0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (50)
  • R500+ (5,321)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming > Algorithms & procedures

Matrix and Tensor Factorization Techniques for Recommender Systems (Paperback, 1st ed. 2016): Panagiotis Symeonidis, Andreas... Matrix and Tensor Factorization Techniques for Recommender Systems (Paperback, 1st ed. 2016)
Panagiotis Symeonidis, Andreas Zioupos
R2,325 Discovery Miles 23 250 Ships in 18 - 22 working days

This book presents the algorithms used to provide recommendations by exploiting matrix factorization and tensor decomposition techniques. It highlights well-known decomposition methods for recommender systems, such as Singular Value Decomposition (SVD), UV-decomposition, Non-negative Matrix Factorization (NMF), etc. and describes in detail the pros and cons of each method for matrices and tensors. This book provides a detailed theoretical mathematical background of matrix/tensor factorization techniques and a step-by-step analysis of each method on the basis of an integrated toy example that runs throughout all its chapters and helps the reader to understand the key differences among methods. It also contains two chapters, where different matrix and tensor methods are compared experimentally on real data sets, such as Epinions, GeoSocialRec, Last.fm, BibSonomy, etc. and provides further insights into the advantages and disadvantages of each method. The book offers a rich blend of theory and practice, making it suitable for students, researchers and practitioners interested in both recommenders and factorization methods. Lecturers can also use it for classes on data mining, recommender systems and dimensionality reduction methods.

Metaheuristic Applications to Speech Enhancement (Paperback, 1st ed. 2016): Prajna Kunche, K. V. V. S. Reddy Metaheuristic Applications to Speech Enhancement (Paperback, 1st ed. 2016)
Prajna Kunche, K. V. V. S. Reddy
R1,709 Discovery Miles 17 090 Ships in 18 - 22 working days

This book serves as a basic reference for those interested in the application of metaheuristics to speech enhancement. The major goal of the book is to explain the basic concepts of optimization methods and their use in heuristic optimization in speech enhancement to scientists, practicing engineers, and academic researchers in speech processing. The authors discuss why it has been a challenging problem for researchers to develop new enhancement algorithms that aid in the quality and intelligibility of degraded speech. They present powerful optimization methods to speech enhancement that can help to solve the noise reduction problems. Readers will be able to understand the fundamentals of speech processing as well as the optimization techniques, how the speech enhancement algorithms are implemented by utilizing optimization methods, and will be given the tools to develop new algorithms. The authors also provide a comprehensive literature survey regarding the topic.

Verifiable Privacy Protection for Vehicular Communication Systems (Paperback, 1st ed. 2017): David Foerster Verifiable Privacy Protection for Vehicular Communication Systems (Paperback, 1st ed. 2017)
David Foerster
R1,734 Discovery Miles 17 340 Ships in 18 - 22 working days

David Foerster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems - motivated by the large number of recent security incidents and revelations about mass surveillance. The author aims for verifiable privacy protection enforced through cryptographic and technical means, which safeguards user data even if back-end systems are not fully trusted. Foerster applies advanced cryptographic concepts, such as anonymous credentials, and introduces a novel decentralized secret sharing algorithm to fulfill complex and seemingly contradicting requirements in several vehicle-to-x application scenarios. Many of the concepts and results can also be applied to other flavors of internet of things systems.

Big Data Technologies and Applications - 7th International Conference, BDTA  2016, Seoul, South Korea, November 17-18, 2016,... Big Data Technologies and Applications - 7th International Conference, BDTA 2016, Seoul, South Korea, November 17-18, 2016, Proceedings (Paperback, 1st ed. 2017)
Jason J. Jung, Pankoo Kim
R1,917 Discovery Miles 19 170 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 7th International Conference on Big data Technologies and Applications, BDTA 2016, held in Seoul, South Korea, in November 2016. BDTA 2016 was collocated with the First International Workshop on Internet of Things, Social Network, and Security in Big Data, ISSB 2016 and the First International Workshop on Digital Humanity with Big Data, DiHuBiDa 2016. The 17 revised full papers were carefully reviewed and selected from 25 submissions and handle theoretical foundations and practical applications which premise the new generation of data analytics and engineering.

Handbook of Finite State Based Models and Applications (Hardcover, New): Jiacun Wang Handbook of Finite State Based Models and Applications (Hardcover, New)
Jiacun Wang
R5,335 Discovery Miles 53 350 Ships in 18 - 22 working days

Applicable to any problem that requires a finite number of solutions, finite state-based models (also called finite state machines or finite state automata) have found wide use in various areas of computer science and engineering. Handbook of Finite State Based Models and Applications provides a complete collection of introductory materials on finite state theories, algorithms, and the latest domain applications. For beginners, the book is a handy reference for quickly looking up model details. For more experienced researchers, it is suitable as a source of in-depth study in this area.

