This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Gerotechnology, IWoG 2019, held in Cáceres, Spain, in September 2019.;The 24 revised full papers a...
详细信息
ISBN:
(数字)9783030414948
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Gerotechnology, IWoG 2019, held in Cáceres, Spain, in September 2019.;The 24 revised full papers along with 11 short papers presented were carefully reviewed and selected from 77 submissions. The papers are organized in topical sections on smart technologies and algorithms for health; technologies to increase the quality of life of the elderly population;Internet of Things (IoT); solutions for active aging, social integration and self-care; monitoring and management of chronic and non-chronic diseases; health interventions to support caregivers of elderly people; public and other health initiatives.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2025, CT-RSA 2025, held in San Francisco, CA, USA, during April 28–May 1, 2025.The 17 full papers presented in thi...
详细信息
ISBN:
(数字)9783031886614
ISBN:
(纸本)9783031886607
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2025, CT-RSA 2025, held in San Francisco, CA, USA, during April 28–May 1, 2025.
The 17 full papers presented in this volume were carefully reviewed and selected from 49 submissions.
They were organized in topical sections as follows: Cryptanalysis; Public-Key Cryptography; Hardware and Software Implementations; Symmetric-Key Cryptography; Multiparty Computation and Zero-Knowledge; White-box Crypto.
This book constitutes selected papers of the Second International Conference on Advanced Communication Systems and information Security, ACOSIS 2019, held in Marrakesh, Morocco, in November 2019.;The 10 full pape...
详细信息
ISBN:
(数字)9783030611439
ISBN:
(纸本)9783030611422
This book constitutes selected papers of the Second International Conference on Advanced Communication Systems and information Security, ACOSIS 2019, held in Marrakesh, Morocco, in November 2019.;The 10 full papers and 10 short papers were thoroughly reviewed and selected from 94 submissions. The papers are organized accroding to the following topical sections: wireless communications and services; vehicular communications; channel coding; construction of error correcting codes; intrusion detection techniques; wireless and mobile network security; applied cryptography.
These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;***),thisyearincooperationwiththeComputer Science Dep...
详细信息
ISBN:
(数字)9783540320555
ISBN:
(纸本)9783540259107
These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;***),thisyearincooperationwiththeComputer Science Department of the University of Aarhus, Denmark. As General Chair, Ivan Damg? ard was responsible for local organization. TheEurocrypt2005ProgramCommittee(PC)consistedof30internationally renowned experts. Their names and a?liations are listed on pages VII and VIII of these proceedings. By the November 15, 2004 submission deadline the PC had received a total of 190 submissions via the IACR Electronic Submission Server. The subsequent selection process was divided into two phases, as usual. In the review phase each submission was carefully scrutinized by at least three independent reviewers, and the review reports, often extensive, were committed to the IACR Web Review System. These were taken as the starting point for the ***,additionalreportswere provided as needed, and the PC eventually had some 700 reports at its disposal. In addition, the discussions generated more than 850 messages, all posted in the system. During the entire PC phase, which started in August 2003 with my earliest invitations to PC members and which continued until March 2005, more than 1000 email messages were communicated. Moreover, the PC received much appreciated assistance from a large body of external reviewers. Their names are listed on page VIII of these proceedings.
ulti-carrier modulation‚ Orthogonal Frequency Division Multi- Mplexing (OFDM) particularly‚ has been successfully applied to a wide variety of digital communications applications over the past several years. Although ...
详细信息
ISBN:
(数字)9780387225760
ISBN:
(纸本)9780387225753;9781441935502
ulti-carrier modulation‚ Orthogonal Frequency Division Multi- Mplexing (OFDM) particularly‚ has been successfully applied to a wide variety of digital communications applications over the past several years. Although OFDM has been chosen as the physical layer standard for a diversity of important systems‚ the theory‚ algorithms‚ and implementation techniques remain subjects of current interest. This is clear from the high volume of papers appearing in technical journals and conferences. Multi-carrier modulation continues to evolve rapidly. It is hoped that this book will remain a valuable summary of the technology‚ p- viding an understanding of new advances as well as the present core technology. The Intended Audience This book is intended to be a concise summary of the present state of the art of the theory and practice of OFDM technology. The authors believe that the time is ripe for such a treatment. Particularly based on one of the author’s long experience in development of wireless systems (AB), and the other’s in wireline systems (BS)‚ we have - tempted to present a unified presentation of OFDM performance and xviii implementation over a wide variety of channels. It is hoped that this will prove valuable both to developers of such systems and to researchers and graduate students involved in analysis of digital communications.
This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Origin...
详细信息
ISBN:
(数字)9783319234731
ISBN:
(纸本)9783319234724;9783319363844
This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with new content on braille and 2D barcode authentication of visual cryptography shares. Features: contains review exercises at the end of each chapter, as well as a helpful glossary; examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems; reviews a range of VCSs, including XOR-based visual cryptography and security enriched VCS; describes different methods for presenting color content using visual cryptographic techniques; covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS.
暂无评论