You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The two volume set, CCIS 265 and 266, constitutes the refereed proceedings of the International Conference, FGCN 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of future generation communication and networking.
The new emergingtechnologiesput new requirementsonsecurityanddata m- agement.Asdataareaccessibleanytimeanywhere,itbecomesmucheasiertoget unauthorized data access. Furthermore, the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal information thereby endangering people’s privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The interesting pr- lems range from traditional topics, such as, access control and general database security, via privacy protection to new research directions, such as cryptogra- ically en...
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.
Welcome to the proceedings of the 2010 International Conference on Future Gene- tion Communication and Networking (FGCN 2010) – one of the partnering events of the Second International Mega-Conference on Future Generation Information Te- nology (FGIT 2010). FGCN brings together researchers from academia and industry as well as practit- ners to share ideas, problems and solutions relating to the multifaceted aspects of communication and networking, including their links to computational sciences, mathematics and information technology. In total, 1,630 papers were submitted to FGIT 2010 from 30 countries, which - cludes 228 papers submitted to the FGCN 2010 Regular Sessions. The submitted pa...
This two volume set LNCS 9418 and LNCS 9419 constitutes the proceedings of the 16th International Conference on Web Information Systems Engineering, WISE 2015, held in Miami, FL, USA, in November 2015. The 53 full papers, 17 short and 14 special sessions and invited papers, presented in these proceedings were carefully reviewed and selected from 189 submissions. The papers cover the areas of big data techniques and applications, deep/hidden Web, integration of Web and internet, linked open data, semantic Web, social network computing, social Web and applications, social Web models, analysis and mining, Web-based applications, Web-based business processes and Web services, Web data integration and mashups, Web data models, Web information retrieval, Web privacy and security, Web-based recommendations, and Web search.
Grid and cooperative computing has emerged as a new frontier of information tech- logy. It aims to share and coordinate distributed and heterogeneous network resources forbetterperformanceandfunctionalitythatcanotherwisenotbeachieved.Thisvolume contains the papers presented at the 2nd International Workshop on Grid and Coope- tive Computing, GCC 2003, which was held in Shanghai, P.R. China, during December 7–10, 2003. GCC is designed to serve as a forum to present current and future work as well as to exchange research ideas among researchers, developers, practitioners, and usersinGridcomputing,Webservicesandcooperativecomputing,includingtheoryand applications. For this workshop, we receiv...
The Chinese Research Institute of Construction Management (CRIOCM) in collaboration with Shenzhen University (SZU) proudly invites all academics, researchers and professionals to participate in the CRIOCM 2012, the 17th International Symposium on "Advancement of Construction Management and Real Estate." We will uphold and preserve the idea and tradition of pragmatism and innovation, to offer an excellent academic and communication platform for academics and professionals to exchange information on the latest developments in real estate and construction management.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.
The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It further covers the advanced exploitation tools that are used in the domain of ethical hacking and penetration testing. • Focuses on tools used in performing mobile and SIM forensics, static and dynamic memory analysis, and deep web forensics • Covers advanced tools in the domain of data hiding and steganalysis • Discusses the role and application of artificial intelligence and big data in cybersecurity • Elaborates on the use of advanced cybersecurity and forensics techniques in computational issues • Includes numerous open-source tools such as NMAP, Autopsy, and Wireshark used in the domain of digital forensics The text is primarily written for senior undergraduates, graduate students, and academic researchers, in the fields of computer science, electrical engineering, cybersecurity, and forensics.