![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.
Books on information theory and coding have proliferated over the last few years, but few succeed in covering the fundamentals without losing students in mathematical abstraction. Even fewer build the essential theoretical framework when presenting algorithms and implementation details of modern coding systems.
Developed from the author's popular text, A Concise Introduction to the Theory of Numbers, this book provides a comprehensive initiation to all the major branches of number theory. Beginning with the rudiments of the subject, the author proceeds to more advanced topics, including elements of cryptography and primality testing, an account of number fields in the classical vein including properties of their units, ideals and ideal classes, aspects of analytic number theory including studies of the Riemann zeta-function, the prime-number theorem and primes in arithmetical progressions, a description of the Hardy-Littlewood and sieve methods from respectively additive and multiplicative number theory and an exposition of the arithmetic of elliptic curves. The book includes many worked examples, exercises and further reading. Its wider coverage and versatility make this book suitable for courses extending from the elementary to beginning graduate studies.
This book collects papers presented at the International Conference on Mathematical Modelling and Computational Intelligence Techniques (ICMMCIT) 2021, held at the Department of Mathematics, The Gandhigram Rural Institute (Deemed to be University), Gandhigram, Tamil Nadu, India, from 10-12 February 2021. Significant contributions from renowned researchers from fields of applied analysis, mathematical modelling and computing techniques have been received for this conference. Chapters emphasize on the research of computational nature focusing on new algorithms, their analysis and numerical results, as well as applications in physical, biological, social, and behavioural sciences. The accepted papers are organized in topical sections as mathematical modelling, image processing, control theory, graphs and networks, and inventory control.
This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.
This book constitutes the refereed post-conference proceedings of the First International Conference on Applied Cryptography in Computer and Communications, AC3 2021, and the First International Workshop on Security for Internet of Things (IoT). The conference was held in May 2021 and due to COVID-19 pandemic virtually.The 15 revised full papers were carefully reviewed and selected from 42 submissions. The papers present are grouped in 4 tracks on blockchain; authentication; secure computation; practical crypto application. They detail technical aspects of applied cryptography, including symmetric cryptography, public-key cryptography, cryptographic protocols, cryptographic implementations, cryptographic standards and practices.
The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11-14, 2022. The conference took place in Kolkata, India.The 31 full papers included in this book were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: symmetric key cryptology;protocols and implementation;cryptanalysis;boolean functions;quantum cryptography and cryptanalysis;post quantum cryptography
This book focuses on one of the major challenges of the newly created scientific domain known as data science: turning data into actionable knowledge in order to exploit increasing data volumes and deal with their inherent complexity. Actionable knowledge has been qualitatively and intensively studied in management, business, and the social sciences but in computer science and engineering, its connection has only recently been established to data mining and its evolution, 'Knowledge Discovery and Data Mining' (KDD). Data mining seeks to extract interesting patterns from data, but, until now, the patterns discovered from data have not always been 'actionable' for decision-makers in Socio-Technical Organizations (STO). With the evolution of the Internet and connectivity, STOs have evolved into Cyber-Physical and Social Systems (CPSS) that are known to describe our world today. In such complex and dynamic environments, the conventional KDD process is insufficient, and additional processes are required to transform complex data into actionable knowledge. Readers are presented with advanced knowledge concepts and the analytics and information fusion (AIF) processes aimed at delivering actionable knowledge. The authors provide an understanding of the concept of 'relation' and its exploitation, relational calculus, as well as the formalization of specific dimensions of knowledge that achieve a semantic growth along the AIF processes. This book serves as an important technical presentation of relational calculus and its application to processing chains in order to generate actionable knowledge. It is ideal for graduate students, researchers, or industry professionals interested in decision science and knowledge engineering.
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing (e.g., computing resources, services, metadata, data sources) across different sites connected through networks has led to an evolution of data- and knowledge management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. This, the 48th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains 8 invited papers dedicated to the memory of Prof. Dr. Roland Wagner. The topics covered include distributed database systems, NewSQL, scalable transaction management, strong consistency, caches, data warehouse, ETL, reinforcement learning, stochastic approximation, multi-agent systems, ontology, model-driven development, organisational modelling, digital government, new institutional economics and data governance.
This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the content in an informative yet beginner-friendly, accompanied with toy examples and comprehensible graphics. In particular, it highlights the recent developments in tool-assisted analysis of ciphers. Furthermore, promising device-dependent attacks, such as fault attack and side channel attacks on symmetric key ciphers, are discussed in detail. One salient feature of this book is to present a detailed analysis of various fault countermeasures. The coverage of our book is quite diverse-it ranges from prerequisite information, latest research contribution as well as future research directions. It caters to students and researchers working in the field of cryptography.
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.
This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear.
This book constitutes the proceedings of the 21st International Conference on Smart Card Research and Advanced Applications, CARDIS 2022, which took place in November 2022. The conference took place in Birmingham, United Kingdom. The 15 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: physical attacks; physical countermeasures; protecting AES; evaluation methodologies; attacking NTRU; next-generation cryptography.
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language. Written for programmers and engineers, Practical Cryptography explains how you can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this book shows you how to build security into your computer applications, networks, and storage. Suitable for undergraduate and postgraduate students in cryptography, network security, and other security-related courses, this book will also help anyone involved in computer and network security who wants to learn the nuts and bolts of practical cryptography.
This book constitutes the refereed proceedings of the 18th China Conference on Machine Translation, CCMT 2022, held in Lhasa, China, during August 6-10, 2022. The 16 full papers were included in this book were carefully reviewed and selected from 73 submissions.
This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13-15, 2022. The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.
This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries.
Data privacy technologies are essential for implementing information systems with privacy by design.Privacy technologies clearly are needed for ensuring that data does not lead to disclosure, but also that statistics or even data-driven machine learning models do not lead to disclosure. For example, can a deep-learning model be attacked to discover that sensitive data has been used for its training? This accessible textbook presents privacy models, computational definitions of privacy, and methods to implement them. Additionally, the book explains and gives plentiful examples of how to implement-among other models-differential privacy, k-anonymity, and secure multiparty computation. Topics and features: Provides integrated presentation of data privacy (including tools from statistical disclosure control, privacy-preserving data mining, and privacy for communications) Discusses privacy requirements and tools for different types of scenarios, including privacy for data, for computations, and for users Offers characterization of privacy models, comparing their differences, advantages, and disadvantages Describes some of the most relevant algorithms to implement privacy models Includes examples of data protection mechanisms This unique textbook/guide contains numerous examples and succinctly and comprehensively gathers the relevant information. As such, it will be eminently suitable for undergraduate and graduate students interested in data privacy, as well as professionals wanting a concise overview. Vicenc Torra is Professor with the Department of Computing Science at Umea University, Umea, Sweden.
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates.The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and post-quantum cryptography.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022. The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field's foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications.
The 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures.
The 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures. |
You may like...
Applications of Advanced Optimization…
Abhinav Goel, Anand Chauhan, …
Hardcover
R4,911
Discovery Miles 49 110
Nonlinear Optimization in Finite…
Hubertus Th. Jongen, P. Jonker, …
Hardcover
R6,104
Discovery Miles 61 040
Computational Intelligence for Network…
Maoguo Gong, Qing Cai, …
Hardcover
R3,397
Discovery Miles 33 970
Convexification and Global Optimization…
Mohit Tawarmalani, Nikolaos V. Sahinidis
Hardcover
R5,249
Discovery Miles 52 490
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders
Paperback
R1,469
Discovery Miles 14 690
|