![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This book constitutes the refereed proceedings of the 16th World Congress on Services, SERVICES 2020, held as part of the Services Conference Federation, SCF 2020, in Honolulu, HI, USA, in September 2020. The conference was held virtually due to the COVID-19 pandemic.The 5 full papers and 4 short papers presented were carefully reviewed and selected from 10 submissions. The papers cover topics in the field of software engineering foundations and applications with a focus on novel approaches for engineering requirements, design and architectures, testing, maintenance and evolution, model-driven development, software processes, metrics, quality assurance and new software economics models, search-based software engineering, benefiting day-to-day services sectors and derived through experiences, with appreciation to scale, pragmatism, transparency, compliance and/or dependability.
This book constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "ICT Unbounded, Social Impact of Bright ICT Adoption" on Transfer and Diffusion of IT, TDIT 2019, held in Accra, Ghana, in June 2019. The 30 revised full papers and 4 short papers presented were carefully reviewed and selected from 72 submissions. The papers focus on Bright Information and Communication Technology, a concept that entails the development of relevant technologies, business models, public policies, social norms, international agreements, metrics of measuring national progress and preventing undesirable activities on the Internet. They are organized in the following topical sections: technology adoption, diffusion and ubiquitous computing; big data and business intellligence; smart cities; and security, privacy, ethics and misinformation.
This book constitutes the refereed post-conference proceedings of the IFIP TC 3 Open Conference on Computers in Education, OCCE 2018, held in Linz, Austria, in June 2018. The 24 revised full papers and 3 short papers included in this volume were carefully reviewed and selected from 63 submissions during two rounds of reviewing. The papers discuss key emerging topics and evolving practices in the area of educational computing research. They are organized in the following topical sections: computational thinking; programming and computer science education; teachers' education and professional development; games-based learning and gamification; learning in specific and disciplinary contexts; learning in social networking environments; and self-assessment, e-assessment and e-examinations.
This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in the analysis-by-synthesis approach. This book distinguishes itself from the existing literature in three ways. First, it not only reviews traditional VC for binary secret images, but also covers recent efforts in improving visual quality for gray scale secret images. Second, not only traditional quality measures are reviewed, but also measures that were not used for measuring perceptual quality of decrypted secret images, such as Radially Averaged Power Spectrum Density (RAPSD) and residual variance, are employed for evaluating and guiding the design of VC algorithms. Third, unlike most VC books following a mathematical formal style, this book tries to make a balance between engineering intuition and mathematical reasoning. All the targeted problems and corresponding solutions are fully motivated by practical applications and evaluated by experimental tests, while important security issues are presented as mathematical proof. Furthermore, important algorithms are summarized as pseudocodes, thus enabling the readers to reproduce the results in the book. Therefore, this book serves as a tutorial for readers with an engineering background as well as for experts in related areas to understand the basics and research frontiers in visual cryptography.
This book constitutes the refereed proceedings of the First International Conference on Big Data and Security, ICBDS 2019, held in Nanjing, China, in December 2019. The 37 revised full papers and 12 short papers were carefully reviewed and selected out of 251 submissions. The papers included in this book cover topics in cybersecurity & privacy, big data, blockchain & internet of things, security in cloud and fog computing, and artificial intelligence/ machine learning security.
Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17-21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020. The 85 papers presented in the proceedings were carefully reviewed and selected from a total of 371 submissions. They were organized in topical sections as follows: Part I: Security Models; Symmetric and Real World Cryptography; Hardware Security and Leakage Resilience; Outsourced encryption; Constructions. Part II: Public Key Cryptanalysis; Lattice Algorithms and Cryptanalysis; Lattice-based and Post Quantum Cryptography; Multi-Party Computation. Part III: Multi-Party Computation; Secret Sharing; Cryptanalysis; Delay functions; Zero Knowledge.
Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17-21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020. The 85 papers presented in the proceedings were carefully reviewed and selected from a total of 371 submissions. They were organized in topical sections as follows: Part I: Security Models; Symmetric and Real World Cryptography; Hardware Security and Leakage Resilience; Outsourced encryption; Constructions. Part II: Public Key Cryptanalysis; Lattice Algorithms and Cryptanalysis; Lattice-based and Post Quantum Cryptography; Multi-Party Computation. Part III: Multi-Party Computation; Secret Sharing; Cryptanalysis; Delay functions; Zero Knowledge.
Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17-21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020. The 85 papers presented in the proceedings were carefully reviewed and selected from a total of 371 submissions. They were organized in topical sections as follows: Part I: Security Models; Symmetric and Real World Cryptography; Hardware Security and Leakage Resilience; Outsourced encryption; Constructions. Part II: Public Key Cryptanalysis; Lattice Algorithms and Cryptanalysis; Lattice-based and Post Quantum Cryptography; Multi-Party Computation. Part III: Multi-Party Computation; Secret Sharing; Cryptanalysis; Delay functions; Zero Knowledge.
