Listing 1 - 10 of 81 | << page >> |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography. *The conference was held virtually due to the COVID-19 pandemic.
Data structures (Computer science). --- Computer communication systems. --- Data encryption (Computer science). --- Computer security. --- Computers. --- Law and legislation. --- Data Structures and Information Theory. --- Computer Communication Networks. --- Cryptology. --- Systems and Data Security. --- Legal Aspects of Computing. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Protection --- Security measures --- Distributed processing --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting
Choose an application
This book constitutes the refereed proceedings of the 22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022, which was held in October 2022. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers and 10 short papers, presented were carefully reviewed and selected from 91 submissions. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.
Algorithms. --- Computer engineering. --- Computer networks. --- Computer systems. --- Computers, Special purpose. --- Design and Analysis of Algorithms. --- Computer Engineering and Networks. --- Computer System Implementation. --- Special Purpose and Application-Based Systems. --- Computer Communication Networks. --- Computers --- Algorism --- Algebra --- Arithmetic --- Special purpose computers --- ADP systems (Computer systems) --- Computing systems --- Systems, Computer --- Electronic systems --- Cyberinfrastructure --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Information networks --- Telecommunication --- Electronic data processing --- Network computers --- Design and construction --- Foundations --- Distributed processing --- Computer algorithms. --- Algorithms
Choose an application
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.
Online social networks. --- Data encryption --- Big data --- Security measures --- Electronic social networks --- Social networking Web sites --- Virtual communities --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Data sets, Large --- Large data sets --- Data sets --- Computer networks --- Computer communication systems. --- Data encryption (Computer science). --- Computer security. --- Application software. --- Mobile and Network Security. --- Computer Communication Networks. --- Cryptology. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Protection --- Distributed processing
Choose an application
The LNCS 13172 constitute the proceedings of the 13th International Symposium on Cyberspace Safety and Security, CSS 2021, held online, in November 2021. The 9 full papers and 5 short papers presented in this book were carefully reviewed and selected from 35 submissions. The conference focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.
Computer security --- Internet --- Computer security. --- Security measures --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Protection --- Data protection. --- Data mining. --- Computer networks --- Computer networks. --- Cryptography. --- Data encryption (Computer science). --- Application software. --- Data and Information Security. --- Data Mining and Knowledge Discovery. --- Mobile and Network Security. --- Computer Communication Networks. --- Cryptology. --- Computer and Information Systems Applications. --- Security measures. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer network security --- Network security, Computer --- Security of computer networks --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing --- Seguretat informàtica --- Xifratge (Informàtica)
Choose an application
Choose an application
Choose an application
This book constitutes the refereed proceedings of the Second EAI International Conference on Blockchain Technology and Emerging Technologies, BlockTEA 2022, held in Virtual Event, during November 21-22, 2022. The 10 full papers included in this book were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: answer set programming; functional programming; Smart contract, Privacy protection, NFT and Machine learning.
Choose an application
It is our great pleasure to welcome you to ACM ASSS 2021, the First International Symposium on Advanced Security on Software and Systems, in conjunction with ACM AsiaCCS 2021, which will be held virtually in Hong Kong China on June 7, 2021. In this year, our symposium attracted submissions from China, France, Germany, India, Japan and the United States. Each submission was reviewed by at least three Program Committee members based on the significance, novelty, technical quality and relevance in the field. The review process was double-blind. The acceptance rate is 22.2% with two papers were selected as full paper. In addition, three short papers were accepted. As the first edition of ASSS, we believe that this is a good start for its success in future.
Choose an application
Programming --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- veiligheidsdiensten --- datamining --- applicatiebeheer --- apps --- software engineering --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- data acquisition
Choose an application
This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.* The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. *Due to the COVID-19 pandemic the conference was held online. .
Computer security. --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer engineering. --- Computer networks. --- Data protection. --- Computer networks --- Cryptography. --- Data encryption (Computer science). --- Computer Engineering and Networks. --- Data and Information Security. --- Mobile and Network Security. --- Security Services. --- Cryptology. --- Security measures. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer network security --- Network security, Computer --- Security of computer networks --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing --- Design and construction
Listing 1 - 10 of 81 | << page >> |
Sort by
|