You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance b...
This book contains the conference proceedings of ICABCS 2023, a non-profit conference with the objective to provide a platform that allows academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their research and innovative ideas in the field of Artificial Intelligence, Blockchain, Computing and Security. It explores the recent advancement in field of Artificial Intelligence, Blockchain, Communication and Security in this digital era for novice to profound knowledge about cutting edges in artificial intelligence, financial, secure transaction, monitoring, real time assistance and security for advanced stage lear...
This text presents the proceedings of an international conference on advances in cryptology. The papers are organized into topical sections on chosen ciphertext security, cryptanalysis of hash functions and block ciphers, distributed cryptography, zero knowledge and implementation.
In a world where computer science is now an essential element in all of our lives, a new opportunity to disseminate the latest research and trends is always welcome. This book presents the proceedings of the first International Conference on Recent Trends in Computing (ICRTC 2021), which was held as a virtual event on 21 – 22 May 2021 at Sanjivani College of Engineering, Kopargaon, India due to the restrictions of the COVID-19 pandemic. This online conference, aimed at facilitating academic exchange among researchers, enabled experts and scholars around from around the globe to gather for the discussion of the latest advanced research in the field despite the extensive travel restrictions still in place. The book contains 134 papers selected from 329 submitted papers after a rigorous peer-review process, and topics covered include advanced computing, networking, informatics, security and privacy, and other related fields. The book will be of interest to all those eager to find the latest trends and most recent developments in computer science.
This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.
The four-volume set CCIS 1580, CCIS 1581, CCIS 1582, and CCIS 1583 contains the extended abstracts of the posters presented during the 24th International Conference on Human-Computer Interaction, HCII 2022, which was held virtually in June - July 2022. The total of 1276 papers and 275 posters included in the 40 HCII 2021 proceedings volumes was carefully reviewed and selected from 5583 submissions. The posters presented in these four volumes are organized in topical sections as follows: Part I: user experience design and evaluation; visual design and visualization; data, information and knowledge; interacting with AI; universal access, accessibility and design for aging. Part II: multimodal and natural interaction; perception, cognition, emotion and psychophysiological monitoring; human motion modelling and monitoring; IoT and intelligent living environments. Part III: learning technologies; HCI, cultural heritage and art; eGovernment and eBusiness; digital commerce and the customer experience; social media and the metaverse. Part IV: virtual and augmented reality; autonomous vehicles and urban mobility; product and robot design; HCI and wellbeing; HCI and cybersecurity.
This book constitutes the refereed proceedings of the 4th International Conference, Latin American Theoretical Informatics, LATIN 2000, held in Punta del Est, Uruguay, in April 2000. The 42 revised papers presented were carefully reviewed and selected from a total of 87 submissions from 26 countries. Also included are abstracts or full papers of several invited talks. The papers are organized in topical sections on random structures and algorithms, complexity, computational number theory and cryptography, algebraic algorithms, computability, automata and formal languages, and logic and programming theory.
This book constitutes the refereed proceedings of the 24th International Conference on the Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2004, held in Chennai, India, in December 2004. The 35 revised full papers presented together with 5 invited papers were carefully reviewed and selected from 176 submissions. The papers address a broad variety of current issues in software science, programming theory, systems design and analysis, formal methods, mathematical logic, mathematical foundations, discrete mathematics, combinatorial mathematics, complexity theory, automata theory, and theoretical computer science in general.
The two volume set LNCS 3686 and LNCS 3687 constitutes the refereed proceedings of the Third International Conference on Advances in Pattern Recognition, ICAPR 2005, held in Bath, UK in August 2005. The papers submitted to ICAPR 2005 were thoroughly reviewed by up to three referees per paper and less than 40% of the submitted papers were accepted. The first volume includes 73 contributions related to Pattern Recognition and Data Mining (which included papers from the tracks of pattern recognition methods, knowledge and learning, and data mining); topics addressed are pattern recognition, data mining, signal processing and OCR/ document analysis. The second volume contains 87 contributions related to Pattern Recognition and Image Analysis (which included papers from the applications track) and deals with security and surveillance, biometrics, image processing and medical imaging. It also contains papers from the Workshop on Pattern Recognition for Crime Prevention.