You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
As artificial intelligence (AI) continues to drive innovation across industries, the need for specialized cloud computing infrastructure to support AI workloads is critical. Traditional cloud platforms often struggle to meet the high computational demands and storage requirements of AI models, especially as they grow in complexity and scale. Establishing AI-specific cloud computing infrastructure involves designing systems optimized for the needs of AI, such as powerful processing capabilities, massive data storage, and real-time processing. With advancements in hardware like graphics processing units and tensor processing units, along with sophisticated data management solutions, businesses...
Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not matter. Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology and may be more so in the future. Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications is an invaluable resource to discover the blockchain applications for cybersecurity ...
This book discusses recent developments and contemporary research in artificial intelligence, machine learning, cryptography, network security, cyber security and blockchain technology. All contributing authors are eminent academicians, scientists, researchers, and scholars in their respective fields, hailing from around the world. This is the 2nd International Symposium organized jointly by Computer Society of India-Kolkata Chapter, India and NIT Sikkim, India. This book is a useful reference for aspiring researchers to update their knowledge of AI and ML, IoT security, digital watermarking, etc.
This book constitutes the refereed proceedings of the Second Theory of Cryptography Conference, TCC 2005, held in Cambridge, MA, USA in February 2005. The 32 revised full papers presented were carefully reviewed and selected from 84 submissions. The papers are organized in topical sections on hardness amplification and error correction, graphs and groups, simulation and secure computation, security of encryption, steganography and zero knowledge, secure computation, quantum cryptography and universal composability, cryptographic primitives and security, encryption and signatures, and information theoretic cryptography.
The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information Security and Cryptology (KIISC) and was sponsored by the Ministry of Information and Communication of Korea.
This book constitutes the refereed proceedings of the 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, held in Singapore in June 2006. Book presents 33 revised full papers, organized in topical sections on intrusion detection and avoidance, cryptographic applications, DoS attacks and countermeasures, key management, cryptanalysis, security of limited devices, cryptography, authentication and Web security, ad-hoc and sensor network security, cryptographic constructions, and security and privacy.