Skip to main content
Sign In
Bookshare Kenya: Home
-A +A
  • Language
    • English
    • Swahili
Help

Search Results

Search results: 38
  • Roles, Trust, and Reputation in Social Media Knowledge Markets

    Roles, Trust, and Reputation in Social Media Knowledge Markets

    by Sorin Adam Matei • Elisa Bertino

    Knowledge and expertise, especially of the kind that can shape public opinion, have been traditionally the domain of individuals holding degrees awarded by higher learning institutions or occupying formal positions in notable organizations. Expertise is validated by reputations established in an in... More

    Language: ENG
    Copyright: 2015
  • Homomorphic Encryption and Applications

    Homomorphic Encryption and Applications

    by Elisa Bertino • Xun Yi • Russell Paulet

    This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is pre... More

    Language: ENG
    Copyright: 2014
  • Cloud Computing and Security: Third International Conference, Icccs 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ii (Lecture Notes in Computer Science #10603)

    Cloud Computing and Security: Third International Conference, Icccs 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ii (Lecture Notes in Computer Science #10603)

    by Elisa Bertino • Xingming Sun • Zhaoqing Pan

    This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1... More

    Language: ENG
    Copyright: 2017
  • Cloud Computing and Security: Third International Conference, Icccs 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ii (Lecture Notes in Computer Science #10603)

    Cloud Computing and Security: Third International Conference, Icccs 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ii (Lecture Notes in Computer Science #10603)

    by Elisa Bertino • Xingming Sun • Zhaoqing Pan

    This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1... More

    Language: ENG
    Copyright: 2017
  • Cloud Computing and Security: Third International Conference, Icccs 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ii (Lecture Notes in Computer Science #10603)

    Cloud Computing and Security: Third International Conference, Icccs 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ii (Lecture Notes in Computer Science #10603)

    by Elisa Bertino • Xingming Sun • Zhaoqing Pan

    This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1... More

    Language: ENG
    Copyright: 2017
  • Cloud Computing and Security: Third International Conference, Icccs 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ii (Lecture Notes in Computer Science #10603)

    Cloud Computing and Security: Third International Conference, Icccs 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ii (Lecture Notes in Computer Science #10603)

    by Elisa Bertino • Xingming Sun • Zhaoqing Pan

    This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1... More

    Language: ENG
    Copyright: 2017
  • Cloud Computing and Security: Third International Conference, Icccs 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ii (Lecture Notes in Computer Science #10603)

    Cloud Computing and Security: Third International Conference, Icccs 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ii (Lecture Notes in Computer Science #10603)

    by Elisa Bertino • Xingming Sun • Zhaoqing Pan

    This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1... More

    Language: ENG
    Copyright: 2017
  • Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I (Lecture Notes in Computer Science #11063)

    Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I (Lecture Notes in Computer Science #11063)

    by Elisa Bertino • Xingming Sun • Zhaoqing Pan

    This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1... More

    Language: ENG
    Copyright: 2018
  • Policy-Based Autonomic Data Governance (Lecture Notes in Computer Science #11550)

    Policy-Based Autonomic Data Governance (Lecture Notes in Computer Science #11550)

    by Elisa Bertino • Seraphin Calo • Dinesh Verma

    Advances in artificial intelligence, sensor computing, robotics, and mobile systems are making autonomous systems a reality. At the same time, the influence of edge computing is leading to more distributed architectures incorporating more autonomous elements. The flow of information is critical in s... More

    Language: ENG
    Copyright: 2019
  • Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III (Lecture Notes in Computer Science #11634)

    Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III (Lecture Notes in Computer Science #11634)

    by Elisa Bertino • Xingming Sun • Zhaoqing Pan

    The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing an... More

    Language: ENG
    Copyright: 2019
  • Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I (Lecture Notes in Computer Science #11632)

    Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I (Lecture Notes in Computer Science #11632)

    by Elisa Bertino • Xingming Sun • Zhaoqing Pan

    The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing an... More

    Language: ENG
    Copyright: 2019
  • Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV (Lecture Notes in Computer Science #11635)

    Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV (Lecture Notes in Computer Science #11635)

    by Elisa Bertino • Xingming Sun • Zhaoqing Pan

    The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing an... More

    Language: ENG
    Copyright: 2019
  • Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II (Lecture Notes in Computer Science #11633)

    Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II (Lecture Notes in Computer Science #11633)

    by Elisa Bertino • Xingming Sun • Zhaoqing Pan

    The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing an... More

    Language: ENG
    Copyright: 2019
  • Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12240)

    Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12240)

    by Elisa Bertino • Xingming Sun • Jinwei Wang

    This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Securi... More

    Language: ENG
    Copyright: 2020
  • Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12239)

    Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12239)

    by Elisa Bertino • Xingming Sun • Jinwei Wang

    This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Securi... More

    Language: ENG
    Copyright: 2020
  • Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part III (Communications in Computer and Information Science #1254)

    Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part III (Communications in Computer and Information Science #1254)

    by Elisa Bertino • Xingming Sun • Jinwei Wang

    The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and ... More

    Language: ENG
    Copyright: 2020
  • Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II (Communications in Computer and Information Science #1253)

    Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II (Communications in Computer and Information Science #1253)

    by Elisa Bertino • Xingming Sun • Jinwei Wang

    The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and ... More

    Language: ENG
    Copyright: 2020
  • Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I (Communications in Computer and Information Science #1252)

    Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I (Communications in Computer and Information Science #1252)

    by Elisa Bertino • Xingming Sun • Jinwei Wang

    The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and ... More

    Language: ENG
    Copyright: 2020
  • Cyber Security Meets Machine Learning

    Cyber Security Meets Machine Learning

    by Elisa Bertino • Xiaofeng Chen • Willy Susilo

    Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial inte... More

    Language: ENG
    Copyright: 2021
  • Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part II (Lecture Notes in Computer Science #12973)

    Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part II (Lecture Notes in Computer Science #12973)

    by Elisa Bertino • Haya Shulman • Michael Waidner

    The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021.The 71 full papers presented in this book were carefully reviewed and selected from 351 submissions. They were or... More

    Language: ENG
    Copyright: 2021
  • Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I (Lecture Notes in Computer Science #12972)

    Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I (Lecture Notes in Computer Science #12972)

    by Elisa Bertino • Haya Shulman • Michael Waidner

    The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021. The conference was originally planned to take place in Darmstadt, Germany, but changed to an online event due to... More

    Language: ENG
    Copyright: 2021
  • Transparency in Social Media

    Transparency in Social Media

    by Sorin Adam Matei • Elisa Bertino • Martha G. Russell

    The volume presents, in a synergistic manner, significant theoretical and practical contributions in the area of social media reputation and authorship measurement, visualization, and modeling. The book justifies and proposes contributions to a future agenda for understanding the requirements for m... More

    Language: ENG
    Copyright: 2015
  • Cloud Computing and Security: Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I (Lecture Notes in Computer Science #10039)

    Cloud Computing and Security: Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I (Lecture Notes in Computer Science #10039)

    by Alex Liu • Elisa Bertino • Xingming Sun • Han-Chieh Chao

    This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed a... More

    Language: ENG
    Copyright: 2016
  • Cloud Computing and Security: Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II (Lecture Notes in Computer Science #10040)

    Cloud Computing and Security: Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II (Lecture Notes in Computer Science #10040)

    by Alex Liu • Elisa Bertino • Xingming Sun • Han-Chieh Chao

    This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed a... More

    Language: ENG
    Copyright: 2016
  • Cloud Computing and Security: Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I (Lecture Notes in Computer Science #10602)

    Cloud Computing and Security: Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I (Lecture Notes in Computer Science #10602)

    by Elisa Bertino • Xingming Sun • Han-Chieh Chao • Xingang You

    This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed a... More

    Language: ENG
    Copyright: 2016
Refine Search
Show More Results

Refine Search

Enter a 10 or 13 digit numerical ISBN code
Categories
Clear

Footer

  • About
  • Partners
  • Legal
  • Accessibility
  • Privacy
  • Contact
  • Blog
Bookshare® and Benetech® are registered trademarks of Beneficent Technology, Inc. This website is © Copyright 2002-2023, Beneficent Technology, Inc.