![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This book constitutes refereed proceeding of the Second International Cognitive Cities Conference, IC3 2019, held in Kyoto, Japan, in September 2019. The 37 full papers and 46 short papers were thoroughly reviewed and selected from 206 submissions. The papers are organized according to the topical sections on cognitive city for special needs; cognitive city theory, modeling and simulation; XR and educational innovations for cognitive city; educational technology and strategy in cognitive city; safety, security and privacy in cognitive city; artificial intelligence theory and technology related to cognitive city; Internet of Things for cognitive city; business application and management for cognitive city; big data for cognitive city; engineering technology and applied science for cognitive city; maker, CT and STEAM education for cognitive city.
This book constitutes the thoroughly refereed proceedings of the 27th International Conference on Computer Networks, CN 2020, held in June 2020. Due to the COVID-19 pandemic the conference was held virtually. The 14 full papers presented were carefully reviewed and selected from 34 submissions. They are organized according to the topical sections on computer networks; cybersecurity and quality of service; queueing theory and queueing networks.
This book constitutes the refereed proceedings of the 9th International Conference on Design, User Experience, and Usability, DUXU 2020, held as part of the 22nd International Conference on Human-Computer Interaction, HCII 2020, in Copenhagen, Denmark, in July 2020. The conference was held virtually due to the COVID-19 pandemic. From a total of 6326 submissions, a total of 1439 papers and 238 posters has been accepted for publication in the HCII 2020 proceedings. The 51 papers included in this volume were organized in topical sections on interactions in public, urban and rural contexts; UX design for health and well-being; DUXU for creativity, learning and collaboration; DUXU for culture and tourism.
This book constitutes the refereed proceedings of the 9th International Conference on Design, User Experience, and Usability, DUXU 2020, held as part of the 22nd International Conference on Human-Computer Interaction, HCII 2020, in Copenhagen, Denmark, in July 2020. The conference was held virtually due to the COVID-19 pandemic. From a total of 6326 submissions, a total of 1439 papers and 238 posters has been accepted for publication in the HCII 2020 proceedings. The 50 papers included in this volume were organized in topical sections on interactions in intelligent and IoT environments, usability aspects of handheld and mobile devices, designing games and immersive experiences, and UX studies in automotive and transport.
This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020.The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
This book constitutes the refereed proceedings of the 9thInternational Conference on Cloud Computing, CloudComp 2019, and the 4th International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2019, both held in Beijing, China, in December 2019. The55 full papers of both conferences were selected from 113 submissions. CloudComp 2019 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. The papers are grouped thematically in tracks on cloud architecture and scheduling; cloud-based data analytics; cloud applications; and cloud security and privacy. SmartGIFT 2019 focus on all aspects of smart grids and telecommunications, broadly understood as the renewable generation and distributed energy resources integration, computational intelligence applications, information and communication technologies.
This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.* The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy. *The conference was held virtually due to the COVID-19 pandemic.
The ideal code review process differs from organization to organization, but the needs all boil down to the same foundational factors. A software development team cannot properly grow if its code reviews are not consistent, straightforward, and aspire to hit several company goals at once, such as security, performance, longevity, and more. Implementing Effective Code Reviews is the manual your team has been seeking. Author Giuliana Carullo uses her expert background to guide you through the basics of building and maintaining clean code, and she is known for distilling complex concepts into entertaining and easy-to-grasp lessons. Healthy code requires incremental improvements, and knowing how to execute this is essential for conducting effective reviews on your team. While complex and fancy code can be interesting to work with, it will not always achieve business goals or solve urgent problems. Good coding practices are at the heart of a high-performing team, and Carullo instills these core values in a simple, straight-forward way in Implementing Effective Code Reviews. Whether you are a passionate programmer looking to go the extra mile at the office, or an experienced software engineer seeking a guide to how to improve your leadership and code review process, this book covers it all. With each chapter wrapped up in a handy checklist of crucial takeaways, Carullo has created an essential handbook for coders everywhere. There are a lot of myths that dominate the programming landscape, and Implementing Effective Code Reviews grounds the process and gets to the heart of the matter. What You Will Learn Understand how to work with your team to implement effective code reviews Master good programming practices that will build healthy code Discover how you should tackle different complex areas during code review like, security and performance Who This Book Is For Passionate programmers willing to go the extra mile to be better at their jobs, new programmers looking to strengthen their programming skills, and experienced software engineers looking for a quick guide on how to review code
This book constitutes the refereed proceedings of the 13th International Conference on Modern Information Technology and IT Education, held in Moscow, Russia, in November-December 2018. The 30 full papers and 1 short papers were carefully reviewed and selected from 164 submissions. The papers are organized according to the following topics: IT-education: methodology, methodological support; e-learning and IT in education; educational resources and best practices of IT-education; research and development in the field of new IT and their applications; scientific software in education and science; school education in computer science and ICT; economic informatics.
