OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 495 from your keywords: subject="DATA"
First Page Previous 26 27 28 29 30 Next Last Page
cover
Information Security and Cryptology - ICISC 2014: 17th International Conferen…
Comment Share
LEE, JooyoungKIM, Jongsung

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applicati…

Edition
-
ISBN/ISSN
978-3-319-15942-3
Collation
XIII, 448
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Information Security and Cryptology: 10th International Conference, Inscrypt …
Comment Share
YUNG, MotiLIN, DongdaiZHOU, Jianying

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsourc…

Edition
-
ISBN/ISSN
978-3-319-16744-2
Collation
XIII, 547
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Information Security Practice and Experience: 11th International Conference, …
Comment Share
LOPEZ JavierWU, Yongdong

This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015. The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, e…

Edition
-
ISBN/ISSN
978-3-319-17532-4
Collation
XIV, 576
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Information Security Applications: 15th International Workshop, WISA 2014, Je…
Comment Share
RHEE, Kyung-HyuneYI, Jeong Hyun

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections such as malware detection; mobile security; vulnerabilit…

Edition
-
ISBN/ISSN
978-3-319-15086-4
Collation
XIII, 406
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Information Security: 18th International Conference, ISC 2015, Trondheim, Nor…
Comment Share
LOPEZ,JavierMITCHELL, Chris J.

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical section…

Edition
-
ISBN/ISSN
978-3-319-23317-8
Collation
XIII, 570
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Smart Cities in Asia Regulations, Problems, and Development
Comment Share
THANH, PhanDANIELA, Damian

This open access book examines different aspects of smart cities, including technology, urban development, sustainable development, finance, and privacy and data protection. It also covers a wide range of jurisdictions in Asia-Pacific: Hong Kong, Indonesia, Malaysia, Singapore, Thailand, and Vietnam. The book consists of two main parts. The first part includes general chapters that conceptualiz…

Edition
-
ISBN/ISSN
9789811917011
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Cryptology Transmitted Message Protection From Deterministic Chaos up to Opti…
Comment Share
Igor IzmailovBoris PoiznerIlia RomanovSergey M. Smolskiy

This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carr…

Edition
-
ISBN/ISSN
9783319301259
Collation
xxviii, 364 pages
Series Title
-
Call Number
005.1
Availability0
Add to basket
MARC DownloadCite
cover
International Symposium on Mathematics, Quantum Theory, and Cryptography Pro…
Comment Share
TSUYOSHI, TakagiMASATO, WakayamaKEISUKE, TanakaNOBORU, Kunihiro

This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction mod…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
In Memory Data Management and Analysis First and Second International Worksh…
Comment Share
JAGATHEESAN, ArunLEVANDOSKI, JustinNEUMANN, ThomasPAVLO, Andrew

This book constitutes the thoroughly refereed post conference proceedings of the First and Second International Workshops on In Memory Data Management and Analysis held in Riva del Garda, Italy, August 2013 and Hangzhou, China, in September 2014. The 11 revised full papers were carefully reviewed and selected from 18 submissions and cover topics from main-memory graph analytics platforms to mai…

Edition
-
ISBN/ISSN
978-3-319-13959-3
Collation
VIII, 151
Series Title
-
Call Number
004 INM
Availability0
Add to basket
MARC DownloadCite
cover
Transactions on Data Hiding and Multimedia Security X
Comment Share
SHI, Yun Q.

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development …

Edition
-
ISBN/ISSN
978-3-662-46739-8
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 26 27 28 29 30 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?