Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Tang Shaohua zi xuan ji
  • Language: zh-CN
  • Pages: 267

Tang Shaohua zi xuan ji

  • Type: Book
  • -
  • Published: 1980
  • -
  • Publisher: Unknown

None

Computational Intelligence and Security
  • Language: en
  • Pages: 1205

Computational Intelligence and Security

  • Type: Book
  • -
  • Published: 2006-06-18
  • -
  • Publisher: Springer

The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.

Zhong gong wen yi tong zhan hui gu
  • Language: zh-CN
  • Pages: 358

Zhong gong wen yi tong zhan hui gu

  • Type: Book
  • -
  • Published: 1981
  • -
  • Publisher: Unknown

None

Information Security and Cryptology
  • Language: en
  • Pages: 487

Information Security and Cryptology

  • Type: Book
  • -
  • Published: 2016-05-06
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.

Radio Frequency Identification System Security
  • Language: en
  • Pages: 148

Radio Frequency Identification System Security

  • Type: Book
  • -
  • Published: 2013-11-07
  • -
  • Publisher: IOS Press

Our reliance on ever more sophisticated computer systems for the management of data and information means that the field of security and privacy technology continues to be of crucial importance to us all. This book presents ten peer-reviewed papers from the 2013 workshop Radio Frequency Identification/Internet of Things Security (RFIDsec’13 Asia) held in Guangzhou, China, in November 2013. This is the fifth of a series of workshops organized by the Asian branch of RFIDsec, which provides a platform for researchers, enterprises and governments to investigate, discuss and propose new solutions for the security and privacy issues related to RFID/IoT technologies and applications. Topics covered include RFID authentication, mutual authentication and ownership transfer, security of RFID applications, NFC and the Internet of Things, as well as side channel attacks. The book will be of interest to all those whose work involves the security aspects of information management.

Advances on P2P, Parallel, Grid, Cloud and Internet Computing
  • Language: en
  • Pages: 988

Advances on P2P, Parallel, Grid, Cloud and Internet Computing

  • Type: Book
  • -
  • Published: 2016-10-21
  • -
  • Publisher: Springer

P2P, Grid, Cloud and Internet computing technologies have been very fast established as breakthrough paradigms for solving complex problems by enabling aggregation and sharing of an increasing variety of distributed computational resources at large scale. The aim of this volume is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to P2P, Grid, Cloud and Internet computing as well as to reveal synergies among such large scale computing paradigms. This proceedings volume presents the results of the 11th International Conference on P2P, Parallel, Grid, Cloud And Internet Computing (3PGCIC-2016), held November 5-7, 2016, at Soonchunhyang University, Asan, Korea

Cloud Computing Data Auditing Algorithm
  • Language: en
  • Pages: 215

Cloud Computing Data Auditing Algorithm

  • Type: Book
  • -
  • Published: 2017-05-09
  • -
  • Publisher: Notion Press

Many Cloud data auditing algorithms have been proposed to maintain the integrity and privacy of data held in the Cloud. In this book, we present a survey of the state of the art and research of Cloud data auditing techniques with a brief introduction of the basic cloud computing concepts, its architecture and security issues. This book presents an overview of the various methods presently used to perform Cloud data auditing, mostly focusing on integrity and privacy.

PROCEEDINGS OF NATIONAL SEMINAR ON MULTIDISCIPLINARY RESEARCH AND PRACTICE VOLUME 1
  • Language: en
  • Pages: 1217

PROCEEDINGS OF NATIONAL SEMINAR ON MULTIDISCIPLINARY RESEARCH AND PRACTICE VOLUME 1

This Conference Proceedings of the National Seminar entitled “Multidisciplinary Research and Practice” compiled by Dr. M. Kanika Priya records various research papers written by eminent scholars, professors and students. The articles range from English literature to Tamil literature, Arts, Humanities, Social Science, Education, Performing Arts, Information and Communication Technology, Engineering, Technology and Science, Medicine and Pharmaceutical Research, Economics, Sociology, Philosophy, Business, Management, Commerce and Accounting, Teacher Education, Higher Education, Primary and Secondary Education, Law, Science (Mathematics, Physics, Chemistry, Zoology, Botany), Agriculture and ...

Trusted Systems
  • Language: en
  • Pages: 362

Trusted Systems

  • Type: Book
  • -
  • Published: 2012-07-11
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.

Information Security Practice and Experience
  • Language: en
  • Pages: 459

Information Security Practice and Experience

This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.