The book first introduces the fundamentals of automata theory, including regular expressions, as well as widely used automata, such as transducers, tree automata, quantum automata, and timed automata. It then presents algorithms for the minimization and incremental construction of finite automata and describes Esterel, an automata-based synchronous programming language for embedded system software development.

Moving on to applications, the book explores regular path queries on graph-structured data, timed automata in model checking security protocols, pattern matching, compiler design, and XML processing. It also covers other finite state-based modeling approaches and applications, including Petri nets, statecharts, temporal logic, and UML state machine diagrams.

Embedded System Technology - 13th National Conference, ESTC 2015, Beijing, China, October 10-11, 2015, Revised Selected Papers... Embedded System Technology - 13th National Conference, ESTC 2015, Beijing, China, October 10-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Xing Zhang, Zhonghai Wu, Xingmian Sha
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th National Conference on Embedded System Technology, ESTC 2015, held in Beijing, China, in October 2015. The 18 revised full papers presented were carefully reviewed and selected from 63 papers. The topics cover a broad range of fields focusing on research about embedded system technologies, such as smart hardware, system and network, applications and algorithm.

Approximation and Online Algorithms - 13th International Workshop, WAOA 2015, Patras, Greece, September 17-18, 2015. Revised... Approximation and Online Algorithms - 13th International Workshop, WAOA 2015, Patras, Greece, September 17-18, 2015. Revised Selected Papers (Paperback, 1st ed. 2015)
Laura Sanita, Martin Skutella
R1,941 Discovery Miles 19 410 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Approximation and Online Algorithms, WAOA 2015, held in Patras, Greece, in September 2015 as part of ALGO 2015. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Topics of interest for WAOA 2015 were: algorithmic game theory, algorithmic trading, coloring and partitioning, competitive analysis, computational advertising, computational finance, cuts and connectivity, geometric problems, graph algorithms, inapproximability, mechanism design, natural algorithms, network design, packing and covering, paradigms for the design and analysis of approximation and online algorithms, parameterized complexity, scheduling problems,and real-world applications.

Software Engineering and Formal Methods - SEFM 2015 Collocated Workshops: ATSE, HOFM, MoKMaSD, and VERY*SCART, York, UK,... Software Engineering and Formal Methods - SEFM 2015 Collocated Workshops: ATSE, HOFM, MoKMaSD, and VERY*SCART, York, UK, September 7-8, 2015. Revised Selected Papers (Paperback, 1st ed. 2015)
Domenico Bianculli, Radu Calinescu, Bernhard Rumpe
R2,301 Discovery Miles 23 010 Ships in 18 - 22 working days

This book constitutes revised selected papers from the workshopscollocated with the SEFM 2015 conference on Software Engineering andFormal Methods, held in York, UK, in September 2015.The 25 papers included in this volume were carefully reviewed and selected from 32 submissions. The satellite workshops provided a highly interactive and collaborative environment for researchers and practitioners from industry and academia to discuss emerging areas of software engineering and formal methods.The four workshops were: ATSE 2015: The 6th Workshop on Automating Test Case Design, Selection and Evaluation; HOFM 2015: The 2nd Human-Oriented Formal Methods Workshop; MoKMaSD 2015: The 4th International Symposium on Modelling and Knowledge Management Applications: Systems and Domains; VERY*SCART 2015: The 1st International Workshop on the Art of Service Composition and Formal Verification for Self-* Systems.

A Polynomial Translation of Mobile Ambients into Safe Petri Nets - Understanding a Calculus of Hierarchical Protection Domains... A Polynomial Translation of Mobile Ambients into Safe Petri Nets - Understanding a Calculus of Hierarchical Protection Domains (Paperback, 1st ed. 2016)
Susanne Goebel
R1,526 Discovery Miles 15 260 Ships in 18 - 22 working days

The master thesis of Susanne Goebel generates the deep understanding of the Mobile Ambient (MA) calculus that is necessary to use it as a modeling language. Instead of calculus terms a much more convenient representation via MA trees naturally maps to the application area of networks where processes pass hierarchical protection domains like firewalls. The work analyses MA's function principles and derives a translation into Safe Petri nets. It extends to arbitrary MA processes but finiteness of the net and therefore decidability of reachability is only guaranteed for bounded processes. The construction is polynomial in process size and bounds so that reachability analysis is only PSPACE-complete.

Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography,... Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Serge Fehr
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

Web and Internet Economics - 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015,... Web and Internet Economics - 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015, Proceedings (Paperback, 1st ed. 2015)
Evangelos Markakis, Guido Schafer
R2,587 Discovery Miles 25 870 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Web and Internet Economics, WINE 2015, held in Amsterdam, The Netherlands, in December 2015. The 30 regular papers presented together with 8 abstracts were carefully reviewed and selected from 142 submissions and cover results on incentives and computation in theoretical computer science, artificial intelligence, and microeconomics.

Programming in HTML and PHP - Coding for Scientists and Engineers (Paperback, 1st ed. 2017): David R. Brooks Programming in HTML and PHP - Coding for Scientists and Engineers (Paperback, 1st ed. 2017)
David R. Brooks
R2,514 Discovery Miles 25 140 Ships in 18 - 22 working days

This concise and accessible textbook will enable readers to quickly develop the working skills necessary to solve computational problems in a server-based environment, using HTML and PHP. The importance of learning by example (as opposed to simply learning by copying) is emphasized through extensive use of hands-on exercises and examples, with a specific focus on useful science and engineering applications. The clearly-written text is designed to be simple to follow for the novice student, without requiring any background in programming or mathematics beyond algebra. Topics and features: describes the creation of HTML pages and the characteristics of HTML documents, showing how to use HTML tables, forms, lists, and frames to organize documents for use with PHP applications; explains how to set up a PHP environment, using a local or remote server; introduces the capabilities and syntax of the PHP language, including coverage of array syntax and use; examines user-defined functions in programming, summarizing PHP functions for reading and writing files, viewing the content of variables, and manipulating strings; reviews the PHP GD graphics library, presenting applications for creating pie charts, bar graphs, and line graphs suitable for displaying scientific data; includes appendices listing HTML and ASCII special characters, and highlighting the essential basic strategies for solving computational problems. Supplying all of the tools necessary to begin coding in HTML and PHP, this invaluable textbook is ideal for undergraduate students taking introductory courses in programming. The book will also serve as a helpful self-study text for professionals in any technical field.

Algorithms and Computation - 26th International Symposium, ISAAC 2015, Nagoya, Japan, December 9-11, 2015, Proceedings... Algorithms and Computation - 26th International Symposium, ISAAC 2015, Nagoya, Japan, December 9-11, 2015, Proceedings (Paperback, 1st ed. 2015)
Khaled Elbassioni, Kazuhisa Makino
R2,567 Discovery Miles 25 670 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 26th International Symposium on Algorithms and Computation, ISAAC 2015, held in Nagoya, Japan, in December 2015. The 65 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 180 submissions for inclusion in the book. The focus of the volume is on the following topics: computational geometry; data structures; combinatorial optimization and approximation algorithms; randomized algorithms; graph algorithms and FPT; computational complexity; graph drawing and planar graphs; online and streaming algorithms; and string and DNA algorithms.

Graph-Theoretic Concepts in Computer Science - 42nd International Workshop, WG 2016, Istanbul, Turkey, June 22-24, 2016,... Graph-Theoretic Concepts in Computer Science - 42nd International Workshop, WG 2016, Istanbul, Turkey, June 22-24, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Pinar Heggernes
R2,206 Discovery Miles 22 060 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 42nd International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2016, held in Istanbul, Turkey, in June 2016. The 25 papers presented in this volume were carefully reviewed and selected from 74 submissions.The WG conferences aim to connect theory and practice by demonstrating how graph-theoretic concepts can be applied to various areas of computer science and by extracting new graph problems from applications. Their goal is to present new research results and to identify and explore directions of future research.

Algorithms on Strings (Paperback): Maxime Crochemore, Christophe Hancart, Thierry Lecroq Algorithms on Strings (Paperback)
Maxime Crochemore, Christophe Hancart, Thierry Lecroq
R1,307 Discovery Miles 13 070 Ships in 10 - 15 working days

The book is intended for lectures on string processes and pattern matching in Master's courses of computer science and software engineering curricula. The details of algorithms are given with correctness proofs and complexity analysis, which make them ready to implement. Algorithms are described in a C-like language. The book is also a reference for students in computational linguistics or computational biology. It presents examples of questions related to the automatic processing of natural language, to the analysis of molecular sequences, and to the management of textual databases.

