SIGMETRICS 2014

SIGMETRICS 2014

Author: Association for Computing Machinery. Special Interest Group on Measurement and Evaluation

Publisher:

Published: 2014

Total Pages: 602

ISBN-13:

DOWNLOAD EBOOK


Financial Cryptography and Data Security

Financial Cryptography and Data Security

Author: Ian Goldberg

Publisher: Springer Nature

Published: 2019-10-11

Total Pages: 708

ISBN-13: 3030321010

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, held in St. Kitts, St. Kitts and Nevis in February 2019.The 32 revised full papers and 7 short papers were carefully selected and reviewed from 179 submissions. The papers are grouped in the following topical sections: Cryptocurrency Cryptanalysis, Measurement, Payment Protocol Security, Multiparty Protocols, Off-Chain Mechanisms, Fraud Detection, Game Theory, IoT Security and much more.


Advances in Computing and Data Sciences

Advances in Computing and Data Sciences

Author: Mayank Singh

Publisher: Springer

Published: 2018-10-25

Total Pages: 597

ISBN-13: 9811318131

DOWNLOAD EBOOK

This two-volume set (CCIS 905 and CCIS 906) constitutes the refereed proceedings of the Second International Conference on Advances in Computing and Data Sciences, ICACDS 2018, held in Dehradun, India, in April 2018. The 110 full papers were carefully reviewed and selected from 598 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations.


Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

Author: Joaquin Garcia-Alfaro

Publisher: Springer Nature

Published: 2021-11-03

Total Pages: 531

ISBN-13: 3030900223

DOWNLOAD EBOOK

This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.


Algorithmic Game Theory

Algorithmic Game Theory

Author: Panagiotis Kanellopoulos

Publisher: Springer Nature

Published: 2022-09-13

Total Pages: 596

ISBN-13: 3031157141

DOWNLOAD EBOOK

This book constitutes the proceedings of the 15th International Symposium on Algorithmic Game Theory, SAGT 2022, which took place in Colchester, UK, in September 2022. The 31 full papers included in this book were carefully reviewed and selected from 83 submissions. They were organized in topical sections as follows: Auctions, markets and mechanism design; computational aspects in games; congestion and network creation games; data sharing and learning; social choice and stable matchings.


Temporal Network Epidemiology

Temporal Network Epidemiology

Author: Naoki Masuda

Publisher: Springer

Published: 2017-10-04

Total Pages: 345

ISBN-13: 9811052875

DOWNLOAD EBOOK

This book covers recent developments in epidemic process models and related data on temporally varying networks. It is widely recognized that contact networks are indispensable for describing, understanding, and intervening to stop the spread of infectious diseases in human and animal populations; “network epidemiology” is an umbrella term to describe this research field. More recently, contact networks have been recognized as being highly dynamic. This observation, also supported by an increasing amount of new data, has led to research on temporal networks, a rapidly growing area. Changes in network structure are often informed by epidemic (or other) dynamics, in which case they are referred to as adaptive networks. This volume gathers contributions by prominent authors working in temporal and adaptive network epidemiology, a field essential to understanding infectious diseases in real society.


Theory of Cryptography

Theory of Cryptography

Author: Martin Hirt

Publisher: Springer

Published: 2016-10-24

Total Pages: 586

ISBN-13: 3662536447

DOWNLOAD EBOOK

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.