![]() |
![]() |
Your cart is empty |
||
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This book constitutes the refereed proceedings of the 15th Conference on Image and Graphics Technologies and Applications, IGTA 2020, held in Beijing, China in September, 2020.*The 24 papers presented were carefully reviewed and selected from 115 submissions. They provide a forum for sharing progresses in the areas of image processing technology; image analysis and understanding; computer vision and pattern recognition; big data mining, computer graphics and VR, as well as image technology applications. *The conference was held virtually due to the COVID-19 pandemic.
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020. The 31 papers presented in this volume were carefully reviewed and selected from 65 submissions. They stem from the following workshops: AIBlock 2020: Second International Workshop on Application Intelligence and Blockchain Security AIHWS 2020: First International Workshop on Artificial Intelligence in Hardware Security AIoTS 2020: Second International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2020: Second International Workshop on Cloud Security and Privacy SCI 2020: First International Workshop on Secure Cryptographic Implementation SecMT 2020: First International Workshop on Security in Mobile Technologies SiMLA 2020: Second International Workshop on Security in Machine Learning and its Applications
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it was an online event in 2021.The 103 full papers presented in the proceedings were carefully reviewed and selected from a total of 426 submissions. The papers are organized in the following topical sections: Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments. Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis. Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing. Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols.
The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, but had to change to an online format due to the COVID-19 pandemic.The 52 papers included in these proceedings were carefully reviewed and selected from 156 submissions. They focus on all aspects of public-key cryptography, covering theory, implementations and applications. This year, post-quantum cryptography, PQC constructions and cryptanalysis received special attention.
This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security.
This book constitutes the refereed proceedings of the 5th International Conference, ICDEc 2020, held in Bucharest, Romania, in June 2020. Due to the COVID-19 pandemic the conference took place virtually. The 13 full papers presented in this volume together with 3 abstracts of keynotes and 1 introductory paper by the steering committee were carefully reviewed and selected from a total of 41 submissions. The core theme of this year's conference was "Emerging Technologies & Business Innovation". The papers were organized in four topical sections named: digital transformation, data analytics, digital marketing, and digital business models.
This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography, SAC 2020, held in Halifax, Nova Scotia, Canada in October 2020. The 27 full papers presented in this volume were carefully reviewed and selected from 52 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions
Data are not only ubiquitous in society, but are increasingly complex both in size and dimensionality. Dimension reduction offers researchers and scholars the ability to make such complex, high dimensional data spaces simpler and more manageable. This Element offers readers a suite of modern unsupervised dimension reduction techniques along with hundreds of lines of R code, to efficiently represent the original high dimensional data space in a simplified, lower dimensional subspace. Launching from the earliest dimension reduction technique principal components analysis and using real social science data, I introduce and walk readers through application of the following techniques: locally linear embedding, t-distributed stochastic neighbor embedding (t-SNE), uniform manifold approximation and projection, self-organizing maps, and deep autoencoders. The result is a well-stocked toolbox of unsupervised algorithms for tackling the complexities of high dimensional data so common in modern society. All code is publicly accessible on Github.
This book constitutes the proceedings of the Third International Conference on Blockchain, ICBC 2020, held as part of SCF 2020, during September 18-20, 2020. The conference was planned to take place in Honolulu, HI, USA and was changed to a virtual format due to the COVID-19 pandemic. The 14 full paper and 1 short paper presented were carefully reviewed and selected from 26 submissions. They deal with all topics regarding blockchain technologies, platforms, solutions and business models, including new blockchain architecture, platform constructions, blockchain development and blockchain services technologies as well as standards, and blockchain services innovation lifecycle including enterprise modeling, business consulting, solution creation, services orchestration, services optimization, services management, services marketing, business process integration and management.
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.
This book constitutes the refereed proceedings of the 19th International Conference on Ad-Hoc, Mobile, and Wireless Networks, ADHOC-NOW 2020, held in Bari, Italy, in October 2020.*The 19 full and 4 short papers presented were carefully reviewed and selected from 39 submissions. The papers provide an in-depth and stimulating view on the new frontiers in the field of mobile, ad hoc and wireless computing. They are organized in the following topical sections: intelligent, programmable and delay- and disruption- tolerant networks; internet of drones and smart mobility; internet of things and internet of medical things; secure communication protocols and architectures; and wireless systems. *The conference was held virtually due to the COVID-19 pandemic.
This book constitutes the proceedings of the 23rd International Conference on Text, Speech, and Dialogue, TSD 2020, held in Brno, Czech Republic, in September 2020.* The 54 full papers presented in this volume were carefully reviewed and selected from 110 submissions. They were organized in topical sections named text, speech, and dialogue. The book also contains 3 invited talks. * The conference was held virtually due to the COVID-19 pandemic.
The two-volume set IFIP AICT 566 and 567 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2019, held in Austin, TX, USA. The 161 revised full papers presented were carefully reviewed and selected from 184 submissions. They discuss globally pressing issues in smart manufacturing, operations management, supply chain management, and Industry 4.0. The papers are organized in the following topical sections: lean production; production management in food supply chains; sustainability and reconfigurability of manufacturing systems; product and asset life cycle management in smart factories of industry 4.0; variety and complexity management in the era of industry 4.0; participatory methods for supporting the career choices in industrial engineering and management education; blockchain in supply chain management; designing and delivering smart services in the digital age; operations management in engineer-to-order manufacturing; the operator 4.0 and the Internet of Things, services and people; intelligent diagnostics and maintenance solutions for smart manufacturing; smart supply networks; production management theory and methodology; data-driven production management; industry 4.0 implementations; smart factory and IIOT; cyber-physical systems; knowledge management in design and manufacturing; collaborative product development; ICT for collaborative manufacturing; collaborative technoloy; applications of machine learning in production management; and collaborative technology.
