![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This book constitutes the proceedings of the Second International Conference on Spatial Data and Intelligence, SpatialDI 2021, which was held during April 22-24, 2021 in Hangzhou, China.The 14 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in the topical sections named: traffic management, data science, and city analysis.
This book constitutes the refereed proceedings of the 17th China Conference on Machine Translation, CCMT 2020, held in Xining, China, in October 2021. The 10 papers presented in this volume were carefully reviewed and selected from 25 submissions and focus on all aspects of machine translation, including preprocessing, neural machine translation models, hybrid model, evaluation method, and post-editing.
This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2021, held in Lugano, Switzerland, in October 2021. The 14 full papers carefully reviewed and selected from 31 submissions are presented in this volume together with the 4 extended keynote abstracts. The workshop covers the following subjects: cryptography, side-channel analysis, cryptographic implementations, fault attacks, implementation attacks, post-quantum cryptography, hardware accelerators, etc.
This book constitutes the proceedings of the 20th China National Conference on Computational Linguistics, CCL 2021, held in Hohhot, China, in August 2021.The 31 full presented in this volume were carefully reviewed and selected from 90 submissions. The conference papers covers the following topics such as Machine Translation and Multilingual Information Processing, Minority Language Information Processing, Social Computing and Sentiment Analysis, Text Generation and Summarization, Information Retrieval, Dialogue and Question Answering, Linguistics and Cognitive Science, Language Resource and Evaluation, Knowledge Graph and Information Extraction, and NLP Applications.
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it was an online event in 2021.The 103 full papers presented in the proceedings were carefully reviewed and selected from a total of 426 submissions. The papers are organized in the following topical sections: Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments. Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis. Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing. Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols.
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it was an online event in 2021.The 103 full papers presented in the proceedings were carefully reviewed and selected from a total of 426 submissions. The papers are organized in the following topical sections: Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments. Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis. Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing. Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols.
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it was an online event in 2021.The 103 full papers presented in the proceedings were carefully reviewed and selected from a total of 426 submissions. The papers are organized in the following topical sections: Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments. Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis. Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing. Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols.
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it was an online event in 2021.The 103 full papers presented in the proceedings were carefully reviewed and selected from a total of 426 submissions. The papers are organized in the following topical sections: Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments. Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis. Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing. Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols.
In this work, algorithms and architectures for cryptography and source coding are developed, which are suitable for many resource-constrained embedded systems such as non-volatile flash memories. A new concept for elliptic curve cryptography is presented, which uses an arithmetic over Gaussian integers. Gaussian integers are a subset of the complex numbers with integers as real and imaginary parts. Ordinary modular arithmetic over Gaussian integers is computational expensive. To reduce the complexity, a new arithmetic based on the Montgomery reduction is presented. For the elliptic curve point multiplication, this arithmetic over Gaussian integers improves the computational efficiency, the resistance against side channel attacks, and reduces the memory requirements. Furthermore, an efficient variant of the Lempel-Ziv-Welch (LZW) algorithm for universal lossless data compression is investigated. Instead of one LZW dictionary, this algorithm applies several dictionaries to speed up the encoding process. Two dictionary partitioning techniques are introduced that improve the compression rate and reduce the memory size of this parallel dictionary LZW algorithm.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021. The conference took place in Nanjing, China.The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. The contributions in Part II of the set are subdivided into the following topical sections: Scheduling & Optimization II; Security; Data Center Networks and Cloud Computing; Privacy-Aware Computing; Internet of Vehicles; Visual Computing for IoT; Mobile Ad-Hoc Networks.
This book constitutes the proceedings of the 20th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2021, held in Granada, Spain, in September 2021, in conjunction with the IFIP WG 8.5 IFIP International Conference on Electronic Participation (ePart 2021) and the International Conference for E-Democracy and Open Government Conference (CeDEM 2021).The 23 full papers presented were carefully reviewed and selected from 63 submissions. The papers are clustered under the following topical sections: digital transformation; digital services and open government; open data: social and technical perspectives; smart cities; and data analytics, decision making, and artificial intelligence. Chapters "Perceived and Actual Lock-in Effects Amongst Swedish Public Sector Organisations when Using a SaaS Solution" and "Ronda: Real-time Data Provision, Processing and Publication for Open Data" are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book constitutes the proceedings of the satellite workshops held around the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, held in Kamakura, Japan, in June 2021.The 26 papers presented in this volume were carefully reviewed and selected from 49 submissions. They stem from the following workshops: AIBlock 2021: Third International Workshop on Application Intelligence and Blockchain Security AIHWS 2021: Second International Workshop on Artificial Intelligence in Hardware Security AIoTS 2021: Third International Workshop on Artificial Intelligence and Industrial IoT Security CIMSS 2021: First International Workshop on Critical Infrastructure and Manufacturing System Security Cloud S&P 2021: Third International Workshop on Cloud Security and Privacy SCI 2021: Second International Workshop on Secure Cryptographic Implementation SecMT 2021: Second International Workshop on Security in Mobile Technologies SiMLA 2021; Third International Workshop on Security in Machine Learning and its Applications Due to the Corona pandemic the workshop was held as a virtual event.
