You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023. The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: · 1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) · 5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) · 4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) · 5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) · 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) · 5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) · 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) · 4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) · 5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)
This book constitutes the refereed proceedings of the 15th International Conference on Information Security Practice and Experience, ISPEC 2019, held in Kuala Lumpur, Malaysia, in November 2019. The 21 full and 7 short papers presented in this volume were carefully reviewed and selected from 68 submissions. They were organized into the following topical sections: Cryptography I, System and Network Security, Security Protocol and Tool, Access Control and Authentication, Cryptography II, Data and User Privacy, Short Paper I, and Short Paper II.
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
This book constitutes the refereed proceedings of the 16th International Conference on Information Security Practice and Experience, ISPEC 2021, held in Nanjing, China, in December 2021. The 23 full papers presented in this volume were carefully reviewed and selected from 94 submissions. The conference focus on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
This book constitutes the refereed proceedings of the Second International Conference on Smart Blockchain, SmartBlock 2019, held in Birmingham, UK, in October 2019. The 13 papers presented in this volume were carefully reviewed and selected from 100 submissions. They focus on a broad range of topics in the area of blockchain, from privacy-preserving solutions to designing advanced blockchain mechanism, from empirical studies to practical manuals.
The term "artificial intelligence" (AI) refers to a category of computing technologies that have become increasingly advanced in recent years. This study presents an overview that is easily understandable of how it works, why it is important, and what we can do as a reaction to the difficulties that it poses. Since the beginning of the field of artificial intelligence, the capacity to behave in a way that gives the impression of intelligence has been the primary emphasis of the concept of AI. Several variations of the 'Turing test' determine that computers are intelligent when people are unable to distinguish between their behaviors and those of a person. The disruptive power of artificial i...
The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
With the assistance of artificial intelligence, which has the ability to radically revolutionize the educational system, the processes of teaching and learning may be made more successful. This may be the case for both teaching and learning. The ever expanding capabilities of AI make it feasible for it to develop personalised learning experiences, to streamline administrative operations, to improve student assessment, and to give teachers with crucial insights. In the field of education, the following is a list of significant areas in which artificial intelligence is making learning and teaching more possible: Individualized Instruction: The ability of artificial intelligence to analyze vast...
This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers were selected from 61 submissions and focus on security and privacy in new computing environments. The theme of SPNCE 2021 was “Secure Wireless Communication Systems: Infrastructure, Algorithms, and Management”.
The three-volume sets constitute the refereed proceedings of the 15th International Conference on Knowledge Science, Engineering and Management, KSEM 2022, held in Singapore, during August 6–8, 2022. The 169 full papers presented in these proceedings were carefully reviewed and selected from 498 submissions. The papers are organized in the following topical sections: Volume I:Knowledge Science with Learning and AI (KSLA) Volume II:Knowledge Engineering Research and Applications (KERA) Volume III:Knowledge Management with Optimization and Security (KMOS)