Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Algorithms and Architectures for Parallel Processing
  • Language: en
  • Pages: 880

Algorithms and Architectures for Parallel Processing

  • Type: Book
  • -
  • Published: 2015-11-16
  • -
  • Publisher: Springer

This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.

Blockchain Technology for IoE
  • Language: en
  • Pages: 293

Blockchain Technology for IoE

  • Type: Book
  • -
  • Published: 2023-09-29
  • -
  • Publisher: CRC Press

This book explores opportunities and challenges in the field of Internet of Everything (IoE) security and privacy under the umbrella of distributed ledger technologies and blockchain technology including distributed consensus mechanisms, crypto-sensors, encryption algorithms, and fault tolerance mechanisms for devices and systems. It focusses on the applicability of blockchain technology, including architectures and platforms for blockchain and IoE, authentication and encryption algorithms for IoE, malicious transactions detection, blockchain for forensics, and so forth. Outlines the major benefits as well as challenges associated with integration of blockchain with IoE; Describes detailed f...

Intelligent Systems and Data Science
  • Language: en
  • Pages: 323

Intelligent Systems and Data Science

None

Trust Management XI
  • Language: en
  • Pages: 228

Trust Management XI

  • Type: Book
  • -
  • Published: 2017-06-01
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 11th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2017, held in Gothenburg, Sweden, in June 2017. The 8 revised full papers and 6 short papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: information sharing and personal data; novel sources of trust and trust information; applications of trust; trust metrics; and reputation systems. Also included is the 2017 William Winsborough commemorative address and three short IFIPTM 2017 graduate symposium presentations.

Forest Fire
  • Language: en
  • Pages: 164

Forest Fire

This book concerns the different aspects of forest fires, the impact of fire on both forest resources (e.g. forest cover) and communities that use different forest functions. Therefore, forest fires have their environmental, economic and social consequences, and none of them is less important. Forest fires can be caused by both natural forces and anthropogenic factors, and in the latter case, it is extremely interesting to profile the potential arsonist. Forest fires may also cause conflicts, stronger or weaker, in local communities that have been using forests for years. These conflicts can be solved both by gradually changing the law itself and through education at the local level. Not les...

Trust Management X
  • Language: en
  • Pages: 200

Trust Management X

  • Type: Book
  • -
  • Published: 2016-07-20
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 10th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2016, held in Darmstadt, Germany, in July 2016. The 7 revised full papers and 7 short papers presented together with an invited paper were carefully reviewed and selected from 26 submissions. The papers cover a wide range of topics including trust architecture, trust modeling, trust metrics and computation, reputation and privacy, security and trust, sociotechnical aspects of trust, and attacks on trust and reputation systems.

Financial Cryptography and Data Security
  • Language: en
  • Pages: 645

Financial Cryptography and Data Security

  • Type: Book
  • -
  • Published: 2017-12-22
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017. The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API's; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval.

Advanced Data Mining and Applications
  • Language: en
  • Pages: 646

Advanced Data Mining and Applications

  • Type: Book
  • -
  • Published: 2010-11-18
  • -
  • Publisher: Springer

With the ever-growing power of generating, transmitting, and collecting huge amounts of data, information overloadis nowan imminent problemto mankind. The overwhelming demand for information processing is not just about a better understanding of data, but also a better usage of data in a timely fashion. Data mining, or knowledge discovery from databases, is proposed to gain insight into aspects ofdata and to help peoplemakeinformed,sensible,and better decisions. At present, growing attention has been paid to the study, development, and application of data mining. As a result there is an urgent need for sophisticated techniques and toolsthat can handle new ?elds of data mining, e. g. , spatia...

Information Security Applications
  • Language: en
  • Pages: 363

Information Security Applications

  • Type: Book
  • -
  • Published: 2011-01-19
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010. The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.

A Generic Approach for the Automated Notarization of Cloud Configurations Using Blockchain-Based Trust
  • Language: en
  • Pages: 259

A Generic Approach for the Automated Notarization of Cloud Configurations Using Blockchain-Based Trust

The use of cloud applications is becoming increasingly popular due to their scalability and cost advantages. However, companies need help in adopting cloud applications due to their internal policies and compliance requirements. Trust and security are crucial factors that influence the adoption of cloud applications. This book proposes a cloud architecture that addresses this challenge by shifting the trust for compliance-driven configurations of cloud applications from the cloud application provider to the blockchain. The architecture was developed using design science research and evaluated using mixed-method semi-structured guided interviews. The results show that the proposed architecture can significantly reduce adoption risk due to compliance-driven cloud application configurations, shifting trust from the cloud provider to the blockchain. This book presents an innovative approach to address the challenge of adopting cloud applications, and enhancing trust and security for businesses.