|
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This compendium focuses on self-contained presentations of various
developments in mathematical analysis, cryptography and information
science.The volume features both original research and survey
papers contributed by experts from the international community. The
book has a strong interdisciplinary flavor and features the most
recent developments in the topics treated.This useful reference
text benefits professionals, researchers, academics and graduate
students.
Cryptography is concerned with the construction of schemes that
withstand any abuse. A cryptographic scheme is constructed so as to
maintain a desired functionality, even under malicious attempts
aimed at making it deviate from its prescribed behavior. The design
of cryptographic systems must be based on firm foundations, whereas
ad hoc approaches and heuristics are a very dangerous way to go.
These foundations were developed mostly in the 1980s, in works that
are all co-authored by Shafi Goldwasser and/or Silvio Micali. These
works have transformed cryptography from an engineering discipline,
lacking sound theoretical foundations, into a scientific field
possessing a well-founded theory, which influences practice as well
as contributes to other areas of theoretical computer science. This
book celebrates these works, which were the basis for bestowing the
2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A
significant portion of this book reproduces some of these works,
and another portion consists of scientific perspectives by some of
their former students. The highlight of the book is provided by a
few chapters that allow the readers to meet Shafi and Silvio in
person. These include interviews with them, their biographies and
their Turing Award lectures.
The rapid advancements in telecommunications, computing hardware
and software, and data encryption, and the widespread use of
electronic data processing and electronic business conducted
through the Internet have led to a strong increase in information
security threats. The latest advances in information security have
increased practical deployments and scalability across a wide range
of applications to better secure and protect our information
systems and the information stored, processed and transmitted. This
book outlines key emerging trends in information security from the
foundations and technologies in biometrics, cybersecurity, and big
data security to applications in hardware and embedded systems
security, computer forensics, the Internet of Things security, and
network security. Information Security: Foundations, technologies
and applications is a comprehensive review of cutting-edge
algorithms, technologies, and applications, and provides new
insights into a range of fundamentally important topics in the
field. This up-to-date body of knowledge is essential reading for
researchers and advanced students in information security, and for
professionals in sectors where information security is required.
 |
TLS Mastery
(Hardcover)
Michael W Lucas
|
R893
R812
Discovery Miles 8 120
Save R81 (9%)
|
Ships in 18 - 22 working days
|
|
|
A fascinating work on the history and development of cryptography,
from the Egyptians to WWII. Many of the earliest books,
particularly those dating back to the 1900s and before, are now
extremely scarce and increasingly expensive. Hesperides Press are
republishing these classic works in affordable, high quality,
modern editions, using the original text and artwork Contents
Include The Beginings of Cryptography From the Middle Ages Onwards
Signals, Signs, And Secret Languages Commercial Codes Military
Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering
Bibliography
It was formidable, and it was deadly. The nazi Enigma cipher
machine, or rather the code that came from it would also have
remained indeterminable had an operator not made a very simple
error. In this collection of several dozen papers on the machine
and its implications in a variety of disciplines, ranging from
history to memoir and even foreign r
This is the unique book on cross-fertilisations between stream
ciphers and number theory. It systematically and comprehensively
covers known connections between the two areas that are available
only in research papers. Some parts of this book consist of new
research results that are not available elsewhere. In addition to
exercises, over thirty research problems are presented in this
book. In this revised edition almost every chapter was updated, and
some chapters were completely rewritten. It is useful as a textbook
for a graduate course on the subject, as well as a reference book
for researchers in related fields.
.Unique book on interactions of stream ciphers and number theory.
.Research monograph with many results not available elsewhere.
.A revised edition with the most recent advances in this subject.
.Over thirty research problems for stimulating interactions between
the two areas.
.Written by leading researchers in stream ciphers and number
theory.
This book tells the story of radical transparency in a datafied
world. It is a story that not only includes the beginnings of
WikiLeaks and its endings as a weapon of the GRU, but also exposes
numerous other decentralised disclosure networks designed to crack
open democracy - for good or ill - that followed in its wake. This
is a story that can only be understood through rethinking how
technologies of government, practices of media, and assumptions of
democracy interact. By combining literatures of governmentality,
media studies, and democracy, this illuminating account offers
novel insights and critiques of the transparency ideal through its
material-political practice. Case studies uncover evolving media
practices that, regardless of being scraped from public records or
leaked from internal sources, still divulge secrets. The narrative
also traces new corporate players such as Clearview AI, the
civic-minded ICIJ, and state-based public health disclosures in
times of pandemic to reveal how they all form unique
proto-institutional instances of disclosure as a technology of
government. The analysis of novel forms of digital radical
transparency - from a trickle of paper-based leaks to the modern
digital .torrent - is grounded in analogues from the analogue past,
which combine to tell the whole story of how transparency functions
in and helps form democracy.
