Welcome to our book review site www.go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Security and Privacy in Communication Networks
  • Language: en
  • Pages: 511

Security and Privacy in Communication Networks

This book constitutes the thoroughly refereed proceedings of the 6th International ICST Conference, SecureComm 2010, held in Singapore in September 2010. The 28 revised full papers were carefully reviewed and selected from 112 submissions. They are organized in topical sections on malware and email security, anonymity and privacy, wireless security, systems security, network security, and security protocols.

Information Security and Privacy
  • Language: en
  • Pages: 475

Information Security and Privacy

  • Type: Book
  • -
  • Published: 2011-07-01
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

Security and Privacy in New Computing Environments
  • Language: en
  • Pages: 187

Security and Privacy in New Computing Environments

This book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi’an, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security.

Constitutional Development in China, 1982-2012
  • Language: en
  • Pages: 426

Constitutional Development in China, 1982-2012

  • Categories: Law

This volume presents an overview of the evolution of the current Chinese Constitution (1982) and the characteristics of constitutional studies since 1978. Readers are introduced to the basic principles of constitutional system in China and gain insights into the real state of Chinese law, allowing them to form their own opinions. It will also aid commercial communications with Chinese legal professionals as well as enterprises. The book covers a number of topics, including the history of constitutional communication between Chinese constitutionalists and the International Association of Constitutional Law since 1981, the most important academic contributions to international conferences concerning constitutional law by Chinese constitutionalists, the main characteristics of the current Chinese Constitution in the field of constitutional studies in China, the key issues of constitutional practice and implementation in China, the challenges of running the fundamental political system of the People’s Representative Congress and the characteristics of rule of law specific to China.

Advances in Cryptology – ASIACRYPT 2020
  • Language: en
  • Pages: 826

Advances in Cryptology – ASIACRYPT 2020

The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic. The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

Human Activity Analysis in Visual Surveillance and Healthcare
  • Language: en
  • Pages: 162

Human Activity Analysis in Visual Surveillance and Healthcare

An automatic recognition of human activities enables their use in several interesting applications of daily life. This dissertation emphases on the analysis of human activities in a visual surveillance scenario and the classification of physical activities in the therapeutic procedure using visual data. The first part of the dissertation proposes a robust gait representation to recognise the identity of a person using his/her walking style, dealing with its several real world challenges as well as taking into consideration the effects of cross-view recognition. In the second part, a complete framework is proposed to capture and analyse the movement of different body parts in human which is useful in the clinical assessment to detect any movement disorders and the assessment of the desired therapeutic program.

Advances in Cryptology - ASIACRYPT 2013
  • Language: en
  • Pages: 567

Advances in Cryptology - ASIACRYPT 2013

  • Type: Book
  • -
  • Published: 2013-11-23
  • -
  • Publisher: Springer

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Computers and Information Processing Technologies I
  • Language: en
  • Pages: 1220

Computers and Information Processing Technologies I

Selected, peer reviewed papers from the International Conference on Computers and Information Processing Technologies (ICCIPT 2014), April 23-24, 2014, Shanghai, China

China Law Reporter
  • Language: en
  • Pages: 154

China Law Reporter

  • Type: Book
  • -
  • Published: 1999
  • -
  • Publisher: Unknown

None

Security and Privacy in New Computing Environments
  • Language: en
  • Pages: 465

Security and Privacy in New Computing Environments

This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.