Vi bøger
Levering: 1 - 2 hverdage

Bøger af Feng Bao

Filter
Filter
Sorter efterSorter Populære
  • - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009, Revised Selected Papers
    af Feng Bao
    587,95 kr.

    The5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information SecurityandbytheChineseAssociationforCryptologicResearchincooperation with the International Association for Cryptologic Research (IACR). The c- ference was held in Beijing, China, in the middle of December, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. The conference is a leading annual international event in the area of cryptog- phy and information security taking place in China. The scienti?c program of the conference covered all areas of current research in the ?eld, with sessions on central areas of cryptographic research and on many important areas of - formation security. The conference continues to get the support of the entire international community, re?ecting on the fact that the research areas covered byInscryptareimportantto moderncomputing, whereincreasedsecurity, trust, safety and reliability are required. The international Program Committee of Inscrypt 2009 received a total of 147 submissions from more than 20 countries and regions, from which only 32 submissions were selected for presentation, 22 of which in the regular papers track and 10 submissions in the short papers track. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, te- nical remarks and strict selection criteria the papers were chosen for the various tracks. The selection to both tracks was a highly competitive proces

  • - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings
    af Feng Bao
    587,95 kr.

    This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.

  • - 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004
    af Feng Bao
    454,95 kr.

  • af Moti Yung, Markus Jakobsson & Jianying Zhou
    454,95 - 880,95 kr.

  • - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings
    af Robert H. Deng
    454,95 kr.

    The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.

  • af Petra Perner, Jianying Zhou & Dieter Gollmann
    454,95 kr.

  • af Ping Chen, Sihan Qing, Chris J. Mitchell, mfl.
    1.119,95 kr.

  • af Gildas Avoine, Pieter Hartel, Gérard Cohen, mfl.
    587,95 kr.

  • af Mark D. Ryan, Guilin Wang & Ben Smyth
    454,95 - 583,95 kr.

  • af Chaoping Xing, San Ling, Huaxiong Wang, mfl.
    573,95 kr.

  • af Robert H. Deng, Javier Lopez, Jianying Zhou & mfl.
    592,95 kr.

    This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought together individuals from academia and - dustry involvedin manyresearchdisciplines of information security to foster the exchange of ideas. During recent years this conference has tried to place special emphasis on the practical aspects of information security, and since it passed from being an international workshop to being an international conference in 2001, it has become one of the most relevant forums at which researchers meet and discuss emerging security challenges and solutions. Advised by the ISC Steering Committee, and in order to provide students with more opportunities for publication, ISC 2005 accepted extra student papers - sides the regular papers. The initiative was very well accepted by the young sector of the scienti?c community, and we hope that the success of this idea will remainfornextISCevents. AnotherimportantfactorforthesuccessofISC2005 was that selected papers in the proceedings will be invited for submission to a special issue of the InternationalJournalof InformationSecurity. The result was an incredible response to the call for papers; we received 271 submissions, the highest since ISC events started. It goes without saying that the paper selection process was more competitive and di?cult than ever before - only 33 regular papers were accepted, plus 5 student papers for a special student session.

  • af Feng Bao
    492,95 kr.

    In this book, we introduce different types of biological data missing scenarios and propose machine learning models to improve the data analysis, including deep recurrent neural network recovery for feature missings, robust information theoretic learning for label missings and structure-aware rebalancing for minor sample missings.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.