![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This book constitutes the refereed proceedings of the 10th International Conference on Big Data, BigData 2021, held online as part of SCF 2021, during December 10-14, 2021.The 6 full and 2 short papers presented were carefully reviewed and selected from 53 submissions. The topics covered are Big Data Architecture, Big Data Modeling, Big Data As A Service, Big Data for Vertical Industries (Government, Healthcare, etc.), Big Data Analytics, Big Data Toolkits, Big Data Open Platforms, Economic Analysis, Big Data for Enterprise Transformation, Big Data in Business Performance Management, Big Data for Business Model Innovations and Analytics, Big Data in Enterprise Management Models and Practices, Big Data in Government Management Models and Practices, and Big Data in Smart Planet Solutions.
This book constitutes the refereed proceedings of the 17th World Congress on Services, SERVICES 2021, held as part of the Services Conference Federation, SCF 2021, in December 2021. The conference was held virtually due to the COVID-19 pandemic. The 7 full papers and 2 short papers presented were carefully reviewed and selected from 43 submissions. The papers cover topics in the field of Advertising Services, Banking Services, Broadcasting & Cable TV Service, Business Services, Communications Services, Government Services, Real Estate Operations Services, Schools and Education Services, Healthcare Services, and much more.
This book focuses on information-geometric manifolds of structured data and models and related applied mathematics. It features new and fruitful interactions between several branches of science: Advanced Signal/Image/Video Processing, Complex Data Modeling and Analysis, Statistics on Manifolds, Topology/Machine/Deep Learning and Artificial Intelligence. The selection of applications makes the book a substantial information source, not only for academic scientist but it is also highly relevant for industry. The book project was initiated following discussions at the international conference GSI'2019 - Geometric Science of Information that was held at ENAC, Toulouse (France).
Theory is what remains true when technology is changing. So, it is important to know and master the basic concepts and the theoretical tools that underlie the design of the systems we are using today and the systems we will use tomorrow. This means that, given a computing model, we need to know what can be done and what cannot be done in that model. Considering systems built on top of an asynchronous read/write shared memory prone to process crashes, this monograph presents and develops the fundamental notions that are universal constructions, consensus numbers, distributed recursivity, power of the BG simulation, and what can be done when one has to cope with process anonymity and/or memory anonymity. Numerous distributed algorithms are presented, the aim of which is being to help the reader better understand the power and the subtleties of the notions that are presented. In addition, the reader can appreciate the simplicity and beauty of some of these algorithms.
This book constitutes the refereed proceedings of six International Workshops that were held in conjunction with the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-6, 2021. The conference was initially planned to take place in Darmstadt, Germany, but changed to an online event due to the COVID-19 pandemic.The 32 papers included in these proceedings stem from the following workshops: the 7th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2021, which accepted 7 papers from 16 submissions; the 5th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2021, which accepted 5 papers from 8 submissions; the 4th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2021, which accepted 6 full and 1 short paper out of 15 submissions; the 3rd Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2021, which accepted 5 full and 1 short paper out of 13 submissions. the 2nd Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2021, which accepted 3 full and 1 short paper out of 6 submissions; and the 1st International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2021, which accepted 3 papers out of 7 submissions. The following papers are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com:Why IT Security Needs Therapy by Uta Menges, Jonas Hielscher, Annalina Buckmann, Annette Kluge, M. Angela Sasse, and Imogen Verret Transferring Update Behavior from Smartphones to Smart Consumer Devices by Matthias Fassl, Michaela Neumayr, Oliver Schedler, and Katharina Krombholz Organisational Contexts of Energy Cybersecurity by Tania Wallis, Greig Paul, and James Irvine SMILE - Smart eMaIl Link domain Extractor by Mattia Mossano, Benjamin Berens, Philip Heller, Christopher Beckmann, Lukas Aldag, Peter Mayer, and Melanie Volkamer A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things by Salatiel Ezennaya-Gomez, Claus Vielhauer, and Jana Dittmann Data Protection Impact Assessments in Practice - Experiences from Case Studies by Michael Friedewald, Ina Schiering, Nicholas Martin, and Dara Hallinan
This book constitutes the proceedings of the 9th International Workshop on Code-Based Cryptography, CBCrypto 2021, which was held during June 21-22, 2021. The workshop was initially planned to take place in Munich, Germany, but changed to an online event due to the COVID-19 pandemic. The 6 papers presented in this volume were carefully reviewed and selected from 14 submissions. These contributions span all aspects of code-based cryptography, from design to implementation, and including studies of security, new systems, and improved decoding algorithms.
Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics. This book provides that knowledge, combining an informal style with rigorous proofs of the key results to give an accessible introduction. It comes with plenty of examples and exercises (many with hints and solutions), and is based on a highly successful course developed and taught over many years to undergraduate and graduate students in mathematics and computer science.
This book provides a tutorial on quantum communication networks. The authors discuss current paradigm shifts in communication networks that are needed to add computing and storage to the simple transport ideas of prevailing networks. They show how these 'softwarized' solutions break new grounds to reduce latency and increase resilience. The authors discuss how even though these solutions have inherent problems due to introduced computing latency and energy consumption, the problems can be solved by hybrid classical-quantum communication networks. The book brings together quantum networking, quantum information theory, quantum computing, and quantum simulation.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2022, CT-RSA 2022, held in San Francisco, CA, USA, in February 2022.* The 24 full papers presented in this volume were carefully reviewed and selected from 87 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto-graphic protocols to primitives and their implementation security. *The conference was held as a hybrid event.
This book constitutes the refereed proceedings of the 9th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2021, held in San Antonio, TX, USA, in 2021. Due to the COVID-19 pandemic the conference was held online. The 11 papers presented were carefully reviewed and selected from 30 submissions. They were organized according to the following topical sections: intrusion and malware detection; secure knowledge management; deep learning for security; web and social network.
This book offers a structured algebraic and geometric approach to the classification and construction of quantum codes for topological quantum computation. It combines key concepts in linear algebra, algebraic topology, hyperbolic geometry, group theory, quantum mechanics, and classical and quantum coding theory to help readers understand and develop quantum codes for topological quantum computation. One possible approach to building a quantum computer is based on surface codes, operated as stabilizer codes. The surface codes evolved from Kitaev's toric codes, as a means to developing models for topological order by using qubits distributed on the surface of a toroid. A significant advantage of surface codes is their relative tolerance to local errors. A second approach is based on color codes, which are topological stabilizer codes defined on a tessellation with geometrically local stabilizer generators. This book provides basic geometric concepts, like surface geometry, hyperbolic geometry and tessellation, as well as basic algebraic concepts, like stabilizer formalism, for the construction of the most promising classes of quantum error-correcting codes such as surfaces codes and color codes. The book is intended for senior undergraduate and graduate students in Electrical Engineering and Mathematics with an understanding of the basic concepts of linear algebra and quantum mechanics.
This two-volume set constitutes the post-conference proceedings of the 5th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2021, held in October 2021. Due to COVID-19 the conference was held virtually. The 94 papers presented were selected from 254 submissions and focus on theory and application of hybrid information processing technology for smarter and more effective research and application. The theme of ADHIP 2020 was "Social hybrid data processing". The papers are named in topical sections as follows: Intelligent algorithms in complex environment; AI system research and model design; Method research on Internet of Things technology; Research and analysis with intelligent education.
This book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020. The 11 full papers presented were carefully reviewed and selected from a total of 125 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.
This volume constitutes the proceedings of the 20th International Workshop on Digital Forensics and Watermarking, IWDW 2021, held in Beijing, China, in November 2021. The 18 full papers in this volume were carefully reviewed and selected from 32 submissions. The are categorized in the following topical headings: Forensics and Security Analysis; Watermarking and Steganology.
This book constitutes the refereed post-conference proceedings of the 13th International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16th International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TRIDENTCOM 2021, held in November 2021. Both conferences were held virtually due to COVID 19 pandemic. The 15 full papers of ADHOCNETS 2021 were selected from 29 submissions and cover a variety of network paradigms including ad hoc networks (MANETs), wireless sensor networks (WSNs), vehicular ad hoc networks (Vanets), airborne networks, underwater networks, underground networks, personal area networks, and home networks, etc. It promises a wide range of applications in civilian, commercial, and military areas. The 18 full papers were selected from 47 submissions and deal the emerging technologies such as Industry 4.0, blockchain, deep learning, cloud/edge/fog computing, cyber physical systems, cybersecurity and computer communications.
This volume explores the rich interplay between number theory and wireless communications, reviewing the surprisingly deep connections between these fields and presenting new research directions to inspire future research. The contributions of this volume stem from the Workshop on Interactions between Number Theory and Wireless Communication held at the University of York in 2016. The chapters, written by leading experts in their respective fields, provide direct overviews of highly exciting current research developments. The topics discussed include metric Diophantine approximation, geometry of numbers, homogeneous dynamics, algebraic lattices and codes, network and channel coding, and interference alignment. The book is edited by experts working in number theory and communication theory. It thus provides unique insight into key concepts, cutting-edge results, and modern techniques that play an essential role in contemporary research. Great effort has been made to present the material in a manner that is accessible to new researchers, including PhD students. The book will also be essential reading for established researchers working in number theory or wireless communications looking to broaden their outlook and contribute to this emerging interdisciplinary area.
