![]() |
![]() |
Your cart is empty |
||
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020.The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
This book contains a compilation of the revised and extended versions of the best papers presented at the 16th International Joint Conference on E-Business and Telecommunications, ICETE 2019, held in Prague, Czech Republic, in July 2019. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 11 full papers presented in the volume were carefully reviewed and selected from the 166 submissions. The papers cover the following key areas of data communication networking, e-business, security and cryptography, signal processing and multimedia applications.
This book constitutes the refereed proceedings of the 11th International Development Informatics Association Conference, IDIA 2020, held in Macau, China, in March 2020.* The 14 revised full papers presented were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on ICT4D: taking stock; harnessing frontier technologies for sustainable development; ICT4D discourse, methodologies, and theoretical reflections; the evolving Global Souths. *The conference was held virtually due to the COVID-19 pandemic.
This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Conference on Financial Cryptography and Data Security, FC 2020, held in Kota Kinabalu, Malaysia, in February 2020. The 34 revised full papers and 2 short papers were carefully selected and reviewed from 162 submissions. The papers are grouped in the following topical sections: attacks; consensus; cryptoeconomics; layer 2; secure computation; privacy; crypto foundations; empirical studies; and smart contracts.
This conference proceeding LNCS 12203 constitutes the refereed proceedings of the 12th International Conference on Cross-Cultural Design, CCD 2020, held as part of HCI International 2020 in Copenhagen, Denmark in July 2020. The conference was held virtually due to the corona pandemic. The total of 1439 papers and 238 posters included in the 40 HCII 2020 proceedings volumes was carefully reviewed and selected from 6326 submissions. The regular papers of DAPI 2020, Distributed, Ambient and Pervasive Interactions, presented in this volume were organized in topical sections named: Design Approaches, Methods and Tools, Smart Cities and Landscapes, Well-being, Learning and Culture in Intelligent Environments and much more.
This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020. The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions. The selected papers are devoted to topics such as secure operating system architectures, applications programming and security testing, intrusion and attack detection, cybersecurity intelligence, access control, cryptographic techniques, cryptocurrencies, ransomware, anonymity, trust, recommendation systems, as well machine learning problems. Due to the Corona pandemic the event was held virtually.
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.
This LNCS 12216 constitutes the refereed proceedings of the First International Conference on Design, Operation and Evaluation of Mobile Communications, MOBILE 2020, held as part of HCI International 2020 in Copenhagen, Denmark in July 2020. The conference was held virtually due to the corona pandemic. The total of 1439 papers and 238 posters included in the 40 HCII 2020 proceedings volumes was carefully reviewed and selected from 6326 submissions. The regular papers of Design, Operation and Evaluation of Mobile Communications, MOBILE 2020, presented in this volume were organized in topical section around the subject: Design, Operation and Evaluation of Mobile Communications.
This book constitutes the refereed proceedings of the 13th International Conference on Modern Information Technology and IT Education, held in Moscow, Russia, in November-December 2018. The 30 full papers and 1 short papers were carefully reviewed and selected from 164 submissions. The papers are organized according to the following topics: IT-education: methodology, methodological support; e-learning and IT in education; educational resources and best practices of IT-education; research and development in the field of new IT and their applications; scientific software in education and science; school education in computer science and ICT; economic informatics.
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.
The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic. The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.
The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic. The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.
This book constitutes the refereed proceedings of the 9th International Conference on Design, User Experience, and Usability, DUXU 2020, held as part of the 22nd International Conference on Human-Computer Interaction, HCII 2020, in Copenhagen, Denmark, in July 2020. The conference was held virtually due to the COVID-19 pandemic. From a total of 6326 submissions, a total of 1439 papers and 238 posters has been accepted for publication in the HCII 2020 proceedings. The 51 papers included in this volume were organized in topical sections on interactions in public, urban and rural contexts; UX design for health and well-being; DUXU for creativity, learning and collaboration; DUXU for culture and tourism.
This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information Security, ISSA 2020, which was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic.The 10 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers deal with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; and distributed systems security.
This book constitutes the refereed proceedings of the 15th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2020, held in Bordeaux, France, in November 2020. The 18 full papers were carefully reviewed and selected from 22 submissions. The selected papers present orig-inal research results in areas related to the physical layer, communication protocols and standards, mobility and traffic models, experimental and field operational testing, and performance analysis.
