![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.
This book constitutes the refereed proceedings of the 15th International Baltic Conference on Digital Business and Intelligent Systems, Baltic DB&IS 2022, held in Riga, Latvia, in July 2022. The 16 revised full papers and 1 short paper presented were carefully reviewed and selected from 42 submissions. The papers are centered around topics like architectures and quality of information systems, artificial intelligence in information systems, data and knowledge engineering, enterprise and information systems engineering, security of information systems.
This book constitutes the refereed proceedings of the 8th EAI International Conference on Industrial Networks and Intelligent Systems, INISCOM 2022, held in April 2022. Due to COVID-19 pandemic the conference was held virtually. The 19 full papers were selected from 48 submissions and are organized thematically in tracks on Telecommunications Systems and Networks; Information Processing and Data Analysis; Industrial Networks and Intelligent Systems; Security and Privacy.
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.
This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures. This is an open access book.
This book constitutes the revised selected papers of the Third International Conference on Innovations in Digital Economy, SPBU IDE 2021, held in St. Petersburg, Russia, in October 2021. The 23 papers presented were thoroughly reviewed and selected for publication from 153 submissions. The papers are organized according the following topical sections: economic efficiency and social consequences of digital innovations implementation; regional innovation systems and clusters as drivers of the economic growth during the Fourth Industrial Revolution; industrial, service and agricultural digitalization; response of an educational system and labor market to the digital-driven changes in the economic system; digital transformation trends in the government and financial sector.
This two-volume set constitutes the refereed proceedings of the 8th International Conference on Human Aspects of IT for the Aged Population, ITAP 2022, held as part of the 24th International Conference, HCI International 2022, held as a virtual event, during June-July 2022. ITAP 2022 includes a total of 75 papers, which focus on topics related to designing for and with older users, technology acceptance and user experience of older users, use of social media and games by the aging population, as well as applications supporting health, wellbeing, communication, social participation and everyday activities. The papers are divided into the following topical sub-headings. Part I: Aging, Design and Gamification; Mobile, Wearable and Multimodal Interaction for Aging; Aging, Social Media and Digital Literacy; and Technology Acceptance and Adoption: Barriers and Facilitators for Older Adults Part II: Intelligent Environment for Daily Activities Support; Health and Wellbeing Technologies for the Elderly; and Aging, Communication and Social Interaction.
This book constitutes the refereed proceedings of the 11th International Conference on Design, User Experience, and Usability, DUXU 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022.The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The DUXU 2022 proceedings comprise three volumes; they were organized in the following topical sections: Part I: Processes, Methods, and Tools for UX Design and Evaluation; User Requirements, Preferences, and UX Influential Factors; Usability, Acceptance, and User Experience Assessment. Part II: Emotion, Motivation, and Persuasion Design; Design for Well-being and Health.- Learning Experience Design; Globalization, Localization, and Culture Issues. Part III: Design Thinking and Philosophy; DUXU Case Studies; Design and User Experience in Emerging Technologies.
This book constitutes the refereed proceedings of the 52nd International Simulation and Gaming Association Conference, ISAGA 2021, held in Indore, India, during September 6-10, 2021. The 24 full papers included in this book were carefully reviewed and selected from 58 submissions. They were organized in topical sections as follows: game design and facilitation; gaming in education; player experience in simulations; and policy formulation and serious games.
This book analyzes the fundamental issues faced when blockchain technology is applied to real-life applications. These concerns, not only in the realm of computer science, are caused by the nature of technological design. Blockchain is considered the foundation of a wide range of flexible ecosystems; its technology is an excellent mixture of mathematics, cryptography, incentive mechanisms, economics, and pertinent regulations. The book provides an essential understanding of why such fundamental issues arise, by revising the underlying theories. Blockchain theory is thus presented in an easy-to-understand, useful manner. Also explained is the reason why blockchain is hard to adopt for real-life problems but is valuable as a foundation for flexible ecosystems. Included are directions for solving those problems and finding suitable areas for blockchain applications in the future. The authors of this work are experts from a wide range of backgrounds such as cryptography, distributed computing, computer science, trust, identity, regulation, and standardization. Their contributions collected here will appeal to all who are interested in blockchain and the elements surrounding it.
Gain a basic foundation of essential personal finance issues and strategies, specifically geared towards tech professionals. The book will build on the concepts, such as going from the basics of investments to more advanced topics like alternative investments and tax strategies. In the U.S., about 6 million tech startup employees have stock options. The result is that this can often be the biggest source of wealth, sometimes reaching into the millions. Yet there are many financial and tax complications that have been aggravated with the transition to remote work. This can mean lower returns and missed opportunities, and in some cases, employees may even be subject to actions from the IRS and local tax agencies. The Personal Finance Guide For Tech Professionals is packed with actionable advice and covers the main areas that any tech professional will face. What You'll Learn Track and analyze investments with fintech apps Improve the results of freelance work, such as with strategies to lower taxes Protect your hard-earned assets with insurance and the establishment of entities like LLCs Who This Book Is For The main focus will be on tech employees who get equity compensation. This spans from entry level people to senior executives.
The three-volume set LNCS 13302, 13303 and 13304 constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 24th International Conference on Human-Computer Interaction, HCII 2022, which took place virtually in June-July 2022. The 132 papers included in this HCI 2022 proceedings were organized in topical sections as follows: Part I: Theoretical and Multidisciplinary Approaches in HCI; Design and Evaluation Methods, Techniques and Tools; Emotions and Design; and Children-Computer Interaction, Part II: Novel Interaction Devices, Methods and Techniques; Text, Speech and Image Processing in HCI; Emotion and Physiological Reactions Recognition; and Human-Robot Interaction, Part III: Design and User Experience Case Studies, Persuasive Design and Behavioral Change; and Interacting with Chatbots and Virtual Agents.
Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.
Shortly after it was first introduced in 2006, differential privacy became the flagship data privacy definition. Since then, numerous variants and extensions were proposed to adapt it to different scenarios and attacker models. In this work, we propose a systematic taxonomy of these variants and extensions. We list all data privacy definitions based on differential privacy, and partition them into seven categories, depending on which aspect of the original definition is modified. These categories act like dimensions: Variants from the same category cannot be combined, but variants from different categories can be combined to form new definitions. We also establish a partial ordering of relative strength between these notions by summarizing existing results. Furthermore, we list which of these definitions satisfy some desirable properties, like composition, post-processing, and convexity by either providing a novel proof or collecting existing ones.
This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2021, which took place during November 11-13, 2021. The conference was originally planned to take place in Ames, IA, USA, but had to change to an online format due to the COVID-19 pandemic. The 9 full and 3 short papers included in this volume were carefully reviewed and selected from 23 submissions. The papers were organized in topical sections named: CPS and hardware security; attacks, responses, and security management; network and data security.
This book constitutes the refereed proceedings of the 8th Conference on Electronic Governance and Open Society: Challenges in Eurasia, EGOSE 2021, held in St. Petersburg, Russia, in November 2021. The 21 full papers were carefully reviewed and selected from 69 submissions, additionally one invited paper has been included in this volume. The papers are organized in topical sections on digital technology and design; digital Society; digital government and economy.
This book constitutes the refereed proceedings of the 19th International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022. The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The EPCE 2022 proceedings covers subjects such as advances in applied cognitive psychology that underpin the theory, measurement and methodologies behind the development of human-machine systems. Cognitive Ergonomics describes advances in the design and development of user interfaces.
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.
This book consists of refereed selected papers from the International Conference on Security & Privacy - ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.
This book constitutes the refereed proceedings of the Third International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2022, held in Bizerte, Tunisia, in February 2022. Due to the COVID-19 pandemic the conference was held online. The 5 full papers included in this volume were carefully reviewed and selected from 14 submissions. The volume also presents one invited paper. The papers are organized in topical sections on emerging networks and communications; cyber security of connected objects.
This book constitutes the refereed post-conference proceedings of the 4th International Conference on Intelligence Science, ICIS 2020, held in Durgapur, India, in February 2021 (originally November 2020). The 23 full papers and 4 short papers presented were carefully reviewed and selected from 42 submissions. One extended abstract is also included. They deal with key issues in brain cognition; uncertain theory; machine learning; data intelligence; language cognition; vision cognition; perceptual intelligence; intelligent robot; and medical artificial intelligence.
The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022. The conference was originally planned to take place in Yokohama, Japan, but had to change to an online format due to the COVID-19 pandemic.The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.
The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022. The conference was originally planned to take place in Yokohama, Japan, but had to change to an online format due to the COVID-19 pandemic.The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks. |
You may like...
New Research on the Voynich Manuscript…
National Security Agency
Hardcover
R691
Discovery Miles 6 910
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst
Hardcover
|