![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and Communications Security, ICICS 2021, held in Chongqing, China, in September 2021. The 49 revised full papers presented in the book were carefully selected from 182 submissions. The papers in Part II are organized in the following thematic blocks: machine learning security; multimedia security; security analysis; post-quantum cryptography; applied cryptography.
Providing a shared memory abstraction in distributed systems is a powerful tool that can simplify the design and implementation of software systems for networked platforms. This enables the system designers to work with abstract readable and writable objects without the need to deal with the complexity and dynamism of the underlying platform. The key property of shared memory implementations is the consistency guarantee that it provides under concurrent access to the shared objects. The most intuitive memory consistency model is atomicity because of its equivalence with a memory system where accesses occur serially, one at a time. Emulations of shared atomic memory in distributed systems is an active area of research and development. The problem proves to be challenging, and especially so in distributed message passing settings with unreliable components, as is often the case in networked systems. We present several approaches to implementing shared memory services with the help of replication on top of message-passing distributed platforms subject to a variety of perturbations in the computing medium.
This book constitutes selected papers from the Second International Conference on Microelectronic Devices, Circuits and Systems, ICMDCS 2021, held in Vellore, India, in February 2021. The 32 full papers and 6 short papers presented were thoroughly reviewed and selected from 103 submissions. They are organized in the topical sections on digital design for signal, image and video processing; VLSI testing and verification; emerging technologies and IoT; nano-scale modelling and process technology device; analog and mixed signal design; communication technologies and circuits; technology and modelling for micro electronic devices; electronics for green technology.
This book constitutes the refereed post-conference proceedings of the 5th International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2021, held in May 2021. Due to COVID-19 pandemic the conference was held virtually. This year's conference topic covers security of innovative services and infrastructure in traffic, transport and logistic ecosystems. The 30 revised full papers were carefully reviewed and selected from 60 submissions. The papers are organized in thematic sessions on: Internet of things and smart city; smart environment applications; information and communications technology; smart health applications; sustainable communications and computing infrastructures.
This two-volume set (CCIS 1393 and CCIS 1394) constitutes selected and revised papers of the 4th International Conference on Advanced Informatics for Computing Research, ICAICR 2020, held in Gurugram, India, in December 2020. The 34 revised full papers and 51 short papers presented were carefully reviewed and selected from 306 submissions. The papers are organized in topical sections on computing methodologies; hardware; networks; security and privacy.
The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021.The 78 full papers included in these proceedings were accepted from a total of 400 submissions. They were organized in topical sections as follows: Part I: Best papers; public-key cryptography; isogenies; post-quantum cryptography; lattices; homomorphic encryption; symmetric cryptanalysis; Part II: Symmetric designs; real-world cryptanalysis; implementation issues; masking and secret-sharing; leakage, faults and tampering; quantum constructions and proofs; multiparty computation; Part III: Garbled circuits; indistinguishability obfuscation; non-malleable commitments; zero-knowledge proofs; property-preserving hash functions and ORAM; blockchain; privacy and law enforcement.
The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021.The 78 full papers included in these proceedings were accepted from a total of 400 submissions. They were organized in topical sections as follows: Part I: Best papers; public-key cryptography; isogenies; post-quantum cryptography; lattices; homomorphic encryption; symmetric cryptanalysis; Part II: Symmetric designs; real-world cryptanalysis; implementation issues; masking and secret-sharing; leakage, faults and tampering; quantum constructions and proofs; multiparty computation; Part III: Garbled circuits; indistinguishability obfuscation; non-malleable commitments; zero-knowledge proofs; property-preserving hash functions and ORAM; blockchain; privacy and law enforcement.
The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021.The 78 full papers included in these proceedings were accepted from a total of 400 submissions. They were organized in topical sections as follows: Part I: Best papers; public-key cryptography; isogenies; post-quantum cryptography; lattices; homomorphic encryption; symmetric cryptanalysis; Part II: Symmetric designs; real-world cryptanalysis; implementation issues; masking and secret-sharing; leakage, faults and tampering; quantum constructions and proofs; multiparty computation; Part III: Garbled circuits; indistinguishability obfuscation; non-malleable commitments; zero-knowledge proofs; property-preserving hash functions and ORAM; blockchain; privacy and law enforcement.
