Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Algorithms and Architectures for Parallel Processing
  • Language: en
  • Pages: 375

Algorithms and Architectures for Parallel Processing

None

Cryptology and Network Security
  • Language: en
  • Pages: 406

Cryptology and Network Security

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS 2008, held in Hong-Kong, China, in December 2008. The 27 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections on cryptosystems, signatures, identification, authentication and key management, cryptographic algorithms and protocols, stream ciphers and block ciphers, cryptographic foundations, applications and implementations, as well as security in ad hoc networks and wireless sensor networks.

Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 2012
  • Language: en
  • Pages: 1529

Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 2012

  • Type: Book
  • -
  • Published: 2014-07-08
  • -
  • Publisher: Springer

The present book is based on the research papers presented in the International Conference on Soft Computing for Problem Solving (SocProS 2012), held at JK Lakshmipat University, Jaipur, India. This book provides the latest developments in the area of soft computing and covers a variety of topics, including mathematical modeling, image processing, optimization, swarm intelligence, evolutionary algorithms, fuzzy logic, neural networks, forecasting, data mining, etc. The objective of the book is to familiarize the reader with the latest scientific developments that are taking place in various fields and the latest sophisticated problem solving tools that are being developed to deal with the complex and intricate problems that are otherwise difficult to solve by the usual and traditional methods. The book is directed to the researchers and scientists engaged in various fields of Science and Technology.

Information Security and Cryptology -- ICISC 2013
  • Language: en
  • Pages: 536

Information Security and Cryptology -- ICISC 2013

  • Type: Book
  • -
  • Published: 2014-10-18
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography.

Algorithms and Architectures for Parallel Processing
  • Language: en
  • Pages: 818

Algorithms and Architectures for Parallel Processing

This book constitutes the refereed proceedings of the 22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022, which was held in October 2022. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers and 10 short papers, presented were carefully reviewed and selected from 91 submissions. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems

Information Security Applications
  • Language: en
  • Pages: 381

Information Security Applications

  • Type: Book
  • -
  • Published: 2012-11-15
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.

Advances in Cryptology – EUROCRYPT 2016
  • Language: en
  • Pages: 879

Advances in Cryptology – EUROCRYPT 2016

  • Type: Book
  • -
  • Published: 2016-04-27
  • -
  • Publisher: Springer

The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowledge; pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leakage; in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.

Smart Computing and Communication
  • Language: en
  • Pages: 724

Smart Computing and Communication

This book constitutes the proceedings of the 7th International Conference on Smart Computing and Communication, SmartCom 2022, held in New York City, NY, USA, during November 18–20, 2022. The 64 papers included in this book were carefully reviewed and selected from 312 submissions. SmartCom 2023 focus on recent booming developments in Web-based technologies and mobile applications which have facilitated a dramatic growth in the implementation of new techniques, such as cloud computing, edge computing, big data, pervasive computing, Internet of Things, security and privacy, blockchain, Web 3.0, and social cyber-physical systems. The conference gathered all high-quality research/industrial papers related to smart computing and communications and aimed at proposing a reference guideline for further research.

Provable and Practical Security
  • Language: en
  • Pages: 450

Provable and Practical Security

This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.

Cloud Computing and Security
  • Language: en
  • Pages: 581

Cloud Computing and Security

  • Type: Book
  • -
  • Published: 2017-10-30
  • -
  • Publisher: Springer

This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017. The 116 full papers and 11 short papers of these volumes were carefully reviewed and selected from 391 submissions. The papers are organized in topical sections such as: information hiding; cloud computing; IOT applications; information security; multimedia applications; optimization and classification.