You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book features selected papers from the 7th International Conference on Mathematics and Computing (ICMC 2021), organized by Indian Institute of Engineering Science and Technology (IIEST), Shibpur, India, during March 2021. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry.
This book constitutes the refereed proceedings of the 32nd International Symposium on Logic-Based Synthesis and Transformation, LOPSTR 2022, which was held during September 21-23, 2022. The 8 full papers were selected from 17 submissions and cover different aspects of logic-based program development, all stages of the software life cycle, and issues of both programming-in-the-small and programming-in-the-large.
This handbook of formal analysis in cryptography is very important for secure communication and processing of information. It introduces readers to several formal verification methods and software used to analyse cryptographic protocols. The chapters give readers general knowledge and formal methods focusing on cryptographic protocols. Handbook of Formal Analysis and Verification in Cryptography includes major formalisms and tools used for formal verification of cryptography, with a spotlight on new-generation cryptosystems such as post-quantum, and presents a connection between formal analysis and cryptographic schemes. The text offers formal methods to show whether security assumptions are valid and compares the most prominent formalism and tools as they outline common challenges and future research directions. Graduate students, researchers, and engineers worldwide will find this an exciting read.
This book sonstitutes selected papers from the first International Conference on Cyber Warfare, Security and Space Research, SpacSec 2021, held in Jaipur, India, in December 2021. The 19 full and 6 short papers were thoroughly reviewed and selected from the 98 submissions. The papers present research on cyber warfare, cyber security, and space research area, including the understanding of threats and risks to systems, the development of a strong innovative culture, and incident detection and post-incident investigation.
This book introduces research presented at the “International Conference on Artificial Intelligence: Advances and Applications-2019 (ICAIAA 2019),” a two-day conference and workshop bringing together leading academicians, researchers as well as students to share their experiences and findings on all aspects of engineering applications of artificial intelligence. The book covers research in the areas of artificial intelligence, machine learning, and deep learning applications in health care, agriculture, business and security. It also includes research in core concepts of computer networks, intelligent system design and deployment, real-time systems, WSN, sensors and sensor nodes, SDN and NFV. As such it is a valuable resource for students, academics and practitioners in industry working on AI applications.
This book aims at offering a unique collection of ideas and experiences mainly focusing on the main streams and merger of Artificial Intelligence (AI) and the Internet of Things (IoT) for a wide slice of the communication and networking community. In the era when the world is grappling with many unforeseen challenges, scientists and researchers are envisioning smart cyber systems that guarantee sustainable development for a better human life. The main contributors that destined to play a huge role in developing such systems, among others, are AI and IoT. While AI provides intelligence to machines and data by identifying patterns, developing predictions, and detecting anomalies, IoT performs ...
This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic protocols and public key cryptography. The book also contains one invited talk in full paper length.
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.