IT Security Risk Management in the Context of Cloud Computing - Towards an Understanding of the Key Role of Providers' IT... IT Security Risk Management in the Context of Cloud Computing - Towards an Understanding of the Key Role of Providers' IT Security Risk Perceptions (Paperback, 1st ed. 2015)
Andre Loske
R1,788 Discovery Miles 17 880 Ships in 18 - 22 working days

This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many cases, the providers' decision makers significantly underestimate their services' IT security risk exposure, which inhibits the implementation of necessary safeguarding measures. The work also demonstrates that even though the prevalence of IT security risk concerns in Cloud adoption is widely recognized, providers only pay very limited attention to the concerns expressed by customers, which not only causes serious disagreements with the customers but also considerably inhibits the adoption of the services.

Optimization of Stochastic Discrete Systems and Control on Complex Networks - Computational Networks (Paperback, Softcover... Optimization of Stochastic Discrete Systems and Control on Complex Networks - Computational Networks (Paperback, Softcover reprint of the original 1st ed. 2015)
Dmitrii Lozovanu, Stefan Pickl
R2,688 Discovery Miles 26 880 Ships in 18 - 22 working days

This book presents the latest findings on stochastic dynamic programming models and on solving optimal control problems in networks. It includes the authors' new findings on determining the optimal solution of discrete optimal control problems in networks and on solving game variants of Markov decision problems in the context of computational networks. First, the book studies the finite state space of Markov processes and reviews the existing methods and algorithms for determining the main characteristics in Markov chains, before proposing new approaches based on dynamic programming and combinatorial methods. Chapter two is dedicated to infinite horizon stochastic discrete optimal control models and Markov decision problems with average and expected total discounted optimization criteria, while Chapter three develops a special game-theoretical approach to Markov decision processes and stochastic discrete optimal control problems. In closing, the book's final chapter is devoted to finite horizon stochastic control problems and Markov decision processes. The algorithms developed represent a valuable contribution to the important field of computational network theory.

Machine Translation - 12th China Workshop, CWMT 2016, Urumqi, China, August 25-26, 2016, Revised Selected Papers (Paperback,... Machine Translation - 12th China Workshop, CWMT 2016, Urumqi, China, August 25-26, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Muyun Yang, Shujie Liu
R1,730 Discovery Miles 17 300 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th China Workshop on Machine Translation, CWMT 2016, held in Urumqi, China, in August 2016. The 10 English papers presented in this volume were carefully reviewed and selected from 76 submissions. They deal with statistical machine translation, hybrid machine translation, machine translation evaluation, post editing, alignment, and inducing bilingual knowledge from corpora.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIX (Paperback, 1st ed. 2016): Abdelkader Hameurlain, Josef... Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIX (Paperback, 1st ed. 2016)
Abdelkader Hameurlain, Josef Kung, Roland Wagner
R1,741 Discovery Miles 17 410 Ships in 18 - 22 working days

The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments. This, the 29th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains four revised selected regular papers. Topics covered include optimization and cluster validation processes for entity matching, business intelligence systems, and data profiling in the Semantic Web.

Secure Smart Embedded Devices, Platforms and Applications (Paperback, Softcover reprint of the original 1st ed. 2014):... Secure Smart Embedded Devices, Platforms and Applications (Paperback, Softcover reprint of the original 1st ed. 2014)
Konstantinos Markantonakis, Keith Mayes
R7,435 Discovery Miles 74 350 Ships in 18 - 22 working days

New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues. The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.

Applications and Techniques in Information Security - 6th International Conference, ATIS 2015, Beijing, China, November 4-6,... Applications and Techniques in Information Security - 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings (Paperback, 1st ed. 2015)
Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, …
R2,460 Discovery Miles 24 600 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.

Mathematical Modeling of Technological Processes - 8th International Conference, CITech 2015, Almaty, Kazakhstan, September... Mathematical Modeling of Technological Processes - 8th International Conference, CITech 2015, Almaty, Kazakhstan, September 24-27, 2015, Proceedings (Paperback, 1st ed. 2015)
Nargozy Danaev, Yurii Shokin, Akhmed-Zaki Darkhan
R1,389 Discovery Miles 13 890 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Mathematical modeling of technological processes track of the 8th International Conference on Computational and Information Technologies in Science, Engineering and Education, CITech 2015, held in Almaty, Kazakhstan, in September 2015. The 20 papers and one short paper presented were carefully reviewed and selected from 56 submissions to the track. They provide a forum for sharing new aspects of the progresses in the areas of mathematical modeling of technological processes; process automation and control; high performance computing; simulation.

