Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Security and Privacy
  • Language: en
  • Pages: 155

Security and Privacy

This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: ​Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.

Mathematical Analysis and Applications
  • Language: en
  • Pages: 328

Mathematical Analysis and Applications

This book collects original peer-reviewed contributions presented at the "International Conference on Mathematical Analysis and Applications (MAA 2020)" organized by the Department of Mathematics, National Institute of Technology Jamshedpur, India, from 2–4 November 2020. This book presents peer-reviewed research and survey papers in mathematical analysis that cover a broad range of areas including approximation theory, operator theory, fixed-point theory, function spaces, complex analysis, geometric and univalent function theory, control theory, fractional calculus, special functions, operation research, theory of inequalities, equilibrium problem, Fourier and wavelet analysis, mathematical physics, graph theory, stochastic orders and numerical analysis. Some chapters of the book discuss the applications to real-life situations. This book will be of value to researchers and students associated with the field of pure and applied mathematics.

Security and Privacy
  • Language: en
  • Pages: 183

Security and Privacy

This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.

Advances in Pure and Applied Algebra
  • Language: en
  • Pages: 170

Advances in Pure and Applied Algebra

This proceedings volume documents the contributions presented at the CONIAPS XXVII International Conference on Recent Advances in Pure and Applied Algebra. The entries focus on modern trends and techniques in various branches of pure and applied Algebra and highlight their applications in coding, cryptography, graph, and fuzzy theory. The book comprised a total of eighteen chapters, among which the first fourteen chapters are devoted to Algebra and related topics, and the last four chapters are included applied mathematics parts. The chapters present the latest research work being done on the frontiers of the various branches of algebra as well as showcase the cross-fertilization of the idea...

Cryptographic Security Solutions for the Internet of Things
  • Language: en
  • Pages: 367

Cryptographic Security Solutions for the Internet of Things

  • Type: Book
  • -
  • Published: 2019-01-18
  • -
  • Publisher: IGI Global

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

Provable Security
  • Language: en
  • Pages: 510

Provable Security

  • Type: Book
  • -
  • Published: 2015-11-27
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are grouped in topical sections on fundamental, protocol, authenticated encryption and key exchange, encryption and identification, privacy and cloud, leakage-resilient cryptography and lattice cryptography, signature and broadcast encryption.

Information Security and Privacy
  • Language: en
  • Pages: 715

Information Security and Privacy

This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021. The 35 full papers presented were carefully revised and selected from 157 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

Information Security and Cryptology
  • Language: en
  • Pages: 544

Information Security and Cryptology

  • Type: Book
  • -
  • Published: 2017-03-02
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.

Information Security
  • Language: en
  • Pages: 570

Information Security

  • Type: Book
  • -
  • Published: 2015-08-27
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.

Provable and Practical Security
  • Language: en
  • Pages: 397

Provable and Practical Security

This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols.