Subcategories

Blockchain Technology and Application

Posted By: AvaxGenius
Blockchain Technology and Application

Blockchain Technology and Application: Third CCF China Blockchain Conference, CBCC 2020, Jinan, China, December 18-20, 2020, Revised Selected Papers by Ke Xu
English | PDF | 2021 | 135 Pages | ISBN : 9813364777 | 16.3 MB

This book constitutes the refereed proceedings of the Third CCF China Blockchain Conference, CBCC 2020, held in Jinan, China, December 2020.

Blockchain and Machine Learning for e-Healthcare Systems

Posted By: AvaxGenius
Blockchain and Machine Learning for e-Healthcare Systems

Blockchain and Machine Learning for e-Healthcare Systems by Balamurugan Balusamy
English | PDF | 2020 | 481 Pages | ISBN : 1839531142 | 22.5 MB

Blockchain and machine learning technologies can mitigate healthcare issues such as slow access to medical data, poor system interoperability, lack of patient agency, and data quality and quantity for medical research. Blockchain technology facilitates and secures the storage of information in such a way that doctors can see a patient's entire medical history, but researchers see only statistical data instead of any personal information. Machine learning can make use of this data to notice patterns and give accurate predictions, providing more support for the patients and also in research related fields where there is a need for accurate data to predict credible results.

Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 2019

Posted By: AvaxGenius
Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 2019

Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 2019 by James J. Park
English | PDF | 2021 | 583 Pages | ISBN : 9811593426 | 24.9 MB

This book presents the combined proceedings of the 11th International Conference on Computer Science and its Applications (CSA 2019) and the 14th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2019), both held in Macau, China, December 18–20, 2019.

Stream Ciphers

Posted By: AvaxGenius
Stream Ciphers

Stream Ciphers by Andreas Klein
English | PDF | 2013 | 399 Pages | ISBN : 1447150783 | 3.9 MB

In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of wireless internet and mobile phones.

Data Privacy Management, Cryptocurrencies and Blockchain Technology

Posted By: AvaxGenius
Data Privacy Management, Cryptocurrencies and Blockchain Technology

Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers by Joaquin Garcia-Alfaro
English | PDF | 2020 | 463 Pages | ISBN : 3030661717 | 21.3 MB

This book constitutes the revised selected post conference proceedings of the 15th International Workshop on Data Privacy Management, DPM 2020, and the 4th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2020, held in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020, held in Guildford, UK in September 2020.

Trends in Computational Intelligence, Security and Internet of Things

Posted By: AvaxGenius
Trends in Computational Intelligence, Security and Internet of Things

Trends in Computational Intelligence, Security and Internet of Things: Third International Conference, ICCISIoT 2020, Tripura, India, December 29-30, 2020, Proceedings by Nirmalya Kar
English | PDF | 2020 | 339 Pages | ISBN : 3030667626 | 52.4 MB

This volume constitutes the refereed proceedings of the Third International Conference on Computational Intelligence, Security and Internet of Things, ICCISIoT 2020, held in Agartala, India, in December 2020. Due to the COVID-19 pandemic the conference was held online.

Computer Security

Posted By: AvaxGenius
Computer Security

Computer Security: ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers by Ioana Boureanu
English | PDF | 2020 | 349 Pages | ISBN : 3030665038 | 18.8 MB

This book constitutes the refereed post-conference proceedings of the Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy, DETIPS 2020; the First International Workshop on Dependability and Safety of Emerging Cloud and Fog Systems, DeSECSys 2020; Third International Workshop on Multimedia Privacy and Security, MPS 2020; and the Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2020; held in Guildford, UK, in September 2020, in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020.

Information and Cyber Security

Posted By: AvaxGenius
Information and Cyber Security

Information and Cyber Security: 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25–26, 2020, Revised Selected Papers by Hein Venter
English | PDF | 2020 | 174 Pages | ISBN : 3030660389 | 11.4 MB

This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information Security, ISSA 2020, which was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic.

Theory of Cryptography

Posted By: AvaxGenius
Theory of Cryptography

Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part I by Rafael Pass
English | PDF | 2020 | 722 Pages | ISBN : 3030643743 | 13.7 MB

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.

Feistel Ciphers: Security Proofs and Cryptanalysis

Posted By: AvaxGenius
Feistel Ciphers: Security Proofs and Cryptanalysis

Feistel Ciphers: Security Proofs and Cryptanalysis by Valerie Nachef
English | EPUB | 2017 | 310 Pages | ISBN : 3319495283 | 3.65 MB

This book provides a comprehensive survey of different kinds of Feistel ciphers, including their definition and mathematical/computational properties. Feistel Networks form the base design of the Data Encryption Standard algorithm, a former US NIST standard block cipher, originally released in 1977, and the framework used by several other symmetric ciphers ever since. The results consolidated in this volume provide an overview of this important cipher design to researchers and practitioners willing to understand the design and security analysis of Feistel ciphers.

Progress in Cryptology – INDOCRYPT 2020

Posted By: AvaxGenius
Progress in Cryptology – INDOCRYPT 2020

Progress in Cryptology – INDOCRYPT 2020: 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings by Karthikeyan Bhargavan
English | PDF | 2020 | 912 Pages | ISBN : 3030652769 | 32.1 MB

This book constitutes the refereed proceedings of the 21st International Conference on Cryptology in India, INDOCRYPT 2020, held in Bangalore, India, in December 2020.

Unimagined Futures – ICT Opportunities and Challenges

Posted By: AvaxGenius
Unimagined Futures – ICT Opportunities and Challenges

Unimagined Futures – ICT Opportunities and Challenges by Leon Strous
English | PDF | 2020 | 252 Pages | ISBN : 3030642453 | 10.6 MB

This Festschrift, Unimagined Futures – ICT Opportunities and Challenges, examines key challenges facing the ICT community today. While addressing the contemporary challenges, the book provides the opportunity to look back to help understand the contemporary scene and identify appropriate future responses to them.

Emerging Technologies for Authorization and Authentication

Posted By: AvaxGenius
Emerging Technologies for Authorization and Authentication

Emerging Technologies for Authorization and Authentication: Third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020, Proceedings by Andrea Saracino
English | PDF | 2020 | 176 Pages | ISBN : 3030644545 | 10.25 MB

This book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020.

Research in Mathematics and Public Policy

Posted By: AvaxGenius
Research in Mathematics and Public Policy

Research in Mathematics and Public Policy by Mary Lee
English | PDF,EPUB | 2020 | 133 Pages | ISBN : 3030587479 | 15.1 MB

This volume features a variety of research projects at the intersection of mathematics and public policy. The topics included here fall in the areas of cybersecurity and climate change, two broad and impactful issues that benefit greatly from mathematical techniques. Each chapter in the book is a mathematical look into a specific research question related to one of these issues, an approach that offers the reader insight into the application of mathematics to important public policy questions.

Testing Software and Systems

Posted By: AvaxGenius
Testing Software and Systems

Testing Software and Systems: 32nd IFIP WG 6.1 International Conference, ICTSS 2020, Naples, Italy, December 9–11, 2020, Proceedings by Valentina Casola
English | PDF | 2020 | 321 Pages | ISBN : 303064880X | 20.7 MB

This book constitutes the refereed proceedings of the 32nd IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2020, which was supposed to be held in Naples, Italy, in December 2020, but was held virtually due to the COVID-19 pandemic.