We already observe the positive effects of AI in almost every field, and foresee its potential to help address our sustainable development goals and the urgent challenges for the preservation of the environment. We also perceive that the risks related to the safety, security, confidentiality, and fairness of AI systems, the threats to free will of possibly manipulative systems, as well as the impact of AI on the economy, employment, human rights, equality, diversity, inclusion, and social cohesion need to be better assessed. The development and use of AI must be guided by principles of social cohesion, environmental sustainability, resource sharing, and inclusion. It has to integrate human rights, and social, cultural, and ethical values of democracy. It requires continued education and training as well as continual assessment of its effects through social deliberation. The "Reflections on AI for Humanity" proposed in this book develop the following issues and sketch approaches for addressing them: How can we ensure the security requirements of critical applications and the safety and confidentiality of data communication and processing? What techniques and regulations for the validation, certification, and audit of AI tools are needed to develop confidence in AI? How can we identify and overcome biases in algorithms? How do we design systems that respect essential human values, ensuring moral equality and inclusion? What kinds of governance mechanisms are needed for personal data, metadata, and aggregated data at various levels? What are the effects of AI and automation on the transformation and social division of labor? What are the impacts on economic structures? What proactive and accommodation measures will be required? How will people benefit from decision support systems and personal digital assistants without the risk of manipulation? How do we design transparent and intelligible procedures and ensure that their functions reflect our values and criteria? How can we anticipate failure and restore human control over an AI system when it operates outside its intended scope? How can we devote a substantial part of our research and development resources to the major challenges of our time such as climate, environment, health, and education?
This book presents revised selected papers from the 17th International Forum on Digital TV and Wireless Multimedia Communication, IFTC 2020, held in Shanghai, China, in December 2020.The 21 full papers and 16 short papers presented in this volume were carefully reviewed and selected from 120 submissions. They were organized in topical sections on image processing; machine learning; quality assessment; telecommunications; video surveillance; and virtual reality.
This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical sections on randomness and its use; computer-assisted cryptographic proofs; outsourcing and delegatin computation; symmetric cryptanalysis and constructions; secure computation: leakage and side channels; quantum cryptography; lattices and knapsacks; public-key encryption; symmetric schemes; signatures; obilvious transfer and secret sharing; and multivariate and coding-based schemes.
This book constitutes the proceedings of the 20th International Conference on Web Engineering, ICWE 2020, which was planned to take place in Helsinki, Finland, during June 9-12, 2020. Due to the corona pandemic the conference changed to a virtual format. The total of 24 full and 10 short contributions presented in this volume were carefully reviewed and selected from 78 submissions. The book also contains 4 PhD and 7 demo papers. The papers were organized in topical sections named: User interface technologies; performance of Web technologies; machine learning; testing of Web applications; emotion detection; location-aware applications; sentiment analysis; open data; liquid Web applications; Web-based learning; PhD symposium; demos and posters.
This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.* The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy. *The conference was held virtually due to the COVID-19 pandemic.
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020.The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more.
This book constitutes the refereed post-conference proceedings of the First EAI International Conference on Sustainable Energy for Smart Cities, SESC 2029, held as part of the Smart City 360 Degrees Summit event in Braga, Portugal, in December 2019. The 23 revised full papers were carefully reviewed and selected from 38 submissions. They contribute to answer complex societal, technological, and economic problems of emergent smart cities. The papers are organized thematically in tracks, starting with mobile systems, cloud resource management and scheduling, machine learning, telecommunication systems, and network management. The papers are grouped in topical sections on electric mobility; power electronics; intelligent, transportation systems; demand response; energy; smart homes; Internet of Things; monitoring; network communications; power quality; power electronics.
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Multi-Agent-Based Simulation, MABS 2020, held in Auckland, New Zealand, in May 2020 collocated with 19th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2020). Due to COVID-19 the workshop has been held online. The 9 revised full papers included in this volume were carefully selected from 11 submissions. The workshop focused on finding efficient solutions to model complex social systems, in such areas as economics, management, organizational and social sciences in general and much more. |
![]() ![]() You may like...
Computer Vision and Machine Learning…
Ling Shao, Jungong Han, …
Hardcover
Learn cocos2d Game Development with iOS…
Steffen Itterheim, Andreas Lw
Paperback
Video Segmentation and Its Applications
King Ngi Ngan, Hongliang Li
Hardcover
R2,873
Discovery Miles 28 730
Computer Vision and Machine Learning in…
Mohammad Shorif Uddin, Jagdish Chand Bansal
Hardcover
R4,594
Discovery Miles 45 940
iOS 11 Swift Programming Cookbook
Vandad Nahavandipoor
Paperback
Beginning iPhone Development - Exploring…
Jack Nutting, Fredrik Olsson, …
Paperback
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R8,638
Discovery Miles 86 380
|