Browse Results

Showing 1,576 through 1,600 of 53,274 results

Advances in Cryptology -- CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings (Lecture Notes in Computer Science #7417)

by Reihaneh Safavi-Naini Ran Canetti

This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functional encryption, proofs systems, protocols, hash functions, composable security, privacy, leakage and side-channels, signatures, implementation analysis, black-box separation, cryptanalysis, quantum cryptography, and key encapsulation and one-way functions.

Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I (Lecture Notes in Computer Science #9215)

by Rosario Gennaro Matthew Robshaw

The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations; multiparty computation; zero-knowledge; theory; signatures; non-signaling and information-theoretic crypto; attribute-based encryption; new primitives; and fully homomorphic/functional encryption.

Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III (Lecture Notes in Computer Science #9816)

by Matthew Robshaw Jonathan Katz

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I (Lecture Notes in Computer Science #9814)

by Matthew Robshaw Jonathan Katz

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Advances in Cryptology - EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (Lecture Notes in Computer Science #9666)

by Marc Fischlin Jean-Sébastien Coron

The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowled≥ pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leaka≥ in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.

Advances in Culturally-Aware Intelligent Systems and in Cross-Cultural Psychological Studies (Intelligent Systems Reference Library #134)

by Colette Faucher

This book offers valuable new insights into the design of culturally-aware systems. In its first part, it is devoted to presenting selected Culturally-Aware Intelligent Systems devised in the field of Artificial Intelligence and its second part consists of two sub-parts that offer a source of inspiration for building modelizations of Culture and of its influence on the human mind and behavior, to be used in new Culturally-Aware Intelligent Systems. Those sub-parts present the results of experiments conducted in two fields that study Culture and its influence on the human mind's functions: Cultural Neuroscience and Cross-Cultural Psychology. In this era of globalization, people from different countries and cultures have the opportunity to interact directly or indirectly in a wide variety of contexts. Despite differences in their ways of thinking and reasoning, their behaviors, their values, lifestyles, customs and habits, languages, religions - in a word, their cultures - they must be able to collaborate on projects, to understand each other's views, to communicate in such a way that they don't offend each other, to anticipate the effects of their actions on others, and so on. As such, it is of primary importance to understand how culture affects people's mental activities, such as perception, interpretation, reasoning, emotion and behavior, in order to anticipate possible misunderstandings due to differences in handling the same situation, and to try and resolve them. Artificial Intelligence, and more specifically, the field of Intelligent Systems design, aims at building systems that mimic the behavior of human beings in order to complete tasks more efficiently than humans could by themselves. Consequently, in the last decade, experts and scholars in the field of Intelligent Systems have been increasingly tackling the notion of cultural awareness. A Culturally-Aware Intelligent System can be defined as a system where Culture-related or, more generally, socio-cultural information is modeled and used to design the human-machine interface, or to provide support with the task carried out by the system, be it reasoning, simulation or any other task involving cultural knowledge.

Advances in Cyber Security: Third International Conference, ACeS 2021, Penang, Malaysia, August 24–25, 2021, Revised Selected Papers (Communications in Computer and Information Science #1487)

by Nibras Abdullah Selvakumar Manickam Mohammed Anbar

This book presents refereed proceedings of the Third International Conference on Advances in Cyber Security, ACeS 2021, held in Penang, Malaysia, in August 2021. The 36 full papers were carefully reviewed and selected from 92 submissions. The papers are organized in the following topical sections: Internet of Things, Industry 4.0 and Blockchain, and Cryptology; Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention; Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication; Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News.

Advances in Cyber Security: First International Conference, ACeS 2019, Penang, Malaysia, July 30 – August 1, 2019, Revised Selected Papers (Communications in Computer and Information Science #1132)

by Mohammed Anbar Nibras Abdullah Selvakumar Manickam

This book presents refereed proceedings of the First International Conference on Advances in Cyber Security, ACeS 2019, held in Penang, Malaysia, in July-August 2019.The 25 full papers and 1 short paper were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on internet of things, industry and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and DDoS and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication.

