Listing 1 - 6 of 6 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11–13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
Data protection. --- Image processing—Digital techniques. --- Computer vision. --- Computer networks. --- Application software. --- Computer networks—Security measures. --- Cryptography. --- Data encryption (Computer science). --- Data and Information Security. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Computer Communication Networks. --- Computer and Information Systems Applications. --- Mobile and Network Security. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing
Choose an application
This two-volume book is a collection of 349 peer-reviewed papers that present research results in the broad areas of engineering design and optimization; including those that are directly related to the design and optimization of engineered products, and those that are related to the design and optimization of engineering processes where the latter are essential to the manufacturing process. The list of relevant topics includes: Engineering Design Theory and Methodology, Product Design and Development, Simulation and Engineering Optimization, Manufacturing Systems Modeling and Optimization, and Machining and Materials Processing Technology--- P. [vii] [Preface].
Engineering design --- Manufacturing processes --- Engineering --- Mathematical optimization --- Mathematical models --- Optimization
Choose an application
Programming --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- computervisie --- DIP (documentimage processing) --- veiligheid (technologie) --- beeldverwerking --- cryptografie --- applicatiebeheer --- apps --- grafische vormgeving --- informatica --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- mobiele communicatie --- netwerk management
Choose an application
Choose an application
Choose an application
Listing 1 - 6 of 6 |
Sort by
|