You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language. Written for programmers and engineers, Practical Cryptography explains how you can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives ...
This book presents various computational and cognitive modeling approaches in the areas of health, education, finance, environment, engineering, commerce, and industry. It is a collection of selected conference papers presented at the 4th International Conference on Trends in Cognitive Computation Engineering (TCCE 2022), hosted by Mawlana Bhashani Science and Technology University, Tangail, Bangladesh, during December 17–18, 2022. It shares cutting-edge insights and ideas from mathematicians, engineers, scientists, and researchers and discusses fresh perspectives on problem solving in a range of research areas.
This book gathers a collection of high-quality peer-reviewed research papers presented at the International Conference on Big Data, IoT and Machine Learning (BIM 2021), held in Cox’s Bazar, Bangladesh, during 23–25 September 2021. The book covers research papers in the field of big data, IoT and machine learning. The book will be helpful for active researchers and practitioners in the field.
The Internet of Things (IoT) networks have revolutionized the world and have innumerable real-time applications on automation. A few examples include driverless cars, remote monitoring of the elderly, remote order of tea or coffee of your choice from a vending machine, and home/industrial automation amongst others. Fundamentals of Internet of Things build the foundations of IoT networks by leveraging the relevant concepts from signal processing, communications, net-works, and machine learning. The book covers two fundamental components of IoT networks, namely, the Internet and Things. In particular, the book focuses on networking concepts, protocols, clustering, data fusion, localization, en...
Simulation is a widely used mechanism for validating the theoretical models of networking and communication systems. Although the claims made based on simulations are considered to be reliable, how reliable they really are is best determined with real-world implementation trials. Simulation Technologies in Networking and Communications: Selecting the Best Tool for the Test addresses the spectrum of issues regarding the different mechanisms related to simulation technologies in networking and communications fields. Focusing on the practice of simulation testing instead of the theory, it presents the work of more than 50 experts from around the world. Considers superefficient Monte Carlo simul...
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.
This book presents various computational and cognitive modeling approaches in the areas of health, education, finance, environment, engineering, commerce, and industry. It is a collection of selected conference papers presented at the International Conference on Trends in Computational and Cognitive Engineering (TCCE 2020). It shares cutting-edge insights and ideas from mathematicians, engineers, scientists, and researchers and discusses fresh perspectives on problem solving in a range of research areas.
None
This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and Privacy for Big Data, TrustData 2016; the 6th International Symposium on Trust, Security and Privacy for Emerging Applications, TSP 2016; the 4th International Workshop on Network Optimization and Performance Evaluation, NOPE 2016; the Second International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys 2016; the Annual Big Data Security, Privacy and Trust Workshop, BigDataSPT 2016; and the First International Workshop on Cloud Storage Service and Computing, WCSSC 2016. The 37 full papers presented were carefully reviewed and selected from 95 submissions. The papers deal with research findings, ideas and emerging trends in information security research and cover a broad range of topics in security, privacy and anonymity in computation, communication and storage.