Advances in Cyber Security: Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers (Communications in Computer and Information Science #1347)

by Mohammed Anbar Nibras Abdullah Selvakumar Manickam

This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 46 full papers and 1 short paper were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on internet of things, industry 4.0 and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication; governance, social media, mobile and web, data privacy, data policy and fake news.

Advances in Cyber Security: Technology, Operations, and Experiences

by D. Frank Hsu Dorothy Marinucci

As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. The world’s foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation. The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats and exploitations. Advances in Cyber Security collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem. Readers are given a first-hand look at critical intelligence on cybercrime and security—including details of real-life operations. The vast, useful knowledge and experience shared in this essential new volume enables cyber citizens and cyber professionals alike to conceive novel ideas and construct feasible and practical solutions for defending against all kinds of adversaries and attacks. Among the many important topics covered in this collection are building a secure cyberspace ecosystem; public–private partnership to secure cyberspace; operation and law enforcement to protect our cyber citizens and to safeguard our cyber infrastructure; and strategy and policy issues to secure and sustain our cyber ecosystem.

Advances in Cyber Security: Principles, Techniques, and Applications

by Kuan-Ching Li Xiaofeng Chen Willy Susilo

This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes. Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.

Advances in Cyber Security Analytics and Decision Systems (EAI/Springer Innovations in Communication and Computing)

by Shishir K. Shandilya Neal Wagner Atulya K. Nagar

This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.

Advances in Cyber Security and Intelligent Analytics

by Abhishek Verma Jitendra Kumar Hari Mohan Gaur Vrijendra Singh Valentina Emilia Balas

We live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include cloud computing, fog computing, and edge computing, which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cyber security. We have witnessed the development of various networking models—IoT, SDN, and ICN—to support modern systems requirements. However, they are undergoing rapid changes and need special attention. The main issue faced by these paradigms is that traditional solutions cannot be directly applied to address the challenges. Therefore, there is a significant need to develop improved network management and cyber security solutions. To this end, this book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. More specifically, it presents a detailed study on security issues in distributed computing environments and their possible solutions, followed by applications of medical IoT, deep learning, IoV, healthcare, etc.

Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies (Lecture Notes in Electrical Engineering #643)

by Vinit Kumar Gunjan Sabrina Senatore Amit Kumar Xiao-Zhi Gao Suresh Merugu

This book highlights recent advances in Cybernetics, Machine Learning and Cognitive Science applied to Communications Engineering and Technologies, and presents high-quality research conducted by experts in this area. It provides a valuable reference guide for students, researchers and industry practitioners who want to keep abreast of the latest developments in this dynamic, exciting and interesting research field of communication engineering, driven by next-generation IT-enabled techniques. The book will also benefit practitioners whose work involves the development of communication systems using advanced cybernetics, data processing, swarm intelligence and cyber-physical systems; applied mathematicians; and developers of embedded and real-time systems. Moreover, it shares insights into applying concepts from Machine Learning, Cognitive Science, Cybernetics and other areas of artificial intelligence to wireless and mobile systems, control systems and biomedical engineering.

Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies (Engineering Cyber-Physical Systems and Critical Infrastructures #4)

by Ahmed A. Abd El-Latif Yassine Maleh Wojciech Mazurczyk Mohammed ELAffendi Mohamed I. Alkanhal

This book gathers the proceedings of the International conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies, held on May 10–11, 2022, in Riyadh, Saudi Arabia. The conference organized by the College of Computer Science of Prince Sultan University, Saudi Arabia. This book provides an opportunity to account for state-of-the-art works, future trends impacting cybersecurity, cybercrimes, and smart emerging technologies, that concern to organizations and individuals, thus creating new research opportunities, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well as practitioners. CCSET 2022 was devoted to advances in cybersecurity, cybercime, and smart emerging technologies. It was considered a meeting point for researchers and practitioners to implement advanced information technologies into various industries. There were 89 paper submissions from 25 countries. Each submission was reviewed by at least three chairs or PC members and 26 regular papers (30%) were accepted. Unfortunately, due to limitations of conference topics and edited volumes, the Program Committee was forced to reject some interesting papers, which did not satisfy these topics or publisher requirements.

