You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016, held in Hyderabad, India, in December 2016. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.
This book features selected papers from the 6th International Conference on Mathematics and Computing (ICMC 2020), organized by Sikkim University, Gangtok, Sikkim, India, during September 2020. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry.
This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, held in Florianópolis, Brazil, in September 2014. The 19 papers presented together with four invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on cryptographic engineering, side-channel attacks and countermeasures, privacy, crypto analysis and cryptographic protocols.
This book highlights the recent research on hybrid intelligent systems and their various practical applications. It presents 45 selected papers from the 20th International Conference on Hybrid Intelligent Systems (HIS 2021) and 16 papers from the 17th International Conference on Information Assurance and Security, which was held online, from December 14 to 16, 2021. A premier conference in the field of artificial intelligence and machine learning applications, HIS-IAS 2021 brought together researchers, engineers and practitioners whose work involves intelligent systems, network security and their applications in industry. Including contributions by authors from over 20 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of computer science and engineering.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applications in the field of information security and cryptology.
This book constitutes the refereed proceedings of the 11th International Joint Conference on E-Business and Telecommunications, ICETE 2014, held in Vienna, Austria, in August 2014. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP. The 27 full papers presented were carefully reviewed and selected from 328 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless information networks and systems.
This book constitutes the refereed proceedings of the 1st International Congress on Blockchain and Applications 2021, BLOCKCHAIN’21, held in Salamanca, Spain, in October 2021. Among the scientific community, blockchain and artificial intelligence are a promising combination that will transform the production and manufacturing industry, media, finance, insurance, e-government, etc. Nevertheless, there is no consensus with schemes or best practices that would specify how blockchain and artificial intelligence should be used together. The 38 full papers presented were carefully reviewed and selected from over 44 submissions. They contain the latest advances on blockchain and artificial intelligence and on their application domains, exploring innovative ideas, guidelines, theories, models, technologies, and tools and identifying critical issues and challenges that researchers and practitioners must deal with in future research.
Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT. This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. This book offers more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research.
This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine Learning, Image Processing, Network Security and Data Sciences, MIND 2020, held in Silchar, India. Due to the COVID-19 pandemic the conference has been postponed to July 2020. The 79 full papers and 4 short papers were thoroughly reviewed and selected from 219 submissions. The papers are organized according to the following topical sections: data science and big data; image processing and computer vision; machine learning and computational intelligence; network and cyber security.