This book constitutes the proceedings of the 19th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2020, held in Linkoeping, Sweden, in August/September 2020, in conjunction with the IFIP WG 8.5 IFIP International Conference on Electronic Participation (ePart 2020) and the International Conference for E-Democracy and Open Government Conference (CeDEM 2020). The conference was held virtually due to the COVID-19 pandemic. The 30 full papers presented were carefully reviewed and selected from 118 submissions. The papers are clustered under the following topical sections: e-government foundations; e-government services and open government; open data: social and technical aspects; AI, data analytics, and automated decision making; and smart cities.
The two-volume set IFIP AICT 566 and 567 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2019, held in Austin, TX, USA. The 161 revised full papers presented were carefully reviewed and selected from 184 submissions. They discuss globally pressing issues in smart manufacturing, operations management, supply chain management, and Industry 4.0. The papers are organized in the following topical sections: lean production; production management in food supply chains; sustainability and reconfigurability of manufacturing systems; product and asset life cycle management in smart factories of industry 4.0; variety and complexity management in the era of industry 4.0; participatory methods for supporting the career choices in industrial engineering and management education; blockchain in supply chain management; designing and delivering smart services in the digital age; operations management in engineer-to-order manufacturing; the operator 4.0 and the Internet of Things, services and people; intelligent diagnostics and maintenance solutions for smart manufacturing; smart supply networks; production management theory and methodology; data-driven production management; industry 4.0 implementations; smart factory and IIOT; cyber-physical systems; knowledge management in design and manufacturing; collaborative product development; ICT for collaborative manufacturing; collaborative technoloy; applications of machine learning in production management; and collaborative technology.
This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020, in Kota Kinabalu, Malaysia, in February 2020. The 39 full papers and 3 short papers presented in this book were carefully reviewed and selected from 73 submissions. The papers feature four Workshops: The 1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020. The AsiaUSEC Workshop contributes an increase of the scientific quality of research in human factors in security and privacy. In terms of improving efficacy of secure systems, the research included an extension of graphical password authentication. Further a comparative study of SpotBugs, SonarQube, Cryptoguard and CogniCrypt identified strengths in each and refined the need for improvements in security testing tools. The CoDeFi Workshop discuss multi-disciplinary issues regarding technologies and operations of decentralized finance based on permissionless blockchain. The workshop consists of two parts; presentations by all stakeholders, and unconference style discussions. The VOTING Workshop cover topics like new methods for risk-limited audits, new ethods to increase the efficiency of mixnets, verification of security of voting schemes election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems, and new way of preventing voteselling by de-incentivising this via smart contracts. The WTSC Workshop focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of specialized blockchains.
This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2020, 39th International Conference on Computer Safety, Reliability and Security, Lisbon, Portugal, September 2020. The 26 regular papers included in this volume were carefully reviewed and selected from 45 submissions; the book also contains one invited paper. The workshops included in this volume are: DECSoS 2020: 15th Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems. DepDevOps 2020: First International Workshop on Dependable Development-Operation Continuum Methods for Dependable Cyber-Physical Systems. USDAI 2020: First International Workshop on Underpinnings for Safe Distributed AI. WAISE 2020: Third International Workshop on Artificial Intelligence Safety Engineering. The workshops were held virtually due to the COVID-19 pandemic.
The two-volume set IFIP AICT 566 and 567 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2019, held in Austin, TX, USA. The 161 revised full papers presented were carefully reviewed and selected from 184 submissions. They discuss globally pressing issues in smart manufacturing, operations management, supply chain management, and Industry 4.0. The papers are organized in the following topical sections: lean production; production management in food supply chains; sustainability and reconfigurability of manufacturing systems; product and asset life cycle management in smart factories of industry 4.0; variety and complexity management in the era of industry 4.0; participatory methods for supporting the career choices in industrial engineering and management education; blockchain in supply chain management; designing and delivering smart services in the digital age; operations management in engineer-to-order manufacturing; the operator 4.0 and the Internet of Things, services and people; intelligent diagnostics and maintenance solutions for smart manufacturing; smart supply networks; production management theory and methodology; data-driven production management; industry 4.0 implementations; smart factory and IIOT; cyber-physical systems; knowledge management in design and manufacturing; collaborative product development; ICT for collaborative manufacturing; collaborative technoloy; applications of machine learning in production management; and collaborative technology.
The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.
This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Conference on Financial Cryptography and Data Security, FC 2020, held in Kota Kinabalu, Malaysia, in February 2020. The 34 revised full papers and 2 short papers were carefully selected and reviewed from 162 submissions. The papers are grouped in the following topical sections: attacks; consensus; cryptoeconomics; layer 2; secure computation; privacy; crypto foundations; empirical studies; and smart contracts.
This book constitutes the refereed and revised post-conference proceedings of the 8th International Workshop on Code-Based Cryptography, CBCrypto 2020, held in Zagreb, Croatia, in May 2020.*The seven papers presented in this book were carefully reviewed and selected from numerous submissions. These contributions focus on various topics such as code-based cryptography, from design to implementation, security, new systems, and improved decoding algorithms. * The conference was held virtually due to the COVID-19 pandemic.