Advances in Cybersecurity Management

by Kevin Daimi Cathryn Peoples

This book concentrates on a wide range of advances related to IT cybersecurity management. The topics covered in this book include, among others, management techniques in security, IT risk management, the impact of technologies and techniques on security management, regulatory techniques and issues, surveillance technologies, security policies, security for protocol management, location management, GOS management, resource management, channel management, and mobility management. The authors also discuss digital contents copyright protection, system security management, network security management, security management in network equipment, storage area networks (SAN) management, information security management, government security policy, web penetration testing, security operations, and vulnerabilities management. The authors introduce the concepts, techniques, methods, approaches and trends needed by cybersecurity management specialists and educators for keeping current their cybersecurity management knowledge. Further, they provide a glimpse of future directions where cybersecurity management techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity management experts in the listed fields and edited by prominent cybersecurity management researchers and specialists.

Advances in Data Analysis with Computational Intelligence Methods: Dedicated to Professor Jacek Żurada (Studies in Computational Intelligence #738)

by Janusz Kacprzyk Leszek Rutkowski Adam E Gawęda Gary G. Yen

This book is a tribute to Professor Jacek Żurada, who is best known for his contributions to computational intelligence and knowledge-based neurocomputing. It is dedicated to Professor Jacek Żurada, Full Professor at the Computational Intelligence Laboratory, Department of Electrical and Computer Engineering, J. B. Speed School of Engineering, University of Louisville, Kentucky, USA, as a token of appreciation for his scientific and scholarly achievements, and for his longstanding service to many communities, notably the computational intelligence community, in particular neural networks, machine learning, data analyses and data mining, but also the fuzzy logic and evolutionary computation communities, to name but a few. At the same time, the book recognizes and honors Professor Żurada's dedication and service to many scientific, scholarly and professional societies, especially the IEEE (Institute of Electrical and Electronics Engineers), the world's largest professional technical professional organization dedicated to advancing science and technology in a broad spectrum of areas and fields. The volume is divided into five major parts, the first of which addresses theoretic, algorithmic and implementation problems related to the intelligent use of data in the sense of how to derive practically useful information and knowledge from data. In turn, Part 2 is devoted to various aspects of neural networks and connectionist systems. Part 3 deals with essential tools and techniques for intelligent technologies in systems modeling and Part 4 focuses on intelligent technologies in decision-making, optimization and control, while Part 5 explores the applications of intelligent technologies.

Advances in Data and Information Sciences: Proceedings of ICDIS 2017, Volume 2 (Lecture Notes in Networks and Systems #39)

by Mohan L. Kolhe Munesh C. Trivedi Shailesh Tiwari Vikash Kumar Singh

The book gathers a collection of high-quality peer-reviewed research papers presented at the International Conference on Data and Information Systems (ICDIS 2017), held at Indira Gandhi National Tribal University, India from November 3 to 4, 2017. The book covers all aspects of computational sciences and information security. In chapters written by leading researchers, developers and practitioner from academia and industry, it highlights the latest developments and technical solutions, helping readers from the computer industry capitalize on key advances in next-generation computer and communication technology.

Advances in Data and Information Sciences: Proceedings of ICDIS 2019 (Lecture Notes in Networks and Systems #94)

by Krishn K. Mishra Shailesh Tiwari Munesh C. Trivedi Mohan L. Kolhe

This book gathers a collection of high-quality peer-reviewed research papers presented at the 2nd International Conference on Data and Information Sciences (ICDIS 2019), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on March 29–30, 2019. In chapters written by leading researchers, developers, and practitioner from academia and industry, it covers virtually all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it will show readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.

