Browse Results

Showing 32,726 through 32,750 of 54,406 results

Vicnix en la ciudad secreta (Invictor y Acenix #Volumen 2)

by Invictor Acenix

LA AVENTURA MÁS ÉPICA DE INVICTOR Y ACENIX. ¡ÚNETE A VICNIX Y PREPÁRATE PARA LA DIVERSIÓN! INVICTOR y ACENIX tienen una misión importantísima: ¡conseguir diamantes! Sin embargo, su aventura no podía ser tan sencilla... En la mina se esconde algo más que cofres y diamantes, y encuentran... ¡una ciudad secreta! Tienen que avisar a todo el mundo de su gran descubrimiento, pero... ¿cómo van a lograrlo? ¡Es imposible salir de la ciudad! Los cuatro reinos están protegidos por trolls gigantes, dragones salvajes y dinosaurios hambrientos. ¿CONSEGUIRÁN ESCAPAR DE LA CIUDAD SECRETA O SE QUEDARÁN ATRAPADOS PARA TODA LA ETERNIDAD? ¡PREPÁRATE PARA VIVIR LA AVENTURA MÁS ÉPICA CON VICNIX!

Vicnix perdidos en el mar (Invictor y Acenix #Volumen 1)

by Invictor Acenix

LA AVENTURA MÁS ÉPICA DE INVICTOR Y ACENIX. ¡ÚNETE A VICNIX Y PREPÁRATE PARA LA DIVERSIÓN! Invictor y Acenix siempre han querido salvar el mundo para conseguir el título oficial de héroes. Ahora que el agua de todo el planeta está contaminada, ha llegado el momento de demostrar su valía: ¡solo tienen que encontrar el Tridente Poderoso de Poseidón! Parece fácil, ¿no, chavales? Pues no. Lo que empieza como una simple aventura se convertirá en la misión más épica de la historia cuando los dos amigos se pierdan en el mar, con tiburones hambrientos, piratas comilones, gorilas más enfadados que una mona y peces mutantes. ¿Conseguirán llegar hasta el Tridente antes de que sea demasiado tarde? ¡Prepárate para vivir la aventura más épica con VICNIX!

Vicnix transformados en animales (Invictor y Acenix #Volumen 4)

by Invictor Acenix

LA AVENTURA MÁS ÉPICA DE INVICTOR Y ACENIX. ¡ÚNETE A VICNIX Y PREPÁRATE PARA LA DIVERSIÓN! Invictor y Acenix tienen que hacer algo: ¡hay una invasión mundial de sapos! Todo es culpa del Supersapo, y solo hay una manera de enfrentarse a él... ¡tienen que transformarse en animales! Tendrán que evitar ser pescados cuando sean peces y librarse de morir aplastados cuando tengan forma de mosca, y si no vigilan pueden quedarse en forma de animal random... para siempre. ¿CONSEGUIRÁN QUE LA TRANSFORMACIÓN EN ANIMALES NO SEA SU FIN? ¡PREPÁRATE PARA VIVIR LA AVENTURA MÁS ÉPICA CON VICNIX!

Vicnix y el escondite extremo (Invictor y Acenix #Volumen 3)

by Invictor Acenix

LA AVENTURA MÁS ÉPICA DE INVICTOR Y ACENIX.¡ÚNETE A VICNIX Y PREPÁRATE PARA LA DIVERSIÓN! Invictor y Acenix han recibido una invitación para participar en Los Juegos de Metalcrox. Pero, como todo en su vida, no podía tratarse de una competición normal: ¡son los juegos más extremos de la historia! Tendrán que enfrentarse a zombis hambrientos, escapar de cazadores, esconderse de robots peligrosísimos... Pero el premio lo vale: ¡el ganador podrá cumplir el deseo que elija! Suena genial, si no fuera por un pequeño problema: solo puede ganar uno. ¿CONSEGUIRÁN SOBREVIVIR JUNTOS O EL JUEGO LOS DIVIDIRÁ PARA SIEMPRE? ¡PREPÁRATE PARA VIVIR LA AVENTURA MÁS ÉPICA CON VICNIX!