This two-volume set LNCS 12205 and LNCS 12206 constitutes the proceedings of the 7th International Conference on Learning and Collaboration Technologies, LCT 2020, held as part of the 22nd International Conference, HCI International 2020, which took place in Copenhagen, Denmark, in July 2020. The total of 1439 papers and 238 posters included in the 37 HCII 2020 proceedings volumes was carefully reviewed and selected from 6326 submissions. The papers in this volume are organized in the following topical sections: designing and evaluating learning experiences; learning analytics, dashboards and learners models; language learning and teaching; and technology in education: policies and practice. As a result of the Danish Government's announcement, dated April 21, 2020, to ban all large events (above 500 participants) until September 1, 2020, the HCII 2020 conference was held virtually.
This book constitutes the refereed proceedings of the 11th International Development Informatics Association Conference, IDIA 2020, held in Macau, China, in March 2020.* The 14 revised full papers presented were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on ICT4D: taking stock; harnessing frontier technologies for sustainable development; ICT4D discourse, methodologies, and theoretical reflections; the evolving Global Souths. *The conference was held virtually due to the COVID-19 pandemic.
This book contains a compilation of the revised and extended versions of the best papers presented at the 16th International Joint Conference on E-Business and Telecommunications, ICETE 2019, held in Prague, Czech Republic, in July 2019. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 11 full papers presented in the volume were carefully reviewed and selected from the 166 submissions. The papers cover the following key areas of data communication networking, e-business, security and cryptography, signal processing and multimedia applications.
This book constitutes the revised, selected and extended papers of the 5th International Conference on Communication Technologies for Ageing Well and e-Health, ICT4AWE 2019, held in Heraklion, Crete, Greece in May 2019.The 9 full papers presented were carefully reviewed and selected from 52 submissions. The papers aim at contributing to the understanding of relevant trends of current research on ICT for Ageing Well and eHealth including the ambient assisted living.
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. *The conference was held virtually due to the COVID-19 pandemic.
This book constitutes the proceedings of the 18th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2020, held in L'Aquila, Italy, in October 2020. The 29 regular and 17 demo papers presented in this volume were carefully reviewed and selected from 64 submissions. They deal with the application and validation of agent-based models, methods, and technologies in a number of key applications areas, including: advanced models and learning, agent-based programming, decision-making, educa-tion and social interactions, formal and theoretic models, health and safety, mobility and the city, swarms and task allocation.
This two-volume set LNCS 12192 and 12193 constitutes the refereed proceedings of the 12th International Conference on Cross-Cultural Design, CCD 2020, held as part of HCI International 2020 in Copenhagen, Denmark in July 2020.The conference was held virtually due to the corona pandemic. The total of 1439 papers and 238 posters included in the 40 HCII 2020 proceedings volumes was carefully reviewed and selected from 6326 submissions. The regular papers of Cross-Cultural Design CCD 2020 presented in this volume were organized in topical sections named: Cross-Cultural User Experience Design; Culture-Based Design, Cross-Cultural Behaviour and Attitude, and Cultural Facets of Interactions with Autonomous Agents and Intelligent Environments.
This two-volume set LNCS 12192 and 12193 constitutes the refereed proceedings of the 12th International Conference on Cross-Cultural Design, CCD 2020, held as part of HCI International 2020 in Copenhagen, Denmark in July 2020.The conference was held virtually due to the corona pandemic. The total of 1439 papers and 238 posters included in the 40 HCII 2020 proceedings volumes was carefully reviewed and selected from 6326 submissions. The regular papers of Cross-Cultural Design CCD 2020 presented in this volume were organized in topical sections named: Health, Well-being and Social Design Across Cultures, Culture, Learning and Communication, and Culture and Creativity.
This conference proceeding LNCS 12203 constitutes the refereed proceedings of the 12th International Conference on Cross-Cultural Design, CCD 2020, held as part of HCI International 2020 in Copenhagen, Denmark in July 2020. The conference was held virtually due to the corona pandemic. The total of 1439 papers and 238 posters included in the 40 HCII 2020 proceedings volumes was carefully reviewed and selected from 6326 submissions. The regular papers of DAPI 2020, Distributed, Ambient and Pervasive Interactions, presented in this volume were organized in topical sections named: Design Approaches, Methods and Tools, Smart Cities and Landscapes, Well-being, Learning and Culture in Intelligent Environments and much more. |
You may like...
Experimental Multimedia Systems for…
Ioannis Deliyannis, Petros Kostagiolas, …
Hardcover
R4,890
Discovery Miles 48 900
The Office of the Holy Communion in the…
Edward Meyrick Goulburn
Paperback
R605
Discovery Miles 6 050
Learning without Boundaries - Technology…
Robert J. Seidel, Paul R. Chatelier
Hardcover
R4,179
Discovery Miles 41 790
Worst-Case Execution Time Aware…
Paul Lokuciejewski, Peter Marwedel
Hardcover
R4,157
Discovery Miles 41 570
|