Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Proceedings of the Seventh International Conference on Mathematics and Computing
  • Language: en
  • Pages: 1109

Proceedings of the Seventh International Conference on Mathematics and Computing

This book features selected papers from the 7th International Conference on Mathematics and Computing (ICMC 2021), organized by Indian Institute of Engineering Science and Technology (IIEST), Shibpur, India, during March 2021. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry.

Information Technologies and Their Applications
  • Language: en
  • Pages: 392

Information Technologies and Their Applications

None

Logic-Based Program Synthesis and Transformation
  • Language: en
  • Pages: 165

Logic-Based Program Synthesis and Transformation

This book constitutes the refereed proceedings of the 32nd International Symposium on Logic-Based Synthesis and Transformation, LOPSTR 2022, which was held during September 21-23, 2022. The 8 full papers were selected from 17 submissions and cover different aspects of logic-based program development, all stages of the software life cycle, and issues of both programming-in-the-small and programming-in-the-large.

Handbook of Formal Analysis and Verification in Cryptography
  • Language: en
  • Pages: 445

Handbook of Formal Analysis and Verification in Cryptography

  • Type: Book
  • -
  • Published: 2023-09-18
  • -
  • Publisher: CRC Press

This handbook of formal analysis in cryptography is very important for secure communication and processing of information. It introduces readers to several formal verification methods and software used to analyse cryptographic protocols. The chapters give readers general knowledge and formal methods focusing on cryptographic protocols. Handbook of Formal Analysis and Verification in Cryptography includes major formalisms and tools used for formal verification of cryptography, with a spotlight on new-generation cryptosystems such as post-quantum, and presents a connection between formal analysis and cryptographic schemes. The text offers formal methods to show whether security assumptions are valid and compares the most prominent formalism and tools as they outline common challenges and future research directions. Graduate students, researchers, and engineers worldwide will find this an exciting read.

Proceedings of the Tenth International Conference on Mathematics and Computing
  • Language: en
  • Pages: 270
Cyber Warfare, Security and Space Research
  • Language: en
  • Pages: 339

Cyber Warfare, Security and Space Research

This book sonstitutes selected papers from the first International Conference on Cyber Warfare, Security and Space Research, SpacSec 2021, held in Jaipur, India, in December 2021. The 19 full and 6 short papers were thoroughly reviewed and selected from the 98 submissions. The papers present research on cyber warfare, cyber security, and space research area, including the understanding of threats and risks to systems, the development of a strong innovative culture, and incident detection and post-incident investigation.

International Conference on Artificial Intelligence: Advances and Applications 2019
  • Language: en
  • Pages: 393

International Conference on Artificial Intelligence: Advances and Applications 2019

This book introduces research presented at the “International Conference on Artificial Intelligence: Advances and Applications-2019 (ICAIAA 2019),” a two-day conference and workshop bringing together leading academicians, researchers as well as students to share their experiences and findings on all aspects of engineering applications of artificial intelligence. The book covers research in the areas of artificial intelligence, machine learning, and deep learning applications in health care, agriculture, business and security. It also includes research in core concepts of computer networks, intelligent system design and deployment, real-time systems, WSN, sensors and sensor nodes, SDN and NFV. As such it is a valuable resource for students, academics and practitioners in industry working on AI applications.

A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems
  • Language: en
  • Pages: 462

A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems

This book aims at offering a unique collection of ideas and experiences mainly focusing on the main streams and merger of Artificial Intelligence (AI) and the Internet of Things (IoT) for a wide slice of the communication and networking community. In the era when the world is grappling with many unforeseen challenges, scientists and researchers are envisioning smart cyber systems that guarantee sustainable development for a better human life. The main contributors that destined to play a huge role in developing such systems, among others, are AI and IoT. While AI provides intelligence to machines and data by identifying patterns, developing predictions, and detecting anomalies, IoT performs ...

Cryptography and Information Security in the Balkans
  • Language: en
  • Pages: 254

Cryptography and Information Security in the Balkans

  • Type: Book
  • -
  • Published: 2015-07-15
  • -
  • Publisher: Springer

This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic protocols and public key cryptography. The book also contains one invited talk in full paper length.

Improving Information Security Practices through Computational Intelligence
  • Language: en
  • Pages: 348

Improving Information Security Practices through Computational Intelligence

  • Type: Book
  • -
  • Published: 2015-08-26
  • -
  • Publisher: IGI Global

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.