Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 10181 dokumen yang sesuai dengan query
cover
"This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012.
The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids."
Berlin : Springer-Verlag, 2012
e20410429
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 6th International Joint Conference on Automated Reasoning, IJCAR 2012, held in Manchester, UK, in June 2012. IJCAR 2012 is a merger of leading events in automated reasoning, namely CADE (International Conference on Automated Deduction), FroCoS (International Symposium on Frontiers of Combining Systems), FTP (International Workshop on First-Order Theorem Proving), and TABLEAUX (International Conference on Automated Reasoning with Analytic Tableaux and Related Methods). The 32 revised full research papers and 9 system descriptions presented together with 3 invited talks were carefully reviewed and selected from 116 submissions. The papers address all aspects of automated reasoning, including foundations, implementations, and applications."
Berlin: Springer-Verlag, 2012
e20410445
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012.
The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices."
Berlin: Springer-Verlag, 2012
e20407817
eBooks  Universitas Indonesia Library
cover
Igor Kotenko, editor
"This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security."
Berlin: [;Springer-Verlag , Springer-Verlag ], 2012
e20408550
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 11th International Conference on Entertainment Computing, ICEC 2012, held in Bremen, Germany, in September 2012. The 21 full papers, 13 short papers, 16 posters, 8 demos, 4 workshops, 1 tutorial and 3 doctoral consortium submissions presented were carefully reviewed and selected from 115 submissions. The papers are organized in topical sections on story telling, serious games (learning and training), self and identity, interactive performance, mixed reality and 3D worlds; serious games (health and social), player experience, tools and methods, user interface, demonstrations, industry demonstration, harnessing collective intelligence with games, game development and model-driven software development, mobile gaming, mobile life–interweaving the virtual and the real, exploring the challenges of ethics, privacy and trust in serious gaming, and open source software for entertainment."
Berlin: Springer-Verlag, 2012
e20409283
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 3rd International Conference on Serious Games Development and Applications, SGDA 2012, held in Bremen, Germany in September 2012. The 22 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover various topics on serious games including engineering, education, health care, military applications, game design, game study, game theories, virtual reality, 3D visualisation and medical applications of games technology.
"
Berlin: Springer-Verlag, 2012
e20407872
eBooks  Universitas Indonesia Library
cover
He, Jiang, editor
"This volume constitutes the thoroughly refereed conference proceedings of the 25th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2012, held in Dalian, China, in June 2012. The total of 82 papers selected for the proceedings were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on machine learning methods, cyber-physical system for intelligent transportation applications, AI applications, evolutionary algorithms, combinatorial optimization, modeling and support of cognitive and affective human processes, natural language processing and its applications, social network and its applications, mission-critical applications and case studies of intelligent systems, AI methods, sentiment analysis for asian languages, aspects on cognitive computing and intelligent interaction, spatio-temporal datamining, structured learning and their applications; decision making and knowledge based systems, pattern recognition, agent based systems, decision making techniques and innovative knowledge management, and machine learning applications."
Berlin: Springer-Verlag, 2012
e20406301
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption, special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes."
Heidelberg: Springer, 2012
e20410303
eBooks  Universitas Indonesia Library
cover
"The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices, signature schemes, encryption schemes, efficient two-party and multi-party computation, security in the UC framework, cryptanalysis; efficient constructions, and protocols and combiners."
Berlin: Springer-Verlag, 2012
e20409399
eBooks  Universitas Indonesia Library
cover
Angelos D. Keromytis, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27–March 1, 2012. The 29 revised full papers presented were carefully selected and reviewed from 88 submissions. The papers cover all aspects of securing transactions and systems, including information assurance in the context of finance and commerce."
Berlin: [;Springer-Verlag, Springer-Verlag], 2012
e20410043
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>