Theory of Cryptography

Theory of Cryptography
Author :
Publisher : Springer
Total Pages : 739
Release :
ISBN-10 : 9783030038106
ISBN-13 : 3030038106
Rating : 4/5 (06 Downloads)

Synopsis Theory of Cryptography by : Amos Beimel

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Differential Evolution: From Theory to Practice

Differential Evolution: From Theory to Practice
Author :
Publisher : Springer Nature
Total Pages : 389
Release :
ISBN-10 : 9789811680823
ISBN-13 : 9811680825
Rating : 4/5 (23 Downloads)

Synopsis Differential Evolution: From Theory to Practice by : B. Vinoth Kumar

This book addresses and disseminates state-of-the-art research and development of differential evolution (DE) and its recent advances, such as the development of adaptive, self-adaptive and hybrid techniques. Differential evolution is a population-based meta-heuristic technique for global optimization capable of handling non-differentiable, non-linear and multi-modal objective functions. Many advances have been made recently in differential evolution, from theory to applications. This book comprises contributions which include theoretical developments in DE, performance comparisons of DE, hybrid DE approaches, parallel and distributed DE for multi-objective optimization, software implementations, and real-world applications. The book is useful for researchers, practitioners, and students in disciplines such as optimization, heuristics, operations research and natural computing.

Intelligent Information and Database Systems

Intelligent Information and Database Systems
Author :
Publisher : Springer Nature
Total Pages : 684
Release :
ISBN-10 : 9783030419646
ISBN-13 : 3030419649
Rating : 4/5 (46 Downloads)

Synopsis Intelligent Information and Database Systems by : Ngoc Thanh Nguyen

The two-volume set LNAI 12033 and 11034 constitutes the refereed proceedings of the 12th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2020, held in Phuket, Thailand, in March 2020. The total of 105 full papers accepted for publication in these proceedings were carefully reviewed and selected from 285 submissions. The papers of the first volume are organized in the following topical sections: Knowledge Engineering and Semantic Web, Natural Language Processing, Decision Support and Control Systems, Computer Vision Techniques, Machine Learning and Data Mining, Deep Learning Models, Advanced Data Mining Techniques and Applications, Multiple Model Approach to Machine Learning. The papers of the second volume are divided into these topical sections: Application of Intelligent Methods to Constrained Problems, Automated Reasoning with Applications in Intelligent Systems, Current Trends in Arti cial Intelligence, Optimization, Learning,and Decision-Making in Bioinformatics and Bioengineering, Computer Vision and Intelligent Systems, Data Modelling and Processing for Industry 4.0, Intelligent Applications of Internet of Things and Data AnalysisTechnologies, Intelligent and Contextual Systems, Intelligent Systems and Algorithms in Information Sciences, Intelligent Supply Chains and e-Commerce, Privacy, Security and Trust in Arti cial Intelligence, Interactive Analysis of Image, Video and Motion Data in LifeSciences.

Information Security Practice and Experience

Information Security Practice and Experience
Author :
Publisher : Springer
Total Pages : 618
Release :
ISBN-10 : 9783319998077
ISBN-13 : 3319998072
Rating : 4/5 (77 Downloads)

Synopsis Information Security Practice and Experience by : Chunhua Su

This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.

Topics in Experimental Dynamic Substructuring, Volume 2

Topics in Experimental Dynamic Substructuring, Volume 2
Author :
Publisher : Springer Science & Business Media
Total Pages : 332
Release :
ISBN-10 : 9781461465409
ISBN-13 : 1461465400
Rating : 4/5 (09 Downloads)

Synopsis Topics in Experimental Dynamic Substructuring, Volume 2 by : Randy Mayes

Topics in Experimental Dynamics Substructuring, Volume 2: Proceedings of the 31st IMAC, A Conference and Exposition on Structural Dynamics, 2013, the second volume of seven from the Conference, brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on fundamental and applied aspects of Structural Dynamics, including papers on: Nonlinear Substructures SEM Substructures Wind Turbine Testbed – Blade Modeling & Correlation Substructure Methods SEM Substructures Wind Turbine Testbed Frequency Based Substructures Fixed Base Substructure Methods Substructure Methods SEM Substructures Wind Turbine Testbed Frequency Based Substructures Fixed Base Substructure Methods

Applied Cryptography and Network Security

Applied Cryptography and Network Security
Author :
Publisher : Springer Nature
Total Pages : 487
Release :
ISBN-10 : 9783030783723
ISBN-13 : 3030783723
Rating : 4/5 (23 Downloads)

Synopsis Applied Cryptography and Network Security by : Kazue Sako

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.

Function Spaces and Applications

Function Spaces and Applications
Author :
Publisher : CRC Press
Total Pages : 296
Release :
ISBN-10 : 0849309387
ISBN-13 : 9780849309380
Rating : 4/5 (87 Downloads)

Synopsis Function Spaces and Applications by : David Eric Edmunds

Developed from the proceedings an international conference held in 1997, Function Spaces and Applications presents the work of leading mathematicians in the vital and rapidly growing field of functional analysis.

Advances in Cryptology – ASIACRYPT 2020

Advances in Cryptology – ASIACRYPT 2020
Author :
Publisher : Springer Nature
Total Pages : 818
Release :
ISBN-10 : 9783030648343
ISBN-13 : 3030648346
Rating : 4/5 (43 Downloads)

Synopsis Advances in Cryptology – ASIACRYPT 2020 by : Shiho Moriai

The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic. The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

Advanced Topics in Computational Partial Differential Equations

Advanced Topics in Computational Partial Differential Equations
Author :
Publisher : Springer Science & Business Media
Total Pages : 676
Release :
ISBN-10 : 9783642182372
ISBN-13 : 3642182372
Rating : 4/5 (72 Downloads)

Synopsis Advanced Topics in Computational Partial Differential Equations by : Hans Petter Langtangen

A gentle introduction to advanced topics such as parallel computing, multigrid methods, and special methods for systems of PDEs. The goal of all chapters is to ‘compute’ solutions to problems, hence algorithmic and software issues play a central role. All software examples use the Diffpack programming environment - some experience with Diffpack is required. There are also some chapters covering complete applications, i.e., the way from a model, expressed as systems of PDEs, through to discretization methods, algorithms, software design, verification, and computational examples. Suitable for readers with a background in basic finite element and finite difference methods for partial differential equations.

Functional Programming

Functional Programming
Author :
Publisher : Addison Wesley Publishing Company
Total Pages : 720
Release :
ISBN-10 : UOM:39015012773183
ISBN-13 :
Rating : 4/5 (83 Downloads)

Synopsis Functional Programming by : Anthony J. Field