You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The present stage of the human civilization is the e-society, which is build over the achievements obtained by the development of the information and communication technologies. It affects everyone, from ordinary mobile phone users to designers of high quality industrial products, and every human activity, from taking medical care to improving the state governing. The science community working in computer sciences and informatics is therefore under constant challenge; it has to solve the new appeared theoretical problem as well as to find new practical solutions. The fourth ICT Innovations Conference, held in September 2012 in Ohrid, Macedonia, was one of the several world-wide forums where ...
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Fast Software Encryption, FSE 2005, held in Paris, France in February 2005. The 29 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers address all current aspects of fast primitives for symmetric cryptology, including the design, cryptanalysis, and implementation of block ciphers, stream ciphers, hash functions, and message authentication codes.
This book gathers selected high-quality research papers presented at the Sixth International Congress on Information and Communication Technology, held at Brunel University, London, on February 25–26, 2021. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IoT) and e-mining. Written by respected experts and researchers working on ICT, the book offers a valuable asset for young researchers involved in advanced studies. The book is presented in four volumes.
This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part of ECRYPT, the European Network of Excellence in Cryptology (EU Framework VI). The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be either very fast in software or very resource-efficient in hardware. Algorithm designers were invited to submit new stream cipher proposals to eSTREAM, and 34 candidates were proposed from around the world. Over the following years the submissions were assessed with regard to both security and practicality by the cryptographic community, and the results were presented at major conferences and specialized workshops dedicated to the state of the art of stream ciphers. This volume describes the most successful of the submitted designs and, over 16 chapters, provides full specifications of the ciphers that reached the final phase of the eSTREAM project. The book is rounded off by two implementation surveys covering both the software- and the hardware-oriented finalists.
This book constitutes the refereed proceedings of the 13th International ICT Innovations Conference, ICT Innovations 2021, held as virtual event in September 2021. The 15 full papers presented were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on deep learning and AI; NLP and social network analysis; theoretical foundations and information security; e-services; sensor systems, IoT.
This volume presents work from the IFIP TC 8 WG 8.9 International Conference on the Research and Practical Issues of Enterprise Information Systems (CONFENIS 2007). Enterprise information systems (EIS) have become increasingly popular. EIS integrate and support business processes across functional boundaries in a supply chain environment. In recent years, more and more enterprises world-wide have adopted EIS such as Enterprise Resource Planning (ERP) for running their businesses.
The 13th issue of the Transactions on Computational Science journal consists of two parts. The six papers in Part I span the areas of computing collision probability, digital image contour extraction, multiplicatively weighted Voronoi diagrams, multi-phase segmentation, the rough-set approach to incomplete information systems, and fault-tolerant systolic arrays for matrix multiplications. The five papers in Part II focus on neural-network-based trajectory prediction, privacy in vehicular ad-hoc networks, augmented reality for museum display and the consumer garment try-on experience, and geospatial knowledge discovery for crime analysis.
Information and Communication Technologies has enlarged its horizon and it is practiced under multidisciplinary contexts that introduce new challenges to theoretical and technical approaches. The most critical benefit of introducing new ICT technologies in our real world living are the new ways of working that the online world makes possible. Complexity, uncertainty and scaling issues of real world problems as well as natural phenomena in ecology, medicine and biology demanding ICT assistance create challenging application domains for artificial intelligence, decision support and intelligence systems, wireless sensor networks, pervasive and ubiquitous computing, multimedia information system...
This book constitutes the refereed proceedings of the 14th International Conference on ICT Innovations 2022. Reshaping the Future Towards a New Normal, ICT Innovations 2022, held in Skopje, Macedonia, during September 29–October 1, 2022. The 14 full papers and 1 short papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: theoretical foundations and distributed computing; artificial intelligence and deep learning; applied artificial intelligence; education; and medical informatics.
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.