Enterprise Architecture Patterns: Practical Solutions for Recurring IT-Architecture Problems

by Reto Inversini Thierry Perroud

Every enterprise architect faces similar problems when designing and governing the enterprise architecture of a medium to large enterprise. Design patterns are a well-established concept in software engineering, used to define universally applicable solution schemes. By applying this approach to enterprise architectures, recurring problems in the design and implementation of enterprise architectures can be solved over all layers, from the business layer to the application and data layer down to the technology layer. Inversini and Perroud describe patterns at the level of enterprise architecture, which they refer to as Enterprise Architecture Patterns. These patterns are motivated by recurring problems originating from both the business and the underlying application, or from data and technology architectures of an enterprise such as identity and access management or integration needs. The Enterprise Architecture Patterns help in planning the technological and organizational landscape of an enterprise and its information technology, and are easily embedded into frameworks such as TOGAF, Zachman or FEA. This book is aimed at enterprise architects, software architects, project leaders, business consultants and everyone concerned with questions of IT and enterprise architecture and provides them with a comprehensive catalogue of ready-to-use patterns as well as an extensive theoretical framework to define their own new patterns.

Information and Communication Technologies in Tourism 2016

by Alessandro Inversini Roland Schegg

The papers presented in this volume advance thestate-of-the-art research on digital marketing and social media, mobile computingand responsive web design, semantic technologies and recommender systems,augmented and virtual reality, electronic distribution and online travelreviews, MOOC and eLearning, eGovernment and sharing economy. This book coversthe most significant areas contributed by prominent scholars from around theworld and is suitable for both academics and practitioners who are interestedin the latest developments in eTourism.

Model-Based Software Performance Analysis

by Paola Inverardi Vittorio Cortellessa Antinisca Di Marco

Poor performance is one of the main quality-related shortcomings that cause software projects to fail. Thus, the need to address performance concerns early during the software development process is fully acknowledged, and there is a growing interest in the research and software industry communities towards techniques, methods and tools that permit to manage system performance concerns as an integral part of software engineering. Model-based software performance analysis introduces performance concerns in the scope of software modeling, thus allowing the developer to carry on performance analysis throughout the software lifecycle. With this book, Cortellessa, Di Marco and Inverardi provide the cross-knowledge that allows developers to tackle software performance issues from the very early phases of software development. They explain the basic concepts of performance analysis and describe the most representative methodologies used to annotate and transform software models into performance models. To this end, they go all the way from performance primers through software and performance modeling notations to the latest transformation-based methodologies. As a result, their book is a self-contained reference text on software performance engineering, from which different target groups will benefit: professional software engineers and graduate students in software engineering will learn both basic concepts of performance modeling and new methodologies; while performance specialists will find out how to investigate software performance model building.

Clinical and Biomedical Engineering in the Human Nose: A Computational Fluid Dynamics Approach (Biological and Medical Physics, Biomedical Engineering)

by Kiao Inthavong Narinder Singh Eugene Wong Jiyuan Tu

This book explores computational fluid dynamics in the context of the human nose, allowing readers to gain a better understanding of its anatomy and physiology and integrates recent advances in clinical rhinology, otolaryngology and respiratory physiology research. It focuses on advanced research topics, such as virtual surgery, AI-assisted clinical applications and therapy, as well as the latest computational modeling techniques, controversies, challenges and future directions in simulation using CFD software. Presenting perspectives and insights from computational experts and clinical specialists (ENT) combined with technical details of the computational modeling techniques from engineers, this unique reference book will give direction to and inspire future research in this emerging field.

e-Democracy

by David Rios Insua Simon French

Internet is starting to permeate politics much as it has previously revolutionised education, business or the arts. Thus, there is a growing interest in areas of e-government and, more recently, e-democracy. However, most attempts in this field have just envisioned standard political approaches facilitated by technology, like e-voting or e-debating. Alternatively, we could devise a more transforming strategy based on deploying web based group decision support tools and promote their use for public policy decision making. This book delineates how this approach could be implemented. It addresses foundations, basic methodologies, potential implementation and applications, together with a thorough discussion of the many challenging issues. This innovative text will be of interest to students, researchers and practitioners in the fields of e-government, e-democracy and e-participation and research in decision analysis, negotiation analysis and group decision support.