The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic. The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.
The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic. The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.
The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic. The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.
Business professionals looking to understand the impact, future, and limitations of blockchain need look no further. This revolutionary technology has impacted business and the economy in unprecedented ways within the past decade, and it is only continuing to grow. As a leader in your organization, it is vital that you decode blockchain and optimize all the ways in which it can improve your business. Author of Decoding Blockchain for Business, Stijn Van Hijfte, expertly emphasizes the imperative of professionals in any sector of industry to understand the core concepts and implications of blockchain technology. Cryptocurrencies, cryptotrading, and constantly-changing tax structures for financial systems using blockchain technologies are covered in detail. The lasting effects of blockchain across specific industries such as media, real estate, finance, and regulatory bodies are addressed with an insightful eye from Van Hijfte. If not properly implemented with care and a foundation of knowledge, blockchain brings risks and uncertainties to a company. Know your technology to be ready for the present and the future, and stay ahead of the curve. Blockchain is here to stay, and Decoding Blockchain for Business is your professional roadmap. What You Will Learn Discover the risks associated with blockchain if not properly implemented Gain insights on how blockchain technology affects other booming topics such as AI, IoT, and RPA Look at the regulations surrounding Blockchain in different countries Who This Book Is For Business professionals looking to understand the impact, future, and limitations of Blockchain and how individuals and companies should prepare for this technology.
This book constitutes extended revised selected papers presented during the 8th Workshop of Human-Computer Interaction Aspects to the Social Web, WAIHCWS 2017, held in Joinville, Brazil, in October 2017, and during the 9th Workshop of Human-Computer Interaction Aspects to the Social Web, WAIHCWS 2018, held in Belem, Brazil, in October 2018. The 5 full papers presented were thoroughly reviewed and selected from 14 submissions for WAIHCWS 2017 and 3 full papers were selected for publication from 20 submissions for WAIHCWS 2018. The authors were given the opportunity to extend and revise the papers after the conference. The topics included in this volume cover the following fields connected to the social web: user experience, emotion analysis, interoperability, systems-of-information systems, knowledge-intensive processes, ontology, transportation domain, mobile systems, privacy policies, digital legacy, social networks, recommendation models, scientific events, accessible web, software ecosystems, and sustainability.
This book constitutes the refereed proceedings of the Second International Conference on Futuristic Trends in Network and Communication Technologies, FTNCT 2019, held in Chandigarh, India, in November 2019. The 49 revised full papers and 6 short papers presented were carefully reviewed and selected from 226 submissions. The prime aim of the conference is to invite researchers from different domains of network and communication technologies to a single platform to showcase their research ideas. The selected papers are organized in topical sections on network and computing technologies; wireless networks and Internet of Things (IoT); futuristic computing technologies; communication technologies, security and privacy.
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.
This two-volume set constitutes the proceedings of the 19th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2020, held in Skukuza, South Africa, in April 2020.* The total of 80 full and 7 short papers presented in these volumes were carefully reviewed and selected from 191 submissions. The papers are organized in the following topical sections: Part I: block chain; fourth industrial revolution; eBusiness; business processes; big data and machine learning; and ICT and education Part II: eGovernment; eHealth; security; social media; knowledge and knowledge management; ICT and gender equality and development; information systems for governance; and user experience and usability *Due to the global COVID-19 pandemic and the consequential worldwide imposed travel restrictions and lockdown, the I3E 2020 conference event scheduled to take place in Skukuza, South Africa, was unfortunately cancelled.
This two-volume set constitutes the proceedings of the 19th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2020, held in Skukuza, South Africa, in April 2020.* The total of 80 full and 7 short papers presented in these volumes were carefully reviewed and selected from 191 submissions. The papers are organized in the following topical sections: Part I: block chain; fourth industrial revolution; eBusiness; business processes; big data and machine learning; and ICT and education Part II: eGovernment; eHealth; security; social media; knowledge and knowledge management; ICT and gender equality and development; information systems for governance; and user experience and usability *Due to the global COVID-19 pandemic and the consequential worldwide imposed travel restrictions and lockdown, the I3E 2020 conference event scheduled to take place in Skukuza, South Africa, was unfortunately cancelled.
This book constitutes the refereed post-conference proceedings of the First EAI International Conference on Sustainable Energy for Smart Cities, SESC 2029, held as part of the Smart City 360 Degrees Summit event in Braga, Portugal, in December 2019. The 23 revised full papers were carefully reviewed and selected from 38 submissions. They contribute to answer complex societal, technological, and economic problems of emergent smart cities. The papers are organized thematically in tracks, starting with mobile systems, cloud resource management and scheduling, machine learning, telecommunication systems, and network management. The papers are grouped in topical sections on electric mobility; power electronics; intelligent, transportation systems; demand response; energy; smart homes; Internet of Things; monitoring; network communications; power quality; power electronics.
This book constitutes the proceedings of the 20th International Conference on Web Engineering, ICWE 2020, which was planned to take place in Helsinki, Finland, during June 9-12, 2020. Due to the corona pandemic the conference changed to a virtual format. The total of 24 full and 10 short contributions presented in this volume were carefully reviewed and selected from 78 submissions. The book also contains 4 PhD and 7 demo papers. The papers were organized in topical sections named: User interface technologies; performance of Web technologies; machine learning; testing of Web applications; emotion detection; location-aware applications; sentiment analysis; open data; liquid Web applications; Web-based learning; PhD symposium; demos and posters.
This volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography, PQCrypto 2020, held in Paris, France in April 2020. The 29 full papers presented in this volume were carefully reviewed and selected from 86 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.
This book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St. Kitts, St. Kitts and Nevis, in February 2019.The 20 full papers and 4 short papers presented in this book were carefully reviewed and selected from 34 submissions.The papers feature the outcome of the 4th Workshop on Advances in Secure Electronic Voting, VOTING 2019 and the Third Workshop on Trusted Smart Contracts, WTSC 2019. VOTING covered topics like election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems.WTSC focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of (specialized) blockchains.
This first volume of the three-volume set (CCIS 1193, CCIS 1194, and CCIS 1195) constitutes the refereed proceedings of the First International Conference on Applied Technologies, ICAT 2019, held in Quito, Ecuador, in December 2019. The 124 full papers were carefully reviewed and selected from 328 submissions. The papers are organized according to the following topics: technology trends; computing; intelligent systems; machine vision; security; communication; electronics; e-learning; e-government; e-participation.
This volume constitutes the refereed proceedings of the Second International Conference on Computational Intelligence, Security and Internet of Things, ICCISIoT 2019, held in Agartala, India, in December 2019. The 31 full papers and 6 short papers were carefully reviewed and selected from 153 submissions. The papers are organised according to the following topics: Computational Intelligence, Security, Internet of Things. Papers from the extended track are also presented in the volume.
This book constitutes the refereed proceedings of the 8th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2019, held in Goa, India, in December 2019. The 12 full papers presented were carefully reviewed and selected from 34 submissions. They were organized according to the following topical sections: cyber security; security and artifcial intelligence; access control models; and social networks. |
You may like...
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst
Hardcover
Cryptographic Boolean Functions and…
Thomas W Cusick, Pantelimon Stanica
Paperback
R1,920
Discovery Miles 19 200
|