You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.
This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applications in the field of information security and cryptology.
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.
This book constitutes the refereed proceedings of the 7th International Frontiers of Algorithmics Workshop, FAW 2013, and the 9th International Conference on Algorithmic Aspects in Information and Management, AAIM 2013, jointly held in Dalian, China, in June 2013. The 33 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 60 submissions. The Joint Conference provide a focused forum on current trends of research on algorithms, discrete structures, operation research, combinatorial optimization and their applications, and will bring together international experts at the research frontiers in these areas to exchange ideas and to present significant new results. The mission of the Joint Conference is to stimulate the various fields for which algorithmics can become a crucial enabler, and to strengthen the ties between the Eastern and Western research communities of algorithmics and applications.
This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Features: examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks; describes the challenges of addressing privacy concerns in various areas; reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms; investigates approaches for protecting privacy in cloud applications; discusses the regulation of personal information disclosure and the privacy of individuals; presents the tools and the evidence to better understand consumers’ privacy behaviors.
Proportionality is a German, and thus continental European, concept in public law that is applied by both the Court of Justice of the European Union (CJEU) and the European Court of Human Rights (ECtHR). The principle specifies that measures adopted by executive authorities should not exceed the limits of what is appropriate and necessary in order to achieve legitimate objectives in the interest of the public. Using a functional comparative approach, this book evaluates the extent to which proportionality has been integrated into the English and Hong Kong judicial systems by comparing case law in these courts with that of the CJEU and the ECtHR. The text also reviews the development of proportionality and presents a topical understanding of why its adoption and application have encountered difficulties, particularly regarding socio-economic rights, in some jurisdictions, such as the United Kingdom and Hong Kong. Written by a scholar with experience from both within the Hong Kong judicial system and from international research, this book is the first all-encompassing reference for legal practitioners worldwide.
The Hong Kong Special Administrative Region of the People's Republic of China is located on the southeastern coast of China, and the Macao SAR can be found off of China's southern coast. Both regions have recently been released from European colonial rule: Hong Kong from British control in 1997 and Macao from Portugal in 1999. As SARs, Hong Kong and Macao retain a high degree of autonomy, and they control all issues except those of state (e.g. diplomatic relations and national defense). The A to Z of the Hong Kong SAR and the Macao SAR includes maps, photographs, a list of acronyms, a chronology, an introductory essay, a bibliography, and hundreds of cross-referenced dictionary entries on important persons, places, and events as well as political, economic and social background. However, unlike the rest of the series, all these sections are presented in duplicate: one for Hong Kong and one for Macao. The authoritative analysis and informative data presented clearly elucidate the unique situation of these two territories.