Security Risk Models for Cyber Insurance

by David Rios Insua Caroline Baylon Jose Vila

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude—and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution – based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts – but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

Enhancing Data Systems to Improve the Quality of Cancer Care

by Institute of Medicine

One of the barriers to improving the quality of cancer care in the United States is the inadequacy of data systems. Out-of-date or incomplete information about the performance of doctors, hospitals, health plans, and public agencies makes it hard to gauge the quality of care. Augmenting today's data systems could start to fill the gap.This report examines the strengths and weaknesses of current systems and makes recommendations for enhancing data systems to improve the quality of cancer care. The board's recommendations fall into three key areas: Enhance key elements of the data system infrastructure (i.e., quality-of-care measures, cancer registries and databases, data collection technologies, and analytic capacity). Expand support for analyses of quality of cancer care using existing data systems. Monitor the effectiveness of data systems to promote quality improvement within health systems.

Ensuring the Integrity, Accessibility, and Stewardship of Research Data in the Digital Age

by Institute of Medicine

As digital technologies are expanding the power and reach of research, they are also raising complex issues. These include complications in ensuring the validity of research data; standards that do not keep pace with the high rate of innovation; restrictions on data sharing that reduce the ability of researchers to verify results and build on previous research; and huge increases in the amount of data being generated, creating severe challenges in preserving that data for long-term use. Ensuring the Integrity, Accessibility, and Stewardship of Research Data in the Digital Age examines the consequences of the changes affecting research data with respect to three issues - integrity, accessibility, and stewardship-and finds a need for a new approach to the design and the management of research projects. The report recommends that all researchers receive appropriate training in the management of research data, and calls on researchers to make all research data, methods, and other information underlying results publicly accessible in a timely manner. The book also sees the stewardship of research data as a critical long-term task for the research enterprise and its stakeholders. Individual researchers, research institutions, research sponsors, professional societies, and journals involved in scientific, engineering, and medical research will find this book an essential guide to the principles affecting research data in the digital age.

Protecting Data Privacy in Health Services Research

by Institute of Medicine

The need for quality improvement and for cost saving are driving both individual choices and health system dynamics. The health services research that we need to support informed choices depends on access to data, but at the same time, individual privacy and patient-health care provider confidentiality must be protected.

Destiny: The Exotic Collection, Volume One

by Insight Editions

Discover all of the Exotic weapons from the world of Destiny 2 in this comprehensive visual guide, loaded with stunning artwork!From the Thorn and Hawkmoon hand cannon, to the Outbreak Perfected rifle, Destiny 2 features an incredible arsenal of exotic weaponry. Now, fans of the hit series can experience these weapons like never before, with this definitive guide to the exotic weapons of Destiny 2. Featuring magnificent art from Destiny 2, it is the ultimate book on the most unique weapons in Destiny 2. BEAUTIFUL EXOTIC WEAPON ARTWORK: From the Thorn and Hawkmoon hand cannon, to the Outbreak Perfected rifle, this book features the beautiful art of Destiny 2. The incredible detail of the illustrations featured in this book will give fans an unparalleled experience of the entire Destiny 2 exotic weapon arsenal. OWN THE DEFINITIVE DESTINY 2 EXOTIC WEAPONS GUIDE: This book will be the ultimate word on the exotic weapons of Destiny 2. COMPLETE YOUR DESTINY LIBRARY: Destiny: The Exotic Collection, Volume One stands alongside fan-favorite books such as Destiny: The Official Cookbook and Art of Destiny Volume One and Two.

