You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.
Our reliance on ever more sophisticated computer systems for the management of data and information means that the field of security and privacy technology continues to be of crucial importance to us all. This book presents ten peer-reviewed papers from the 2013 workshop Radio Frequency Identification/Internet of Things Security (RFIDsec’13 Asia) held in Guangzhou, China, in November 2013. This is the fifth of a series of workshops organized by the Asian branch of RFIDsec, which provides a platform for researchers, enterprises and governments to investigate, discuss and propose new solutions for the security and privacy issues related to RFID/IoT technologies and applications. Topics covered include RFID authentication, mutual authentication and ownership transfer, security of RFID applications, NFC and the Internet of Things, as well as side channel attacks. The book will be of interest to all those whose work involves the security aspects of information management.
P2P, Grid, Cloud and Internet computing technologies have been very fast established as breakthrough paradigms for solving complex problems by enabling aggregation and sharing of an increasing variety of distributed computational resources at large scale. The aim of this volume is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to P2P, Grid, Cloud and Internet computing as well as to reveal synergies among such large scale computing paradigms. This proceedings volume presents the results of the 11th International Conference on P2P, Parallel, Grid, Cloud And Internet Computing (3PGCIC-2016), held November 5-7, 2016, at Soonchunhyang University, Asan, Korea
Many Cloud data auditing algorithms have been proposed to maintain the integrity and privacy of data held in the Cloud. In this book, we present a survey of the state of the art and research of Cloud data auditing techniques with a brief introduction of the basic cloud computing concepts, its architecture and security issues. This book presents an overview of the various methods presently used to perform Cloud data auditing, mostly focusing on integrity and privacy.
This Conference Proceedings of the National Seminar entitled “Multidisciplinary Research and Practice” compiled by Dr. M. Kanika Priya records various research papers written by eminent scholars, professors and students. The articles range from English literature to Tamil literature, Arts, Humanities, Social Science, Education, Performing Arts, Information and Communication Technology, Engineering, Technology and Science, Medicine and Pharmaceutical Research, Economics, Sociology, Philosophy, Business, Management, Commerce and Accounting, Teacher Education, Higher Education, Primary and Secondary Education, Law, Science (Mathematics, Physics, Chemistry, Zoology, Botany), Agriculture and ...
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.