This book constitutes the proceedings of the 4th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2021, held in Darmstadt, Germany, on October 8, 2021. The workshop was co-located with ESORICS 2021. The 11 full papers presented in this volume were carefully reviewed and selected from 14 submissions. The workshop presents new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including smart home environment.
This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.* The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. *Due to the COVID-19 pandemic the conference was held online.
This volume brings together a multidisciplinary group of scholars from diverse fields including computer science, engineering, archival science, law, business, psychology, economics, medicine and more to discuss the trade-offs between different "layers" in designing the use of blockchain/Distributed Ledger Technology (DLT) for social trust, trust in data and records, and trust in systems. Blockchain technology has emerged as a solution to the problem of trust in data and records, as well as trust in social, political and economic institutions, due to its profound potential as a digital trust infrastructure. Blockchain is a DLT in which confirmed and validated sets of transactions are stored in blocks that are chained together to make tampering more difficult and render records immutable. This book is dedicated to exploring and disseminating the latest findings on the relationships between socio-political and economic data, record-keeping, and technical aspects of blockchain.
This book constitutes the refereed proceedings of the 15th International Conference on Network and System Security, NSS 2021, held in Tianjin, China, on October 23, 2021. The 16 full and 8 short papers presented in this book were carefully reviewed and selected from 62 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
This book presents a complete and accurate study of arithmetic and algebraic circuits. The first part offers a review of all important basic concepts: it describes simple circuits for the implementation of some basic arithmetic operations; it introduces theoretical basis for residue number systems; and describes some fundamental circuits for implementing the main modular operations that will be used in the text. Moreover, the book discusses floating-point representation of real numbers and the IEEE 754 standard. The second and core part of the book offers a deep study of arithmetic circuits and specific algorithms for their implementation. It covers the CORDIC algorithm, and optimized arithmetic circuits recently developed by the authors for adders and subtractors, as well as multipliers, dividers and special functions. It describes the implementation of basic algebraic circuits, such as LFSRs and cellular automata. Finally, it offers a complete study of Galois fields, showing some exemplary applications and discussing the advantages in comparison to other methods. This dense, self-contained text provides students, researchers and engineers, with extensive knowledge on and a deep understanding of arithmetic and algebraic circuits and their implementation.
This eighteenth volume in the Poincare Seminar Series provides a thorough description of Information Theory and some of its most active areas, in particular, its relation to thermodynamics at the nanoscale and the Maxwell Demon, and the emergence of quantum computation and of its counterpart, quantum verification. It also includes two introductory tutorials, one on the fundamental relation between thermodynamics and information theory, and a primer on Shannon's entropy and information theory. The book offers a unique and manifold perspective on recent mathematical and physical developments in this field.
Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.
A mathematical tour of some of the greatest unsolved ciphers of all time In 1953, a man was found dead from cyanide poisoning near the Philadelphia airport with a picture of a Nazi aircraft in his wallet and an enciphered message taped to his abdomen. In 1912, a book dealer named Wilfrid Voynich came into possession of an illuminated cipher manuscript once belonging to Emperor Rudolf II, who was obsessed with alchemy and the occult. Wartime codebreakers tried-and failed-to unlock the book's secrets, and it remains an enigma to this day. In this lively and entertaining book, Craig Bauer examines these and other vexing ciphers yet to be cracked. Some may reveal the identity of a spy or serial killer, provide the location of buried treasure, or expose a secret society-while others may be elaborate hoaxes. He lays out the evidence surrounding each cipher, describes the efforts to decipher it, and invites readers to try their hand at puzzles that have stymied so many others.
This two-volume set of IFIP AICT 617 and 618 constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation" on Transfer and Diffusion of IT, TDIT 2020, held in Tiruchirappalli, India, in December 2020.The 86 revised full papers and 36 short papers presented were carefully reviewed and selected from 224 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts: Part I: artificial intelligence and autonomous systems; big data and analytics; blockchain; diffusion and adoption technology; emerging technologies in e-Governance; emerging technologies in consumer decision making and choice; fin-tech applications; healthcare information technology; and Internet of Things Part II: diffusion of information technology and disaster management; adoption of mobile and platform-based applications; smart cities and digital government; social media; and diffusion of information technology and systems |
You may like...
Ask a Suffragist - Stories and Wisdom…
April Young Bennett
Hardcover
Daughters of Anoma - African Women and…
Mercy Amba Oduyoye
Paperback
|