This book constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000. The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a total of 81 submissions. The book offers topical sections on network security, public key cryptography, cryptographic implementation issues, electronic commerce, key recovery, public key infrastructure, Boolean functions, intrusion detection, codes, digital signatures, secret sharing, and protocols.
The five-volume set LNCS 3980-3984 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006. The volumes present a total of 664 papers organized according to the five major conference themes: computational methods, algorithms and applications high performance technical computing and networks advanced and emerging applications geometric modelling, graphics and visualization information systems and information technologies. This is Part III.
This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia in July 2005. The 45 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on network security, cryptanalysis, group communication, elliptic curve cryptography, mobile security, side channel attacks, evaluation and biometrics, public key cryptosystems, access control, digital signatures, threshold cryptography, protocols, group signatures, credentials, and symmetric cryptography.
This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, held in Kamakura, Japan in March 1999. The 25 revised full papers presented were carefully reviewed and selected from a total of 61 submissions. The volume reports most recent research results on all relevant aspects in public key cryptography. Among the topics covered are digital signatures, anonymous finger printing, message authentication, digital payment, key escrow, RSA systems, hash functions, decision oracles, random numbers, finite field computations, pay-per-view-systems, and electronic commerce.
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer’s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and appli...
Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.