The two-volume set IFIP AICT 566 and 567 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2019, held in Austin, TX, USA. The 161 revised full papers presented were carefully reviewed and selected from 184 submissions. They discuss globally pressing issues in smart manufacturing, operations management, supply chain management, and Industry 4.0. The papers are organized in the following topical sections: lean production; production management in food supply chains; sustainability and reconfigurability of manufacturing systems; product and asset life cycle management in smart factories of industry 4.0; variety and complexity management in the era of industry 4.0; participatory methods for supporting the career choices in industrial engineering and management education; blockchain in supply chain management; designing and delivering smart services in the digital age; operations management in engineer-to-order manufacturing; the operator 4.0 and the Internet of Things, services and people; intelligent diagnostics and maintenance solutions for smart manufacturing; smart supply networks; production management theory and methodology; data-driven production management; industry 4.0 implementations; smart factory and IIOT; cyber-physical systems; knowledge management in design and manufacturing; collaborative product development; ICT for collaborative manufacturing; collaborative technoloy; applications of machine learning in production management; and collaborative technology.
This book constitutes the refereed post-conference proceedings of the 10th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2020, held as a virtual event, in September 2020. The 8 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions and are organized in the following topical sections: personality and behavior; behavior in face of adversaries; smart environments; decentralized systems and digital ledgers; and reflections on socio-technical aspects of security. The Chapter "Statistical Reliability of 10 Years of Cyber Security User Studies" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021.The 78 full papers included in these proceedings were accepted from a total of 400 submissions. They were organized in topical sections as follows: Part I: Best papers; public-key cryptography; isogenies; post-quantum cryptography; lattices; homomorphic encryption; symmetric cryptanalysis; Part II: Symmetric designs; real-world cryptanalysis; implementation issues; masking and secret-sharing; leakage, faults and tampering; quantum constructions and proofs; multiparty computation; Part III: Garbled circuits; indistinguishability obfuscation; non-malleable commitments; zero-knowledge proofs; property-preserving hash functions and ORAM; blockchain; privacy and law enforcement.
This book constitutes selected and revised papers from the Second International Conference on Digital Health and Medical Analytics, DHA 2020, held in Beijing, China, in July 25, 2020. The 5 full papers and 7 short papers presented in this volume were thoroughly reviewed and selected from 75 submissions. The papers present discussion on such topics as social networks, analytics and engagement with health devices, big data, public health surveillance, persuasive technologies, epidemic intelligence, participatory surveillance, emergency medicine, serious games for public health interventions and automated early identification of health threats and responses.
This book constitutes the refereed post-conference proceedings of the First IFIP WG 3.4 International Conference on Sustainable ICT, Education, and Learning, SUZA 2019, held in Zanzibar, Tanzania, in April 2019, in conjunction with the 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries. The 27 revised full papers presented in this volume were carefully reviewed and selected from 41 submissions. The papers cover topics such as peer and collaborative learning in informatics; pedagogical approaches to teaching specific informatics courses; workplace learning related to information systems; e-learning; ICTs for development; mobile solutions in learning in the North and South; lifelong learning; applications for disabled students; traversal skills and computational thinking; and teacher education in the global South.
This book constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "ICT Unbounded, Social Impact of Bright ICT Adoption" on Transfer and Diffusion of IT, TDIT 2019, held in Accra, Ghana, in June 2019. The 30 revised full papers and 4 short papers presented were carefully reviewed and selected from 72 submissions. The papers focus on Bright Information and Communication Technology, a concept that entails the development of relevant technologies, business models, public policies, social norms, international agreements, metrics of measuring national progress and preventing undesirable activities on the Internet. They are organized in the following topical sections: technology adoption, diffusion and ubiquitous computing; big data and business intellligence; smart cities; and security, privacy, ethics and misinformation.
This book constitutes the refereed conference proceedings of the 8th Annual Privacy Forum, APF 2020, held in Lisbon, Portugal, in October 2020. The 12 revised full papers were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on impact assessment; privacy by design; data protection and security; and transparency.
This book constitutes the refereed proceedings of the First International Conference on Big Data and Security, ICBDS 2019, held in Nanjing, China, in December 2019. The 37 revised full papers and 12 short papers were carefully reviewed and selected out of 251 submissions. The papers included in this book cover topics in cybersecurity & privacy, big data, blockchain & internet of things, security in cloud and fog computing, and artificial intelligence/ machine learning security.
This book constitutes the proceedings of the 12th IFIP WG 8.5 International Conference on Electronic Participation, ePart 2019, held in Linkoeping, Sweden, in August/September 2020, in conjunction with the 19th IFIP WG 8.5 IFIP International Conference on Electronic Government (EGOV 2020) and the International Conference for E-Democracy and Open Government Conference (CeDEM 2020). The conference was held virtually due to the COVID-19 pandemic. The 11 full papers presented were carefully reviewed and selected from 33 submissions. The papers are clustered under the following topical sections: eParticipation developments; digital transformation; open government and transparency; and user perspectives.
The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020. Due to COVID-19 pandemic the conference was organized in an online event. Computational Science is the main pillar of most of the present research, industrial and commercial applications, and plays a unique role in exploiting ICT innovative technologies. The 466 full papers and 32 short papers presented were carefully reviewed and selected from 1450 submissions. Apart from the general track, ICCSA 2020 also include 52 workshops, in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as software engineering, security, machine learning and artificial intelligence, blockchain technologies, and of applications in many fields. |
![]() ![]() You may like...
Securing the Internet of Things…
Information Reso Management Association
Hardcover
R11,203
Discovery Miles 112 030
|