61
The CISO's Next Frontier : AI, Post-Quantum Cryptography and Advanced Security Paradigms [E-Book] /
Table of Contents: ...Are you ready for Quantum computing? -- The need for post-quantum cryptography -- Quantum Encryption is not a Paradox -- AI Code of Ethics for Cybersecurity -- The Case of AI/ML in Cybersecurity -- Security for Work-From-Home Technologies -- Secure video...

Full text 
62
Human-Computer Interaction - INTERACT 2021 [E-Book] : 18th IFIP TC 13 International Conference, Bari, Italy, August 30 - September 3, 2021, Proceedings, Part IV /
Table of Contents: ...Lattice-Based Cryptography A trace map attack against special ring-LWE samples -- Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem -- System Security KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory...

Full text 
63
Smart Intelligent Computing and Communication Technology [E-Book]
Table of Contents: ...-Nearest Neighbor and Decision Tree Algorithm -- Implementation of IoT in Workplace Monitoring and Safety Systems -- IoT Based Smart Energy Meter System Using Machine Learning -- Personalized CAPTCHA Using Cognitive Cryptography -- Enhancement of Routing...

Full text 
64
Intelligent Computing and Networking [E-Book] : Proceedings of IC-ICN 2020 /
65
Applied Cryptography and Network Security Workshops [E-Book] : ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings /
66
Computational Science and Its Applications - ICCSA 2021 [E-Book] : 21st International Conference, Cagliari, Italy, September 13-16, 2021, Proceedings, Part IX /
67
Computer Security - ESORICS 2021 [E-Book] : 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I /
68
Information Security of Intelligent Vehicles Communication [E-Book] : Overview, Perspectives, Challenges, and Possible Solutions /
69
Intelligent Manufacturing and Energy Sustainability [E-Book] : Proceedings of ICIMES 2019 /
Table of Contents: ... -- Accelerating The Classifier Training Using Various Boosting Schemes Within Cascades Of Boosted Ensembles (Cobes) -- Service Layer Security Architecture For Iot Using Biometric Authentication And Cryptography Technique....

Full text 
70
Privacy and Identity Management. Data for Better Living: AI and Privacy [E-Book] : 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers /
Table of Contents: ... Management: State of the Art, Challenges and Perspectives -- SoK: Cryptography for Neural Networks -- Workshop on Privacy Challenges in Public and Private Organizations -- News diversity and recommendation systems: Setting the interdisciplinary scene -- Language...

Full text 
71
Multimedia Communications, Services and Security [E-Book] : 10th International Conference, MCSS 2020, Kraków, Poland, October 8-9, 2020, Proceedings /
72
Data, Engineering and Applications [E-Book] : Volume 2 /
Table of Contents: ... authentication using Elliptic curve Cryptography -- Log-based Approach for Security Implementation in Cloud CRM's -- Performance Analysis of Scheduling Algorithms in Apache Hadoop -- Energy Aware Prediction Based Load Balancing Approach with VM Migration for the Cloud...

Full text 
73
SOFSEM 2016: Theory and Practice of Computer Science [E-Book] : 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings /
Table of Contents: ...Foundations of Computer Science -- Cryptography in a Quantum World -- Relating Sublinear Space Computability among Graph Connectivity and Related Problems -- Learning Automatic Families of Languages -- Software Engineering: Methods, Tools, Applications...

Full text 
74
Computing and Combinatorics [E-Book] : 22nd International Conference, COCOON 2016, Ho Chi Minh City, Vietnam, August 2-4, 2016, Proceedings /
Table of Contents: ...Game Theory and Algorithms -- Parameterized Complexity and Algorithms -- Database and Data Structures -- Computational Complexity -- Approximation Algorithms -- Cryptography -- Network and Algorithms -- Graph Theory and Algorithms.-Computational Geometry...

Full text 
75
Parallel Problem Solving from Nature – PPSN XIV [E-Book] : 14th International Conference, Edinburgh, UK, September 17-21, 2016, Proceedings /
76
Intelligent Virtual Agents [E-Book] : 16th International Conference, IVA 2016, Los Angeles, CA, USA, September 20–23, 2016, Proceedings /
Table of Contents: ...Attribute/Role-based Cryptography -- Data in Cloud -- Searchable Encryption -- Key Management -- Encryption -- Leakage Analysis -- Homomorphic Encryption. ....

Full text 
77
Advances in Information and Computer Security [E-Book] : 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings /
Table of Contents: ...System security -- Searchable encryption -- Cryptanalysis -- Permutation and symmetric encryption -- Privacy preserving -- Hardware security -- Post-quantum cryptography -- Paring computation....

Full text 
78
Mathematical Aspects of Computer and Information Sciences [E-Book] : 6th International Conference, MACIS 2015, Berlin, Germany, November 11-13, 2015, Revised Selected Papers /
79
Genetic Programming [E-Book] : 18th European Conference, EuroGP 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings /
80
Information Security [E-Book] : 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings /