Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 17135 dokumen yang sesuai dengan query
cover
Mark D. Ryan, editor
"This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012. The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential attacks, oblivious transfer, internet security, key management, applied cryptography, pins, fundamentals, fault attacks, and key recovery."
Berlin: [Springer-Verlag, ], 2012
e20409871
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed post-proceedings of the Joint International Semantic Technology Conference, JIST 2011, held in Hangzhou, China, in December 2011. This conference is a joint event for regional semantic Web related conferences. JIST 2011 brings together the Asian Semantic Web Conference 2011 and the Chinese Semantic Web Conference 2011. The 21 revised full papers presented together with 12 short papers were carefully reviewed and selected from 82 submissions. The papers cover a wide range of topics in disciplines related to semantic technology including applications of the semantic web, management of semantic web data, ontology and reasoning, social semantic web, and user interfaces to the semantic web."
Berlin : Springer-Verlag, 2012
e20410602
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation."
Berlin: Springer-Verlag, 2012
e20408456
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues."
Heidelberg: Springer, 2012
e20408388
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software. The 20 papers, presented together with the abstract of an invited talk and a joint-ETAPS paper, were selected from a total of 67 submissions. Topics covered by the papers include: foundations of security, authentication, confidentiality, privacy and anonymity, authorization and trust, network security, protocols for security, language-based security, and quantitative security properties."
Berlin: Springer-Verlag, 2012
e20410280
eBooks  Universitas Indonesia Library
cover
He, Jiang, editor
"This volume constitutes the thoroughly refereed conference proceedings of the 25th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2012, held in Dalian, China, in June 2012. The total of 82 papers selected for the proceedings were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on machine learning methods, cyber-physical system for intelligent transportation applications, AI applications, evolutionary algorithms, combinatorial optimization, modeling and support of cognitive and affective human processes, natural language processing and its applications, social network and its applications, mission-critical applications and case studies of intelligent systems, AI methods, sentiment analysis for asian languages, aspects on cognitive computing and intelligent interaction, spatio-temporal datamining, structured learning and their applications; decision making and knowledge based systems, pattern recognition, agent based systems, decision making techniques and innovative knowledge management, and machine learning applications."
Berlin: Springer-Verlag, 2012
e20406301
eBooks  Universitas Indonesia Library
cover
Jeff Z. Pan, editor
"This book constitutes the refereed post-proceedings of the Joint International Semantic Technology Conference, JIST 2011, held in Hangzhou, China, in December 2011. This conference is a joint event for regional semantic Web related conferences. JIST 2011 brings together the Asian Semantic Web Conference 2011 and the Chinese Semantic Web Conference 2011. The 21 revised full papers presented together with 12 short papers were carefully reviewed and selected from 82 submissions. The papers cover a wide range of topics in disciplines related to semantic technology including applications of the semantic web, management of semantic web data, ontology and reasoning, social semantic web, and user interfaces to the semantic web."
Berlin : [, Springer-Verlag], 2012
e20410600
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections, cross-domain applications, aspects of modeling and validation, trust,security, privacy, and safety, mobile applications, data processing and management, retrieval and complex query processing, e-commerce, and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2012."
Heidelberg: Springer-Verlag, 2012
e20410057
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control."
Berlin: Springer, 2012
e20407128
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security."
Berlin: Springer-Verlag , 2012
e20409982
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>