Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Information Security Practice and Experience
  • Language: en
  • Pages: 392

Information Security Practice and Experience

  • Type: Book
  • -
  • Published: 2016-11-02
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.

Applied Cryptography and Network Security
  • Language: en
  • Pages: 735

Applied Cryptography and Network Security

The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain.

Information Security and Cryptology
  • Language: en
  • Pages: 495

Information Security and Cryptology

This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11–13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.

Information Security and Cryptology
  • Language: en
  • Pages: 545

Information Security and Cryptology

  • Type: Book
  • -
  • Published: 2017-03-02
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.

Strategies for Supply Chain Risk Management
  • Language: en
  • Pages: 187

Strategies for Supply Chain Risk Management

Examining the negative consequences that arise from supply chain risks, this book systematically explores firms’ responses to these risks in different situations. In particular, it focuses on sourcing strategies of firms under supply chain risks and the different mitigation tools they use, such as supplier development and multisourcing. Supply chains have expanded extensively because many firms try to take advantage of outsourcing of their raw materials and critical components. Though firms can reap significant benefits due to the widespread use of outsourcing, they have to deal with increasing supply chain risks. In general, supply chain risks are various and may be originated from natural disasters, labor strikes, fires, and so on. These risk incidents can cause serious damage to firms’ profit performance. The analysis and insights from this book can be utilized by firms to alleviate the impact of supply chain risks in the sourcing process. It will also be of interest to researchers and students studying supply chain management.

Information Security
  • Language: en
  • Pages: 471

Information Security

  • Type: Book
  • -
  • Published: 2017-11-13
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.

Information Security and Privacy
  • Language: en
  • Pages: 658

Information Security and Privacy

This book constitutes the refereed proceedings of the 28th Australasian Conference on Information Security and Privacy, ACISP 2023, held in Brisbane, QLD, Australia, during July 5-7, 2023. The 27 full papers presented were carefully revised and selected from 87 submissions. The papers present and discuss different aspects of symmetric-key cryptography, public-key cryptography, post-quantum cryptography, cryptographic protocols, and system security.

Intelligent Security Solutions for Cyber-Physical Systems
  • Language: en
  • Pages: 307

Intelligent Security Solutions for Cyber-Physical Systems

  • Type: Book
  • -
  • Published: 2024-04-22
  • -
  • Publisher: CRC Press

A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science. This text mainly concentrates on offering a foundational theoretical underpinning, and a comprehensive and coherent review of intelligent security solutions for cyber-physical systems. Features: • Provides an overview of cyber-physical systems (CPSs) along with security concepts like attack detection methods, cyber-physical systems failures, and risk identification and management. • Showcases cyber-physical systems (CPSs) security solutions, lig...

Security of Ubiquitous Computing Systems
  • Language: en
  • Pages: 268

Security of Ubiquitous Computing Systems

The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.

Advances in Cryptology – ASIACRYPT 2022
  • Language: en
  • Pages: 812

Advances in Cryptology – ASIACRYPT 2022

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.