This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully reviewed and selected from 1013 submissions. Overall, a total of 224 full and 81 short papers were accepted for ICAIS 2021; the other accepted papers are presented in CCIS 1422-1424. The papers were organized in topical sections as follows: Part I: Artificial intelligence; and big data Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics
This book constitutes the refereed proceedings of the Second International Conference on Artificial Intelligence in HCI, AI-HCI 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers included in this volume were organized in topical sections as follows: Ethics, trust and explainability; human-centered AI; AI applications in HCI; and AI applications in smart environments.
The two-volume set LNCS 12765-12766 constitutes the refereed proceedings of the thematic area Human Interface and the Management of Information, HIMI 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers included in the HCII-HIMI volume set were organized in topical sections as follows: Part I: Information presentation; visualization and decision making support; information in VR and multimodal user interfaces; Part II: Learning in information-rich environments; supporting work, collaboration and design; intelligent information environments.
The two-volume set LNCS 12765-12766 constitutes the refereed proceedings of the thematic area Human Interface and the Management of Information, HIMI 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers included in the HCII-HIMI volume set were organized in topical sections as follows: Part I: Information presentation; visualization and decision making support; information in VR and multimodal user interfaces; Part II: Learning in information-rich environments; supporting work, collaboration and design; intelligent information environments.
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
The two-volume set LNCS 12794-12795 constitutes the refereed proceedings of the 9th International Conference on Culture and Computing, C&C 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers included in the HCII-C&C volume set were organized in topical sections as follows: Part I: ICT for cultural heritage; technology and art; visitors' experiences in digital culture; Part II: Design thinking in cultural contexts; digital humanities, new media and culture; perspectives on cultural computing.
The three-volume set LNCS 12771-12773 constitutes the refereed proceedings of the 13th International Conference on Cross-Cultural Design, CCD 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers included in the HCII-CCD volume set were organized in topical sections as follows: Part I: Cross-cultural experience design; cross-cultural product design; cultural differences and cross-cultural communication; Part II: Culture, arts and creativity; culture, learning and well-being; social change and social development; Part III: CCD in cultural heritage and tourism; CCD in autonomous vehicles and driving; CCD in virtual agents, robots and intelligent assistants.
The three-volume set LNCS 12771-12773 constitutes the refereed proceedings of the 13th International Conference on Cross-Cultural Design, CCD 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers included in the HCII-CCD volume set were organized in topical sections as follows: Part I: Cross-cultural experience design; cross-cultural product design; cultural differences and cross-cultural communication; Part II: Culture, arts and creativity; culture, learning and well-being; social change and social development; Part III: CCD in cultural heritage and tourism; CCD in autonomous vehicles and driving; CCD in virtual agents, robots and intelligent assistants.
This book constitutes the refereed proceedings of the Third International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2021, held as part of the 23rd International Conference, HCI International 2021, which took place virtually in July 2021.The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. HCI-CPT 2021 includes a total of 30 papers; they were organized in topical sections named: usable security; security and privacy by design; user behavior analysis in cybersecurity; and security and privacy awareness.
This book constitutes selected, revised and extended papers of the 6th International Conference on Geographical Information Systems Theory, Applications and Management, GISTAM 2020, held in Prague, Czech Republic, May 2020. Due to the COVID-19 pandemic the conference was held online. The 9 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are centered on urban and regional planning; water information systems; geospatial information and technologies; spatio-temporal database management; decision support systems; energy information systems; GPS and location detection.
This conference proceedings LNCS 12782 constitutes the refereed proceedings of the 9 th International Conference on Distributed, Ambient and Pervasive Interactions, DAPI 2021, held as part of the 23rd International Conference, HCI International 2021, which took place in July 2021. The conference was held virtually due to the COVID-19 pandemic. The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers of DAPI 2021, Distributed, Ambient and Pervasive Interactions, are organized in topical sections named: Smart Cities; IoT, Sensors and Smart Environments; Learning and Culture in Intelligent Environments; Designing Intelligent Environments.
This book constitutes the refereed proceedings of the 5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021, held in Be'er Sheva, Israel, in July 2021.The 22 full and 13 short papers presented together with a keynote paper in this volume were carefully reviewed and selected from 48 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
This book constitutes the refereed post-conference proceedings of the 10th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2020, held as a virtual event, in September 2020. The 8 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions and are organized in the following topical sections: personality and behavior; behavior in face of adversaries; smart environments; decentralized systems and digital ledgers; and reflections on socio-technical aspects of security. The Chapter "Statistical Reliability of 10 Years of Cyber Security User Studies" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
The open access volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019. The total of 9 full papers together with 1 short paper was carefully reviewed and selected from 28 submissions. The papers were organized in topical sections named as follows: Methods for Socio-Technical Systems focused on instruments, frameworks and re ections on research methodology and also System Security considered security analyses and attacks on security systems. Finally, Privacy Control incorporated works on privacy protection and control as well as human factors in relation to these topics.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Joint Conference on e-Business and Telecommunications, ICETE 2010, held in Athens, Greece, in July 2010. The 28 revised full papers presented together with 1 invited paper in this volume were carefully reviewed and selected from 422 initial submissions. They have passed two rounds of selection and improvement. According to the topics of the particular conference the papers are organized in thematical parts on data communication networking (DCNET), e-business (ICE-B), optical communication systems (OPTICS), security and cryptography (SECRYPT), signal processing and multimedia applications (SIGMAP), wireless information networks and systems (WINSYS).
This book provides a comprehensive introduction to blockchain and distributed ledger technology. Intended as an applied guide for hands-on practitioners, the book includes detailed examples and in-depth explanations of how to build and run a blockchain from scratch. Through its conceptual background and hands-on exercises, this book allows students, teachers and crypto enthusiasts to launch their first blockchain while assuming prior knowledge of the underlying technology. How do I build a blockchain? How do I mint a cryptocurrency? How do I write a smart contract? How do I launch an initial coin offering (ICO)? These are some of questions this book answers. Starting by outlining the beginnings and development of early cryptocurrencies, it provides the conceptual foundations required to engineer secure software that interacts with both public and private ledgers. The topics covered include consensus algorithms, mining and decentralization, and many more. "This is a one-of-a-kind book on Blockchain technology. The authors achieved the perfect balance between the breadth of topics and the depth of technical discussion. But the real gem is the set of carefully curated hands-on exercises that guide the reader through the process of building a Blockchain right from Chapter 1." Volodymyr Babich, Professor of Operations and Information Management, McDonough School of Business, Georgetown University "An excellent introduction of DLT technology for a non-technical audience. The book is replete with examples and exercises, which greatly facilitate the learning of the underlying processes of blockchain technology for all, from students to entrepreneurs." Serguei Netessine, Dhirubhai Ambani Professor of Innovation and Entrepreneurship, The Wharton School, University of Pennsylvania "Whether you want to start from scratch or deepen your blockchain knowledge about the latest developments, this book is an essential reference. Through clear explanations and practical code examples, the authors take you on a progressive journey to discover the technology foundations and build your own blockchain. From an operations perspective, you can learn the principles behind the distributed ledger technology relevant for transitioning towards blockchain-enabled supply chains. Reading this book, you'll get inspired, be able to assess the applicability of blockchain to supply chain operations, and learn from best practices recognized in real-world examples." Ralf W. Seifert, Professor of Technology and Operations Management at EPFL and Professor of Operations Management at IMD |
You may like...
New Research on the Voynich Manuscript…
National Security Agency
Hardcover
R691
Discovery Miles 6 910
Performances of Peace: Utrecht 1713
Renger Bruin, Cornelis Haven, …
Hardcover
R4,705
Discovery Miles 47 050
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst
Hardcover
|