Welcome to our book review site www.go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

New Frontiers in Artificial Intelligence
  • Language: en
  • Pages: 412

New Frontiers in Artificial Intelligence

This book constitutes the proceedings of the 17th JSAI International Symposia on Artificial Intelligence (JSAI-isAI 2025), held in Osaka, Japan, during May 26–27, 2025. The 27 full papers included in this book were carefully reviewed and selected from 82 submissions. The papers covered a wide range of topics, including AI & law, juris-informatics, natural language processing for scientific documents, Information retrieval for scientific documents, business Informatics, agent-based modeling, AI & security, AI & privacy.

Smart Micro-Grid Systems Security and Privacy
  • Language: en
  • Pages: 174

Smart Micro-Grid Systems Security and Privacy

  • Type: Book
  • -
  • Published: 2018-08-27
  • -
  • Publisher: Springer

This book is centered on Smart grids and micro-grids, as a cost-effective method of ensuring fair and equitable access to power in urban areas. It also considers scenarios where deploying smart grids can be both cost-prohibitively expensive and logistically challenging. Deploying smart microgrids instead, offers a reliable power solution but, as is the case in smart grids, a key issue is guaranteeing usability, trust, and reliability while protecting against energy theft. This book considers aspects such as state estimation, capacity planning, demand forecasting, price signals, and demand management with respect to energy theft. Straight-forward approaches to provoking energy theft on smart ...

Information Security Practice and Experience
  • Language: en
  • Pages: 618

Information Security Practice and Experience

  • Type: Book
  • -
  • Published: 2018-09-17
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.

Innovative Security Solutions for Information Technology and Communications
  • Language: en
  • Pages: 351

Innovative Security Solutions for Information Technology and Communications

This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8–9, 2022. The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.

Information Security and Privacy
  • Language: en
  • Pages: 410

Information Security and Privacy

This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.

Public-Key Cryptography – PKC 2025
  • Language: en
  • Pages: 424

Public-Key Cryptography – PKC 2025

The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025. The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.

Advances in Information and Computer Security
  • Language: en
  • Pages: 330

Advances in Information and Computer Security

  • Type: Book
  • -
  • Published: 2013-11-11
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in Okinawa, Japan, in November 2013. The 20 revised selected papers presented in this volume were carefully reviewed and selected from 63 submissions. They are organized in topical sections named: software and system security, cryptanalysis, privacy and cloud computing, public key cryptosystems, and security protocols.

Advances in Information and Computer Security
  • Language: en
  • Pages: 357

Advances in Information and Computer Security

  • Type: Book
  • -
  • Published: 2015-08-20
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable security; LWE-based encryption; privacy-preserving and anonymity; secure protocol; systems security; and security in hardware.

Progress in Cryptology - INDOCRYPT 2012
  • Language: en
  • Pages: 577

Progress in Cryptology - INDOCRYPT 2012

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Crypto and AI
  • Language: en
  • Pages: 229

Crypto and AI

This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the individual ecosystems of cryptography and AI to show the omnipresence of each technology in the ecosystem of the other one. Next, they show how these technologies have come together in collaborative or adversarial ways. In the next section, the authors highlight the coevolution being formed between cryptography and AI. Throughout the book, the authors use evidence from state-of-the-art research to look ahead at the future of the crypto-AI dichotomy. The authors explain how they anticipate that quantum computing will join the dichotomy in near future, augmenting it to a trichotomy. They verify this through two case studies highlighting another scenario wherein crypto, AI and quantum converge. The authors study current trends in chaotic image encryption as well as information-theoretic cryptography and show how these trends lean towards quantum-inspired artificial intelligence (QiAI). After concluding the discussions, the authors suggest future research for interested researchers.