Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 14689 dokumen yang sesuai dengan query
cover
"This book constitutes the refereed proceedings of the 18th EUNICE 2012 conference on information and communication technologies, held in Budapest, in August 2012. The 23 oral papers demostrated together with 15 poster presentations were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on radio communications, security, management, protocols and performance, algorithms, models, and simulations."
Heidelberg: Springer, 2012
e20409478
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012.
The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security."
Berlin: Springer-Verlag, 2012
e20408423
eBooks  Universitas Indonesia Library
cover
Ramin Sadre, editor
"This book constitutes the refereed proceedings of the 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, held in Luxembourg in June 2012. The 10 full papers presented were carefully reviewed and selected from 23 submissions. They cover autonomic and distributed management, network security, network monitoring, and special environments and Internet of Things. In addition, this book contains 9 workshop papers which were selected from 18 submissions. They deal with high-speed networks and network management, intrusion detection, and network monitoring and security."
Heidelberg: [, Springer], 2012
e20409186
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections, cross-domain applications, aspects of modeling and validation, trust,security, privacy, and safety, mobile applications, data processing and management, retrieval and complex query processing, e-commerce, and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2012."
Heidelberg: Springer-Verlag, 2012
e20410057
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation."
Berlin: Springer-Verlag, 2012
e20408456
eBooks  Universitas Indonesia Library
cover
Vasil Khachidze, editor
"This book constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin, China, in August 2012. The 65 revised full papers presented were carefully reviewed and selected from 231 submissions. The papers feature contemporary research on developments in the fields of e-business technology, information management systems, and business strategy. Topics addressed are latest development on e-business technology, computer science and software engineering for e-business, e-business and e-commerce applications, social networking and social engineering for e-business, e-business strategic management and economics development, e-business education, entrepreneurship and e-learning, digital economy strategy, as well as internet and e-commerce policy."
Berlin : Springer-Verlag, 2012
e20408411
eBooks  Universitas Indonesia Library
cover
cover
"This book constitutes the refereed proceedings of the International Conference Eco-friendly Computing and Communication Systems, ICECCS 2012, held in Kochi, Kerala, India, in August 2012. The 50 revised full papers presented were carefully reviewed and selected from 133 submissions. The papers are organized in topical sections on energy efficient software system and applications, wireless communication systems, green energy technologies, image and signal processing, bioinformatics and emerging technologies, secure and reliable systems, mathematical modeling and scientific computing, pervasive computing and applications."
Berlin: Springer-Verlag, 2012
e20410116
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 6th International Conference on Convergence and Hybrid Information Technology, ICHIT 2012, held in Daejeon, Korea, in August 2012. The 102 revised full papers presented were carefully reviewed and selected from 196 submissions. The papers are organized in topical sections on communications and networking, soft computing and intelligent systems, medical information and bioinformatics, security and safety systems, HCI and data mining, software and hardware engineering, image processing and pattern recognition, robotics and RFID technologies, convergence in information technology, and workshop on advanced smart convergence (IWASC)."
Berlin: Springer-Verlag, 2012
e20409490
eBooks  Universitas Indonesia Library
cover
"This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest ar, physical layer security, multiparty computations, codes, lattices and cryptography, authentication codes, randomness extraction, cryptography from noisy channels, wiretap channels, bounded-storage models, information-theoretic reductions, quantum cryptography, quantum information theory, nonlocality and nonsignaling, key and message rates, secret sharing, physical models and assumptions, network coding security, adversarial channel models, information-theoretic tools in computational settings, implementation challenges, and biometric security."
Berlin: Springer-Verlag , 2012
e20410080
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>