Advances in Data and Information Sciences: Proceedings of ICDIS 2022 (Lecture Notes in Networks and Systems #522)

by Shailesh Tiwari Munesh C. Trivedi Mohan L. Kolhe Brajesh Kumar Singh

This book gathers a collection of high-quality peer-reviewed research papers presented at the 4th International Conference on Data and Information Sciences (ICDIS 2022), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on May 6 – 7, 2022. The book covers all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it will show readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.

Advances in Data and Information Sciences: Proceedings of ICDIS 2023 (Lecture Notes in Networks and Systems #796)

by Shailesh Tiwari Munesh C. Trivedi Mohan L. Kolhe Brajesh Kumar Singh

This book gathers a collection of high-quality peer-reviewed research papers presented at the 5th International Conference on Data and Information Sciences (ICDIS 2023), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on June 16–17, 2023. The book covers all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it shows readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.

Advances in Data and Information Sciences: Proceedings Of Icdis 2017, Volume 1 (Lecture Notes In Networks And Systems #38)

by Shailesh Tiwari Munesh C. Trivedi Mohan L. Kolhe Vikash Kumar Singh

The book gathers a collection of high-quality peer-reviewed research papers presented at the International Conference on Data and Information Systems (ICDIS 2017), held at Indira Gandhi National Tribal University, India from November 3 to 4, 2017. The book covers all aspects of computational sciences and information security. In chapters written by leading researchers, developers and practitioner from academia and industry, it highlights the latest developments and technical solutions, helping readers from the computer industry capitalize on key advances in next-generation computer and communication technology.

Advances in Data and Information Sciences: Proceedings of ICDIS 2021 (Lecture Notes in Networks and Systems #318)

by Shailesh Tiwari Munesh C. Trivedi Mohan Lal Kolhe K. K. Mishra Brajesh Kumar Singh

This book gathers a collection of high-quality peer-reviewed research papers presented at the 3rd International Conference on Data and Information Sciences (ICDIS 2021), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on May 14 – 15, 2021. In chapters written by leading researchers, developers, and practitioner from academia and industry, it covers virtually all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it will show readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.

Advances in Data Computing, Communication and Security: Proceedings of I3CS2021 (Lecture Notes on Data Engineering and Communications Technologies #106)

by Xavier Fernando Pankaj Verma Chhagan Charan Subramaniam Ganesan

This book is a collection of high-quality peer reviewed contributions from the academicians, researchers, practitioners, and industry professionals, accepted in the International Conference on Advances in Data Computing, Communication and Security (I3CS2021) organized by the Department of Electronics and Communication Engineering in collaboration with the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India during 08-10 Sep 2021. The fast pace of advancing technologies and growing expectations of the next-generation requires that the researchers must continuously reinvent themselves through new investigations and development of the new products. The theme of this conference is devised as "Embracing Innovations" for the next-generation data computing and secure communication system.

Advances in Data-Driven Computing and Intelligent Systems: Selected Papers from ADCIS 2023, Volume 1 (Lecture Notes in Networks and Systems #891)

by Swagatam Das Snehanshu Saha Carlos A. Coello Coello Jagdish C. Bansal

This book is a collection of best-selected research papers presented at the International Conference on Advances in Data-driven Computing and Intelligent Systems (ADCIS 2023) held at BITS Pilani, K K Birla Goa Campus, Goa, India, during September 21–23, 2023. It includes state-of-the-art research work in the cutting-edge technologies in the field of data science and intelligent systems. The book presents data-driven computing; it is a new field of computational analysis which uses provided data to directly produce predictive outcomes. The book is useful for academicians, research scholars, and industry persons.

Refine Search

Showing 1,576 through 1,600 of 53,274 results