This book comprehensively covers the important efforts in improving
the quality of images in visual cryptography (VC), with a focus on
cases with gray scale images. It not only covers schemes in
traditional VC and extended VC for binary secret images, but also
the latest development in the analysis-by-synthesis approach. This
book distinguishes itself from the existing literature in three
ways. First, it not only reviews traditional VC for binary secret
images, but also covers recent efforts in improving visual quality
for gray scale secret images. Second, not only traditional quality
measures are reviewed, but also measures that were not used for
measuring perceptual quality of decrypted secret images, such as
Radially Averaged Power Spectrum Density (RAPSD) and residual
variance, are employed for evaluating and guiding the design of VC
algorithms. Third, unlike most VC books following a mathematical
formal style, this book tries to make a balance between engineering
intuition and mathematical reasoning. All the targeted problems and
corresponding solutions are fully motivated by practical
applications and evaluated by experimental tests, while important
security issues are presented as mathematical proof. Furthermore,
important algorithms are summarized as pseudocodes, thus enabling
the readers to reproduce the results in the book. Therefore, this
book serves as a tutorial for readers with an engineering
background as well as for experts in related areas to understand
the basics and research frontiers in visual cryptography.
This monograph aims to provide a well-rounded and detailed account
of designs using linear codes. Most chapters of this monograph
cover on the designs of linear codes. A few chapters deal with
designs obtained from linear codes in other ways. Connections among
ovals, hyperovals, maximal arcs, ovoids, linear codes and designs
are also investigated. This book consists of both classical results
on designs from linear codes and recent results yet published by
others.This monograph is intended to be a reference for
postgraduates and researchers who work on combinatorics, or coding
theory, or digital communications, or finite geometry.
A large number of enciphered documents survived from early modern
Hungary. This area was a particularly fertile territory where
cryptographic methods proliferated, because a large portion of the
population was living in the frontier zone, and participated (or
was forced to participate) in the network of the information flow.
A quantitative analysis of sixteenth-century to seventeenth-century
Hungarian ciphers (300 cipher keys and 1,600 partly or entirely
enciphered letters) reveals that besides the dominance of
diplomatic use of cryptography, there were many examples of
YprivateOE applications too. This book reconstructs the main
reasons and goals why historical actors chose to use ciphers in a
diplomatic letter, a military order, a diary or a private letter,
what they decided to encrypt, and how they perceived the dangers
threatening their messages.
Cryptographic Boolean Functions and Applications, Second Edition is
designed to be a comprehensive reference for the use of Boolean
functions in modern cryptography. While the vast majority of
research on cryptographic Boolean functions has been achieved since
the 1970s, when cryptography began to be widely used in everyday
transactions, in particular banking, relevant material is scattered
over hundreds of journal articles, conference proceedings, books,
reports and notes, some of them only available online. This book
follows the previous edition in sifting through this compendium and
gathering the most significant information in one concise reference
book. The work therefore encompasses over 600 citations, covering
every aspect of the applications of cryptographic Boolean
functions. Since 2008, the subject has seen a very large number of
new results, and in response, the authors have prepared a new
chapter on special functions. The new edition brings 100 completely
new references and an expansion of 50 new pages, along with heavy
revision throughout the text.
This book presents covert, semi-covert and overt techniques for
communication over printed media by modifying images, texts or
barcodes within the document. Basic and advanced techniques are
discussed aimed to modulate information into images, texts and
barcodes. Conveying information over printed media can be useful
for content authentication, author copyright, information and
piracy product deterrent, side information for marketing, among
other applications. Practical issues are discussed and experiments
are provided to evaluate competitive approaches for hard-copy
communication. This book is a useful resource for researchers,
practitioners and graduate students in the field of hard-copy
communication by providing the fundamentals, basic and advanced
techniques as examples of approaches to address the hard-copy media
distortions and particularities.
|
|