You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.
The four-volume set LNCS 13943, 13944, 13945 and 13946 constitutes the proceedings of the 28th International Conference on Database Systems for Advanced Applications, DASFAA 2023, held in April 2023 in Tianjin, China. The total of 125 full papers, along with 66 short papers, are presented together in this four-volume set was carefully reviewed and selected from 652 submissions. Additionally, 15 industrial papers, 15 demo papers and 4 PhD consortium papers are included. The conference presents papers on subjects such as model, graph, learning, performance, knowledge, time, recommendation, representation, attention, prediction, and network.
The six-volume set LNCS 11764, 11765, 11766, 11767, 11768, and 11769 constitutes the refereed proceedings of the 22nd International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2019, held in Shenzhen, China, in October 2019. The 539 revised full papers presented were carefully reviewed and selected from 1730 submissions in a double-blind review process. The papers are organized in the following topical sections: Part I: optical imaging; endoscopy; microscopy. Part II: image segmentation; image registration; cardiovascular imaging; growth, development, atrophy and progression. Part III: neuroimage reconstruction and synthesis; neuroimage segmentation; diffusion weighted magnetic resonance imaging; functional neuroimaging (fMRI); miscellaneous neuroimaging. Part IV: shape; prediction; detection and localization; machine learning; computer-aided diagnosis; image reconstruction and synthesis. Part V: computer assisted interventions; MIC meets CAI. Part VI: computed tomography; X-ray imaging.
The internet of things (IoT) has drawn great attention from both academia and industry, since it offers a challenging notion of creating a world where all things around us are connected to the internet and communicate with each other with minimal human intervention. Another component for helping IoT to succeed is cloud computing. The combination of cloud computing and IoT will enable new monitoring services and powerful processing of sensory data streams. These applications, alongside implementation details and challenges, should also be explored for successful mainstream adoption. IoT is also fueled by the advancement of digital technologies, and the next generation era will be cloud-based ...