This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography, SAC 2020, held in Halifax, Nova Scotia, Canada in October 2020. The 27 full papers presented in this volume were carefully reviewed and selected from 52 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions
This book constitutes the refereed proceedings of the 9th Iberoamerican Conference on Applications and Usability of Interactive Television, jAUTI 2020, in Aveiro, Portugal, in December 2020.* The 12 full papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on audiovisual content and experiences; design and development of iTV applications; iTV and videos in learning; iTV for the elderly; usability and UX evaluations.*Due to the COVID-19 pandemic the conference was held online.
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2021, held in Kristiansand, Norway, in August 2021.*The 24 revised full research papers, included in the volume together with 6 short contributions and 7 prototype papers, were carefully reviewed and selected from 78 submissions. They are organized in the following topical sections: impactful sociotechnical design; problem and contribution articulation; design knowledge for reuse; emerging methods and frameworks for DSR; DSR and governance; the new boundaries of DSR. *Apart from the planned on-site event, the hybrid conference model was explored due to the Covid-19 pandemic.
This book constitutes the proceedings of the 7th International Conference on Cryptology and Information Security in Latin America, LATIN 2021, which was held in October 2021. The conference was originally planned to take place in Bogota, Colombia, but changed to a virtual event due to the COVID-19 pandemic. The 22 full papers included in this volume were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: quantum cryptography; post-quantum cryptography; asymmetric cryptanalysis; cryptanalysis and side-channel analysis; distributed cryptographic protocols; and multiparty computation.
This book constitutes the refereed proceedings of the 35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2021, held in Calgary, Canada, in July 2021.*The 15 full papers and 8 short papers presented were carefully reviewed and selected from 45 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named differential privacy, cryptology, machine learning, access control and others. *The conference was held virtually due to the COVID-19 pandemic.
This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021. The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.
This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic.
This book constitutes selected and revised papers from the First International Conference on Cybersecurity in Emerging Digital Era, ICCEDE 2020, held in Greater Noida, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 9 full papers and 2 short papers presented in this volume were thoroughly reviewed and selected from 193 submissions. The papers are organized in topical sections on cyber security issues and challenges in emerging digital era; security resilience in contemporary applications.
This book constitutes the conference proceedings of the 10th International Conference on Network Games, Control and Optimization, NETGCOOP 2020, held in Cargese, Corsica, France, in September 2021*.The 12 full papers and 16 short papers were carefully reviewed and selected from 44 submissions. The papers are organized in the following topical sections: game theory and iterative algorithms applied to wireless communication; stochastic models for network performance analysis; game theory in mobile and wireless networks; scheduling and resource allocation problems in networks; advance in game theory; social network; electrical network. * The conference was postponed to 2021 due to the COVID-19 pandemic.
Wireless networks are facing growing demand for high capacity, better coverage, support of new applications and broad range of services. In this book, the authors first present an overview of beamforming antennas and millimeter wave communications followed by a discussion on the challenges and issues facing MAC and multi-hop routing in the wireless networks with beamforming antennas. Then, they discuss various MAC and routing protocols that are specifically designed to address those issues and exploit the benefits of millimeter wave and beamforming antennas. Authors also present a framework to provide Quality of Service (QoS) in contention-based wireless networks with beamforming antennas. Finally, the book is concluded with a discussion on open research topics for future generation WLAN systems.
This book constitutes the proceedings of the 13th IFIP WG 8.5 International Conference on Electronic Participation, ePart 2021, held in Granada, Spain, in September 2021, in conjunction with IFIP WG 8.5 Electronic Government (EGOV 2021), the Conference for E-Democracy and Open Government Conference (CeDEM 2021). The 16 full papers presented were carefully reviewed and selected from 37 submissions. The papers are clustered under the following topical sections: digital participation, digital society, digital government and legal issues.
This book constitutes the revised and extended papers of the Second International Conference on Innovations in Digital Economy, SPBU IDE 2020, held in St. Petersburg, Russia, in October 2020. The 9 papers presented were thoroughly reviewed and selected for publication from 117 submissions. The papers are organized according the following topical sections: economic efficiency and social consequences of digital innovations implementation; industrial, service and agricultural digitalization; end-to-end digital technologies in industry.
This two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and Communications Security, ICICS 2021, held in Chongqing, China, in September 2021. The 49 revised full papers presented in the book were carefully selected from 182 submissions. The papers in Part II are organized in the following thematic blocks: machine learning security; multimedia security; security analysis; post-quantum cryptography; applied cryptography. |
You may like...
A Billionaire Romance Series - Their…
Michelle Love, Megan Lee
Hardcover
R1,041
Discovery Miles 10 410
|