Subcategories

Disinformation in Open Online Media

Posted By: AvaxGenius
Disinformation in Open Online Media

Disinformation in Open Online Media: Second Multidisciplinary International Symposium, MISDOOM 2020, Leiden, The Netherlands, October 26–27, 2020, Proceedings by Max van Duijn
English | PDF | 2020 | 288 Pages | ISBN : 3030618404 | 22.3 MB

This book constitutes the refereed proceedings of the Second Multidisciplinary International Symposium, MISDOOM 2020, held in Leiden, The Netherlands, in October 2020.*

Information and Communication Technologies for Humanitarian Services

Posted By: AvaxGenius
Information and Communication Technologies for Humanitarian Services

Information and Communication Technologies for Humanitarian Services by Muhammad Nazrul Islam
English | PDF | 2020 | 393 Pages | ISBN : 1785619969 | 13.7 MB

Humanitarian services seek to promote welfare to save lives, maintain human dignity, alleviate suffering, strengthen preparedness, and provide material and logistical assistance in response to humanitarian crises. They are thus different from development aids that address underlying socioeconomic factors and provides support for the social, economic and political developments of developing nations.

Deployable Machine Learning for Security Defense

Posted By: AvaxGenius
Deployable Machine Learning for Security Defense

Deployable Machine Learning for Security Defense: First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings by Gang Wang
English | PDF | 2020 | 168 Pages | ISBN : 3030596206 | 20 MB

This book constitutes selected papers from the First International Workshop on Deployable Machine Learning for Security Defense, MLHat 2020, held in August 2020. Due to the COVID-19 pandemic the conference was held online.

Visual Privacy Management: Design and Applications of a Privacy-Enabling Platform

Posted By: AvaxGenius
Visual Privacy Management: Design and Applications of a Privacy-Enabling Platform

Visual Privacy Management: Design and Applications of a Privacy-Enabling Platform by Mattia Salnitri
English | PDF,EPUB | 2020 | 161 Pages | ISBN : 3030599434 | 34 MB

Privacy is a burden for most organizations, the more complex and wider an organization is, the harder to manage and enforce privacy is.

Cryptography Arithmetic: Algorithms and Hardware Architectures

Posted By: AvaxGenius
Cryptography Arithmetic: Algorithms and Hardware Architectures

Cryptography Arithmetic: Algorithms and Hardware Architectures by Amos R. Omondi
English | EPUB | 2020 | 338 Pages | ISBN : 3030341410 | 12.37 MB

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level.

Information Security Education. Information Security in Action

Posted By: AvaxGenius
Information Security Education. Information Security in Action

Information Security Education. Information Security in Action: 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings by Lynette Drevin
English | PDF | 2020 | 202 Pages | ISBN : 3030592901 | 13.12 MB

This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic.

Trust, Privacy and Security in Digital Business

Posted By: AvaxGenius
Trust, Privacy and Security in Digital Business

Trust, Privacy and Security in Digital Business: 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020, Proceedings by Stefanos Gritzalis
English | PDF | 2020 | 233 Pages | ISBN : 3030589854 | 8.95 MB

This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2020, held in Bratislava, Slovakia, in September 2020. The conference was held virtually due to the COVID-19 pandemic.

Artificial Intelligence and Security

Posted By: AvaxGenius
Artificial Intelligence and Security

Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part III by Xingming Sun
English | PDF | 2020 | 695 Pages | ISBN : 9811581002 | 57.63 MB

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS.

Computer Security – ESORICS 2020

Posted By: AvaxGenius
Computer Security – ESORICS 2020

Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II by Liqun Chen
English | PDF | 2020 | 769 Pages | ISBN : 3030590127 | 39.05 MB

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format.

Computer Security – ESORICS 2020

Posted By: AvaxGenius
Computer Security – ESORICS 2020

Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I by Liqun Chen
English | PDF | 2020 | 774 Pages | ISBN : 3030589501 | 48.06 MB

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format.

Wireless Algorithms, Systems, and Applications

Posted By: AvaxGenius
Wireless Algorithms, Systems, and Applications

Wireless Algorithms, Systems, and Applications: 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part II by Dongxiao Yu
English | PDF | 2020 | 151 Pages | ISBN : 3030590186 | 9.17 MB

The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020, which was held during September 13-15, 2020. The conference was planned to take place in Qingdao, China; due to the COVID-19 pandemic it was held virtually.

Evolutionary Algorithms and Chaotic Systems

Posted By: AvaxGenius
Evolutionary Algorithms and Chaotic Systems

Evolutionary Algorithms and Chaotic Systems by Ivan Zelinka
English | PDF | 2010 | 533 Pages | ISBN : 3642107060 | 39.89 MB

This book discusses the mutual intersection of two interesting fields of research, i.e. deterministic chaos and evolutionary computation. Evolutionary computation which are able to handle tasks such as control of various chaotic systems and synthesis of their structure are explored, while deterministic chaos is investigated as a behavioral part of evolutionary algorithms.

Data Science and Analytics

Posted By: AvaxGenius
Data Science and Analytics

Data Science and Analytics: 5th International Conference on Recent Developments in Science, Engineering and Technology, REDSET 2019, Gurugram, India, November 15–16, 2019, Revised Selected Papers, Part II by Usha Batra
English | PDF | 2020 | 471 Pages | ISBN : 9811558299 | 56.16 MB

This two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on Recent Developments in Science, Engineering and Technology, REDSET 2019, held in Gurugram, India, in November 2019.

Secure Quantum Network Coding Theory

Posted By: AvaxGenius
Secure Quantum Network Coding Theory

Secure Quantum Network Coding Theory by Tao Shang
English | PDF,EPUB | 2020 | 288 Pages | ISBN : 9811533857 | 24 MB

This is the first book on secure quantum network coding, which integrates quantum cryptography into quantum communication. It summarizes the main research findings on quantum network coding, while also systematically introducing readers to secure quantum network coding schemes. With regard to coding methods, coding models and coding security, the book subsequently provides a series of quantum network coding schemes based on the integration of quantum cryptography into quantum communication. Furthermore, it describes the general security analysis method for quantum cryptographic protocols. Accordingly, the book equips readers with effective tools for researching and applying quantum network coding.

Prime Numbers and Computer Methods for Factorization

Posted By: AvaxGenius
Prime Numbers and Computer Methods for Factorization

Prime Numbers and Computer Methods for Factorization by Hans Riesel
English | EPUB(True) | 2012 | 483 Pages | ISBN : 081768297X | 3.33 MB

From the original hard cover edition:
In the modern age of almost universal computer usage, practically every individual in a technologically developed society has routine access to the most up-to-date cryptographic technology that exists, the so-called RSA public-key cryptosystem. A major component of this system is the factorization of large numbers into their primes. Thus an ancient number-theory concept now plays a crucial role in communication among millions of people who may have little or no knowledge of even elementary mathematics.