My Pokémon Baking Book: Delightful Bakes Inspired by the World of Pokémon

by Insight Editions

Bake delicious, colorful treats and create lasting memories in the kitchen with your team with these amazing recipes inspired by the world of Pokémon!Explore confections and desserts representing every region of the incredible Pokémon universe. Featuring favorite treats that celebrate beloved characters from the world of Pokémon, My Pokémon Baking Book is the perfect addition to any Pokémon Trainer's kitchen. Great for fans of all ages! 50+ RECIPES: From quick treats to share with friends to dazzling dessert displays perfect for celebrating a Pokémon League victory, My Pokémon Baking Book includes recipes for every occasion. REGIONAL SPECIALTIES: Explore favorite and unique flavors from every currently known region, including the newly discovered region, Paldea! FAVORITE CHARACTERS: Create cookies, cakes, breads, cupcakes, and more with bakery-fresh recipes inspired by Pikachu and friends! DISHES FOR EVERY SKILL LEVEL: With step-by-step instructions and beautiful photographs, My Pokémon Baking Book will teach you how to make iconic foods that bring the vibrant culinary sweets inspired by the world of Pokémon to life. Whether you&’re baking with other Trainers or your family, these easy-to-follow recipes will make you a baking master in no time! COMPLETE YOUR COLLECTION: Looking for more creative fun? My Pokémon Cookbook is available to take you on another Pokémon culinary adventure, while Pokémon Wisdom: A Journal for Embracing Your Inner Trainer provides creative journaling!

CompTIA Linux+ Certification Guide: A comprehensive guide to achieving LX0-103 and LX0-104 certifications with mock exams

by Philip Inshanally

Master the concepts and techniques that will help you gain the LX0-103 and LX0-104 certifications on your first attempt Key FeaturesGet a clear understanding of how to achieve the Linux+ certificationExplore system architecture, shell scripts, data management, and Linux securityWork through practice and mock tests to pass both LX0-103 and LX0-104 examsBook DescriptionLinux+ certification demonstrates technical competency and provides a broad awareness of Linux operating systems. Professionals who have achieved the Linux+ certification exhibit all-important knowledge of installation, operation, administration, and troubleshooting services.The CompTIA Linux+ Certification Guide is an overview of the certification that gives you insights into the system architecture. You’ll understand how to install and uninstall Linux distributions, followed by working with various package managers. Once you’ve grasped all this, you’ll move on to manipulating files and processes at command-line interface (CLI) and creating, monitoring, killing, restarting, and modifying processes.As you progress, you’ll be equipped to work with display managers and learn how to create, modify, and remove user accounts and groups, as well as understand how to automate tasks. The last set of chapters helps you configure dates and set up local and remote system logging. In addition to this, you’ll explore different internet protocols, along with discovering network configuration, security administration, Shell scripting, and SQL management.By the end of this book, you’ll not only have got to grips with all the modules using practice questions and mock exams, but you’ll also be well prepared to pass the LX0-103 and LX0-104 certification exams.What you will learnUnderstand the Linux system architecture Install, upgrade, and manage Linux system packagesConfigure devices and maintain the Linux filesystemManage the Shell environment, write scripts, and manage dataSet user interfaces and desktops in the Linux operating systemAutomate system admin tasks and manage essential system servicesManage SQL server on Linux and log locally and remotely with rsyslogdAdminister network and local securityWho this book is forThe CompTIA Linux+ Certification Guide is for you if you want to gain the CompTIA Linux+ certificate. This guide is also for system administrators and rookie Linux professionals interested in enhancing their Linux and Shell scripting skills. No prior knowledge of Linux is needed, although some understanding of Shell scripting would be helpful.

New Technology for Inclusive and Sustainable Growth: Perception, Challenges and Opportunities (Smart Innovation, Systems and Technologies #287)

by Elena I. Inshakova Agnessa O. Inshakova

The book offers a multidisciplinary investigation into the economic, technological, environmental, and social impacts of Industry 4.0 technology that ensures inclusive and sustainable growth development of regions and countries. Along with identifying new opportunities that new technology provides for inclusive growth, the book aims to propose theoretical substantiation and develop economic, institutional, organizational, and information mechanisms that aid to reduce and eliminate the potential economic, social, and environmental risks. A broad multidisciplinary approach integrating research capabilities of economic and administrative sciences, artificial intelligence and computer sciences, pedagogy and linguistics, latest findings in the above mentioned scientific areas, as well as empirical evidence and pilot innovative research projects conducted by the contributors, allowed them to draw conclusions and develop recommendations for achieving inclusive growth in industrial and agricultural production, innovation and investment activities, management and environment protection, healthcare and education associated with the use of new technology. The contributors hope that empirical materials, innovative developments, and suggestions inspire scientific research, encourage applied studies, and supplement training programs in economic, administrative, social, and computer sciences at the advanced universities and research institutions, in the post-Soviet territory, in particular.