Future Information Technology (Paperback, Softcover reprint of the original 1st ed. 2014): James J (Jong Hyuk) Park, Yi Pan,... Future Information Technology (Paperback, Softcover reprint of the original 1st ed. 2014)
James J (Jong Hyuk) Park, Yi Pan, Cheonshik Kim, Yun Yang
R5,411 Discovery Miles 54 110 Ships in 18 - 22 working days

The new multimedia standards (for example, MPEG-21) facilitate the seamless integration of multiple modalities into interoperable multimedia frameworks, transforming the way people work and interact with multimedia data. These key technologies and multimedia solutions interact and collaborate with each other in increasingly effective ways, contributing to the multimedia revolution and having a significant impact across a wide spectrum of consumer, business, healthcare, education and governmental domains. This book aims to provide a complete coverage of the areas outlined and to bring together the researchers from academic and industry as well as practitioners to share ideas, challenges and solutions relating to the multifaceted aspects of this field.

Harmony Search Algorithm - Proceedings of the 2nd International Conference on Harmony Search Algorithm (ICHSA2015) (Paperback,... Harmony Search Algorithm - Proceedings of the 2nd International Conference on Harmony Search Algorithm (ICHSA2015) (Paperback, 1st ed. 2016)
Joong Hoon Kim, Zong Woo Geem
R6,375 Discovery Miles 63 750 Ships in 18 - 22 working days

The Harmony Search Algorithm (HSA) is one of the most well-known techniques in the field of soft computing, an important paradigm in the science and engineering community. This volume, the proceedings of the 2nd International Conference on Harmony Search Algorithm 2015 (ICHSA 2015), brings together contributions describing the latest developments in the field of soft computing with a special focus on HSA techniques. It includes coverage of new methods that have potentially immense application in various fields. Contributed articles cover aspects of the following topics related to the Harmony Search Algorithm: analytical studies; improved, hybrid and multi-objective variants; parameter tuning; and large-scale applications. The book also contains papers discussing recent advances on the following topics: genetic algorithms; evolutionary strategies; the firefly algorithm and cuckoo search; particle swarm optimization and ant colony optimization; simulated annealing; and local search techniques. This book offers a valuable snapshot of the current status of the Harmony Search Algorithm and related techniques, and will be a useful reference for practising researchers and advanced students in computer science and engineering.

Homomorphic Signature Schemes - A Survey (Paperback, 1st ed. 2016): Giulia Traverso, Denise Demirel, Johannes Buchmann Homomorphic Signature Schemes - A Survey (Paperback, 1st ed. 2016)
Giulia Traverso, Denise Demirel, Johannes Buchmann
R1,561 Discovery Miles 15 610 Ships in 18 - 22 working days

Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive, complete, and up-to-date survey about the state of the art of homomorphic signature schemes. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework. In addition, this work also presents a description of each of the schemes presented so far together with the properties it provides. Furthermore, three use cases, electronic voting, smart grids, and electronic health records, where homomorphic signature schemes can be employed are described. For each of these applications the requirements that a homomorphic signature scheme should fulfill are defined and the suitable schemes already available are listed. This also highlights the shortcomings of current solutions. Thus, this work concludes with several ideas for future research in the direction of homomorphic signature schemes.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Talking About Troubles in Conversation
Gail Jefferson Hardcover R3,179 Discovery Miles 31 790
Linking Discourse Studies to…
Lubie Grujicic-Alatriste Hardcover R3,273 Discovery Miles 32 730
How to Use a Discursive Approach to…
Cynthia Hardy Hardcover R3,009 Discovery Miles 30 090
Texts, Transmissions, Receptions…
Andre Lardinois, Sophie Levie, … Hardcover R5,168 Discovery Miles 51 680
The Language and Imagery of Coma and…
Matthew Colbeck Hardcover R3,987 Discovery Miles 39 870
Beyond Grammaticalization and Discourse…
Salvador Pons Borderia, Oscar Loureda Lamas Hardcover R5,005 Discovery Miles 50 050
First-Year University Writing - A…
L. Aull Hardcover R2,093 R1,841 Discovery Miles 18 410
Black Bodies in the River - Searching…
Davis W Houck Hardcover R2,926 Discovery Miles 29 260
Populist Discourse - International…
Marcia Macaulay Hardcover R2,879 Discovery Miles 28 790
How to Critique Authoritarian Populism…
Jeremiah Morelock Hardcover R7,979 Discovery Miles 79 790

 

Partners