Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 11260 dokumen yang sesuai dengan query
cover
"This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals, cryptanalysis, message authentication codes and hash functions, public key cryptography, digital signatures, identity-based and attribute-based cryptography, lattice-based cryptography, and lightweight cryptography."
Berlin: Springer, 2012
e20406454
eBooks  Universitas Indonesia Library
cover
cover
"This book constitutes the refereed proceedings of the 11th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2012 held in Belgrade, Serbia, July 9-11, 2012. The 36 revised full papers presented were carefully reviewed and selected from 76 submissions. The accepted papers cover a wide spectrum of traditional networking topics ranging from routing to the application layer, to localization in various networking environments such as wireless sensor and ad-hoc networks, and give insights in a variety of application areas."
Berlin: Springer, 2012
e20406327
eBooks  Universitas Indonesia Library
cover
Michail Salampasis, editor
"This book constitutes the proceedings of the 5th International Information Retrieval Facility Conference, IRFC 2012, held in Vienna, Austria, July 2-3, 2012. The 12 papers presented were carefully reviewed and selected from 17 high-quality submissions. IRF conferences wish to bring young researchers into contact with industry at an early stage. This fifth conference aimed to tackle four complementary research areas, information retrieval, machine translations for search solutions, and interactive information access. The papers are organized into topical sections on patent search, web search, applications, and query formulation and analysis."
Berlin : [, Springer-Verlag], 2012
e20410423
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation."
Berlin: Springer-Verlag, 2012
e20408456
eBooks  Universitas Indonesia Library
cover
Mark D. Ryan, editor
"This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012. The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential attacks, oblivious transfer, internet security, key management, applied cryptography, pins, fundamentals, fault attacks, and key recovery."
Berlin: [Springer-Verlag, ], 2012
e20409871
eBooks  Universitas Indonesia Library
cover
"This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest ar, physical layer security, multiparty computations, codes, lattices and cryptography, authentication codes, randomness extraction, cryptography from noisy channels, wiretap channels, bounded-storage models, information-theoretic reductions, quantum cryptography, quantum information theory, nonlocality and nonsignaling, key and message rates, secret sharing, physical models and assumptions, network coding security, adversarial channel models, information-theoretic tools in computational settings, implementation challenges, and biometric security."
Berlin: Springer-Verlag , 2012
e20410080
eBooks  Universitas Indonesia Library
cover
"The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation."
Berlin: Springer-Verlag, 2012
e20409976
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the International Conference Eco-friendly Computing and Communication Systems, ICECCS 2012, held in Kochi, Kerala, India, in August 2012. The 50 revised full papers presented were carefully reviewed and selected from 133 submissions. The papers are organized in topical sections on energy efficient software system and applications, wireless communication systems, green energy technologies, image and signal processing, bioinformatics and emerging technologies, secure and reliable systems, mathematical modeling and scientific computing, pervasive computing and applications."
Berlin: Springer-Verlag, 2012
e20410116
eBooks  Universitas Indonesia Library
cover
Nora Cuppens-Boulahia, editor
"This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012. The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing."
Heidelberg: [Springer, ], 2012
e20410416
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>