Competitive Russia: Proceedings of the International Scientific Conference in Memory of Oleg Inshakov (1952-2018) (Lecture Notes in Networks and Systems #110)

by Agnessa O. Inshakova Elena I. Inshakova

This proceedings book presents papers from the 18th International Scientific Conference, held in September 2019 at Volgograd State University (Russia). The research findings are largely based on the theoretical assumptions of Oleg Inshakov, renowned for his pioneering work on the theory of economic genetics and the theory of “development nucleus” for economic systems.The papers focus on the impact of the 4th industrial revolution on economic growth, the concept of ecosystems corresponding to the rapid spread of digital technologies, regulatory and legal aspects of the Russian economy digitalization, the development of digital technologies in EAEU and BRICS foreign trade, and the corresponding law enforcement measures.The book is intended for academics and practitioners, as well as anyone interested in the problems of new industrialization and the digital transformation of the economy of business entities, regions, countries and integration unions, and their legal regulation to enhance competitiveness on a national and global scale

New Technology for Inclusive and Sustainable Growth: Technological Support, Standards and Commercial Turnover (Smart Innovation, Systems and Technologies #288)

by Agnessa O. Inshakova Elena I. Inshakova

This book presents body of knowledge on the economic, social and environmental impacts of the new Industry 4.0 technology use in view of regulating the related risks to ensure inclusive and sustainable growth in the Post-Soviet and selected developing countries while transition to a new technological order. The book brings together collected empirical evidence and pilot innovative research projects run by the author team that illustrate functional abilities, application potential and challenges of Industry 4.0 key enabling technologies (e.g., artificial intelligence, neural networks, blockchain, nanotechnology, etc.) and provides useful applied recommendations on managing the risks of their use in order to achieve economic growth fairly across society in the developed and developing countries. It presents suggestions to improve national legislation and existing economic regulations, which would also ensure boosting scientific research and training highly qualified personnel in computer, economic, administrative, legal and social sciences at the advanced universities and research institutions in the Post-Soviet area.

Smart Technologies for the Digitisation of Industry: Entrepreneurial Environment (Smart Innovation, Systems and Technologies #254)

by Agnessa O. Inshakova Evgenia E. Frolova

This book discusses fusion of technology and body of knowledge through elaboration of theoretical concepts and conceptual frameworks to ensure the economic growth of the Russian Federation by utilizing the huge potential for innovation and entrepreneurship in Russia. The book presents recent research to solve the most challenging problems facing digitalization in the field of entrepreneurship in the country. Some of them need specialized personnel training; the considerable financial resources needed for the maintenance of digital technologies; how to market enterprises and organizations; and financial instruments designed to support industrial development. The proposed results will create the conditions for a systemic approach to tilting towards supporting new ventures through an improved regulatory framework—currently virtually absent in the field of entrepreneurship at the national level. The book defines prospects for investment in renewable energy sources, circulation of energy resources, and energy efficiency improvements to gain positive economic effects from the introduction of new technologies.

Remote Investment Transactions in the Digital Age: Perception, Techniques, Law Regulation (Intelligent Systems Reference Library #250)

by Agnessa Inshakova Denis Matytsin Elena Inshakova

The book contains the results of the best research developments obtained during the implementation of major scientific events organized and carried out with the financial support of the Russian Science Foundation and the President of the Russian Federation.The scientific novelty of the work lies in the fact that for the first time at the level of Russian and international interdisciplinary social and humanitarian sciences, primarily economic and legal, firstly, philosophical concepts and regulatory legal approaches to the regulation of remote investment transactions have been studied; secondly, a set of economic and legal conditions and means of harmonizing and observing the mutual interests of participants in remote investment transactions has been developed and proposed in order to prevent and minimize potential conflicts between the parties; thirdly, the current state and international regulation of investment transactions concluded and executed on Internet platforms was critically assessed; fourthly, a system of guarantees and protection of the rights of participants in remote investment transactions is proposed, including special contractual structures and an economic and legal model for the proper fulfillment of obligations.Measures are substantiated to expand and increase the intensity of the national investment turnover based on the improvement of the current legislation regulating investments through remote digital technologies in the Internet space, which provided a solution to the world scientific problem of great socioeconomic and economic importance. The book is designed for a wide target audience—scientists of different generations, different disciplinary and industry affiliations. Among them are young researchers, as well as scientists who have received recognition from the world scientific community, studying the socioeconomic, managerial, and legal consequences of the emergence and spread of digital technologies in the field of investment. Readers can be all individuals and legal entities interested in the development of digital technologies in the field of investment.

Advances in Information Systems Development: Crossing Boundaries Between Development and Operations in Information Systems (Lecture Notes in Information Systems and Organisation #55)

by Emilio Insfran Fernando González Silvia Abrahão Marta Fernández Chris Barry Michael Lang Henry Linger Christoph Schneider

This volume features a collection of papers on emerging concepts, significant insights, novel approaches and ideas in information systems development (ISD). It examines and investigates up-and-coming trends in ISD in general, emphasizing the continuous collaboration between developers and operators to optimize the software delivery time. The book gathers selected papers from the 29th International Conference on Information Systems Development held at Universitat Politècnica de València, Spain, September 8-10, 2021. The theme of ISD2021 was “Crossing Boundaries between Development and Operations (DevOps) in Information Systems.” The revised and extended papers focus on the influences among information systems, organizational structures, processes and people from its conception to its operation. They examine methodological issues and ways in which the IS designers, developers and operators are transforming organisations and society through information systems.

Code Clone Analysis: Research, Tools, and Practices

by Katsuro Inoue Chanchal K. Roy

This is the first book organized around code clone analysis. To cover the broad studies of code clone analysis, this book selects past research results that are important to the progress of the field and updates them with new results and future directions. The first chapter provides an introduction for readers who are inexperienced in the foundation of code clone analysis, defines clones and related terms, and discusses the classification of clones. The chapters that follow are categorized into three main parts to present 1) major tools for code clone analysis, 2) fundamental topics such as evaluation benchmarks, clone visualization, code clone searches, and code similarities, and 3) applications to actual problems. Each chapter includes a valuable reference list that will help readers to achieve a comprehensive understanding of this diverse field and to catch up with the latest research results. Code clone analysis relies heavily on computer science theories such as pattern matching algorithms, computer language, and software metrics. Consequently, code clone analysis can be applied to a variety of real-world tasks in software development and maintenance such as bug finding and program refactoring. This book will also be useful in designing an effective curriculum that combines theory and application of code clone analysis in university software engineering courses.

Inductive Logic Programming

by Katsumi Inoue Hayato Ohwada Akihiro Yamamoto

This book constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Inductive Logic Programming, ILP 2015, held in Kyoto, Japan, in August 2015. The 14 revised papers presented were carefully reviewed and selected from 44 submissions. The papers focus on topics such as theories, algorithms, representations and languages, systems and applications of ILP, and cover all areas of learning in logic, relational learning, relational data mining, statistical relational learning, multi-relational data mining, relational reinforcement learning, graph mining, connections with other learning paradigms, among others.

Advances in Information and Computer Security: 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings (Lecture Notes in Computer Science #11049)

by Atsuo Inomata Kan Yasuda

This book constitutes the refereed proceedings of the 13th International Workshop on Security, IWSEC 2018, held in Sendai, Japan, in September 2018. The 18 regular papers and 2 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They were organized in topical sections named: Cryptanalysis, Implementation Security, Public-Key Primitives, Security in Practice, Secret Sharing, Symmetric-Key Primitives, and Provable Security.

Refine Search

Showing 32,726 through 32,750 of 54,406 results