![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, but had to change to an online format due to the COVID-19 pandemic.The 52 papers included in these proceedings were carefully reviewed and selected from 156 submissions. They focus on all aspects of public-key cryptography, covering theory, implementations and applications. This year, post-quantum cryptography, PQC constructions and cryptanalysis received special attention.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2021, CT-RSA 2021, held in San Francisco, CA, USA, in May 2021.*The 27 full papers presented in this volume were carefully reviewed and selected from 100 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto-graphic protocols to primitives and their implementation security. *The conference was held virtually.
This book constitutes revised selected papers from the 26th Argentine Congress on Computer Science, CACIC 2020, held in San Justo, Buenos Aires, Argentina in October 2020. Due to the COVID-19 pandemic the conference was held in a virtual mode. The 21 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 118 submissions. They were organized in topical sections named: intelligent agents and systems; distributed and parallel processing; computer technology applied to education; graphic computation, images and visualization; software engineering; databases and data mining; hardware architectures, networks, and operating systems; innovation in software systems; signal processing and real-time systems; innovation in computer science education; computer security; and digital governance and smart cities.
This book is a timely document of state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this topic has recently received attention from governments, industries and academic communities due to the COVID-19 pandemic. This book provides a link between new proposals related to contact tracing applications and a contextual literature review primarily from the cryptologic viewpoint. As these applications are related to security and privacy of individuals, analyzing them from cryptologic viewpoint is of utmost importance. Therefore, present developments from cryptologic aspects of most proposals around the world, including Singapore, Europe, USA, Australia and India, have been discussed. Providing an in-depth study on the design rationale of each protocol, this book is of value to researchers, students and professionals alike.
This book constitutes revised and selected papers from the scientific satellite events held in conjunction with the18th International Conference on Service-Oriented Computing, ICSOC 2020. The conference was held virtually during December 14-17, 2020. A total of 125 submissions were received for the satellite events. The volume includes 9 papers from the PhD Symposium Track, 4 papers from the Demonstration Track, and 45 papers from the following workshops: International Workshop on Artificial Intelligence for IT Operations (AIOps) International Workshop on Cyber Forensics and Threat Investigations Challenges in Emerging Infrastructures (CFTIC 2020) 2nd Workshop on Smart Data Integration and Processing (STRAPS 2020) International Workshop on AI-enabled Process Automation (AI-PA 2020) International Workshop on Artificial Intelligence in the IoT Security Services (AI-IOTS 2020)
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.
This book constitutes the proceedings of the 5th International Conference on Smart Computing and Communication, SmartCom 2020, which took place in Paris, France, during December 29-31, 2020.The 30 papers included in this book were carefully reviewed and selected from 162 submissions. The scope of SmartCom 2020 was broad, from smart data to smart communications, from smart cloud computing to smart security. The conference gathered all high-quality research/industrial papers related to smart computing and communications and aimed at proposing a reference guideline for further research.
This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical sections on randomness and its use; computer-assisted cryptographic proofs; outsourcing and delegatin computation; symmetric cryptanalysis and constructions; secure computation: leakage and side channels; quantum cryptography; lattices and knapsacks; public-key encryption; symmetric schemes; signatures; obilvious transfer and secret sharing; and multivariate and coding-based schemes.
This book constitutes the refereed proceedings of the 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, held in Costa de Caparica, Portugal, in July 2020. The 20 full papers and 24 short papers presented were carefully reviewed and selected from 91 submissions. The papers present selected results produced in engineering doctoral programs and focus on technological innovation for industry and service systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: collaborative networks; decisions systems; analysis and synthesis algorithms; communication systems; optimization systems; digital twins and smart manufacturing; power systems; energy control; power transportation; biomedical analysis and diagnosis; and instrumentation in health.
This book constitutes the refereed post-conference proceedings of the First International Conference Edge Computing and IoT, ICECI 2020, held in November 2020 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually. The rapidly increasing devices and data traffic in the Internet-of-Things (IoT) era are posing significant burdens on the capacity-limited Internet and uncontrollable service delay. The 11 full papers of ICECI 2020 were selected from 79 submissions and present results and ideas in the area of edge computing and IoT.
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.
Information is a core concept in animal communication: individuals routinely produce, acquire, process and store information, which provides the basis for their social life. This book focuses on how animal acoustic signals code information and how this coding can be shaped by various environmental and social constraints. Taking birds and mammals, including humans, as models, the authors explore such topics as communication strategies for "public" and "private" signaling, static and dynamic signaling, the diversity of coded information and the way information is decoded by the receiver. The book appeals to a wide audience, ranging from bioacousticians, ethologists and ecologists to evolutionary biologists. Intended for students and researchers alike, it promotes the idea that Shannon and Weaver's Mathematical Theory of Communication still represents a strong framework for understanding all aspects of the communication process, including its dynamic dimensions.
This book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Coordination, Organizations, Institutions, and Norms for Governance of Multi-Agent Systems, COIN 2017, co-located with AAMAS 2017, and the International Workshop on Coordination, Organizations, Institutions, Norms and Ethics for Governance of Multi-Agent Systems, COINE 2020, co-located with AAMAS 2020. The COIN 2017 workshop was held in Sao Paulo, Brazil, in May 2017 and the COINE 2020 workshop was held virtually, in May 2020. The 9 full papers and 1 short paper were carefully reviewed and selected from a total of 20 submissions for inclusion in this volume and cover the following topics: empirical applications of COINE technologies; emergence and social metrics; and conceptual frameworks and architectures.
This book constitutes the proceedings of the 22nd Conference on Passive and Active Measurement, PAM 2021, which was planned to be held in Cottbus, Germany, in March 2021. Due to the Corona pandemic, the conference was organized as a virtual meeting. The 33 full papers presented in this volume were carefully reviewed and selected from 75 submissions. They were organized in topical sections named: COVID-19; web security; video streaming; TLS; staying connected; DoS; performance; network security; DNS; capacity; and exposing hidden behaviors. Due to the Corona pandemic, PAM 2021 was held as a virtual conference.
This book constitutes the refereed proceedings of the 15th International Conference on Cognitive Radio-Oriented Wireless Networks, CROWNCOM 2020, held in Rome, Italy, in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 13 revised full papers were selected from 28 submissions and present all major technical aspects related to cognitive radio and networks. The papers are organized in four sessions: spectrum sensing and environment awareness; resource sharing and optimization; verticals and applications; business models and spectrum management.
The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, but had to change to an online format due to the COVID-19 pandemic.The 52 papers included in these proceedings were carefully reviewed and selected from 156 submissions. They focus on all aspects of public-key cryptography, covering theory, implementations and applications. This year, post-quantum cryptography, PQC constructions and cryptanalysis received special attention.
The two-volume set LNCS 12794-12795 constitutes the refereed proceedings of the 9th International Conference on Culture and Computing, C&C 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers included in the HCII-C&C volume set were organized in topical sections as follows: Part I: ICT for cultural heritage; technology and art; visitors' experiences in digital culture; Part II: Design thinking in cultural contexts; digital humanities, new media and culture; perspectives on cultural computing.
This text presents an algebraic approach to the construction of several important families of quantum codes derived from classical codes by applying the well-known Calderbank-Shor-Steane (CSS), Hermitian, and Steane enlargement constructions to certain classes of classical codes. In addition, the book presents families of asymmetric quantum codes with good parameters and provides a detailed description of the procedures adopted to construct families of asymmetric quantum convolutional codes.Featuring accessible language and clear explanations, the book is suitable for use in advanced undergraduate and graduate courses as well as for self-guided study and reference. It provides an expert introduction to algebraic techniques of code construction and, because all of the constructions are performed algebraically, it enables the reader to construct families of codes, rather than only codes with specific parameters. The text offers an abundance of worked examples, exercises, and open-ended problems to motivate the reader to further investigate this rich area of inquiry. End-of-chapter summaries and a glossary of key terms allow for easy review and reference.
This book presents revised selected papers from the 17th International Forum on Digital TV and Wireless Multimedia Communication, IFTC 2020, held in Shanghai, China, in December 2020.The 21 full papers and 16 short papers presented in this volume were carefully reviewed and selected from 120 submissions. They were organized in topical sections on image processing; machine learning; quality assessment; telecommunications; video surveillance; and virtual reality.
This book constitutes selected and revised papers of the 5th International Conference on Space Information Networks, SINC 2020, held in Shenzhen, China, in December 2020.The 11 full and 2 short papers presented in this volume were carefully reviewed and selected from 104 submissions. The papers present the latest research in the fields of space information networks.
This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.
This book constitutes thoroughly reviewed, revised and selected papers from the 6th International Conference on Human Centered Computing, HCC 2020, held in virtually, due to COVID- 19, in December 2020. The 28 full and 20 short papers presented in this volume were carefully reviewed and selected from a total of 133 submissions.The conference focuses on the following three main themes as follows: Data such as Data Visualization, Big Data, Data Security, Hyper connectivity such as Internet of Things, Cloud Computing, Mobile Network and Collaboration such as Collective Intelligence, Peer Production, Context Awareness and much more.
This volume constitutes the refereed and revised post-conference proceedings of the 4th IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2019, in Kyiv, Ukraine, in October 2019. The 17 full papers and 2 short papers presented were carefully reviewed and selected from 53 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, and disaster risk assessment and management.
This two-volume set LNICST 357-358 constitutes the post-conference proceedings of the 11th EAI International Conference on Wireless and Satellite Services, WiSATS 2020, held in Nanjing, China, in September 2020. The 91 full papers and workshop papers were carefully reviewed and selected from 200 submissions. Part I - LNICST 357 - details original research and results of wireless and satellite technology for a smarter global communication architecture. The theme of WISATS 2020 is "Intelligent Wireless and Satellite Communications for Beyond 5G". Part II - LNICST 358 - presents 6 workshop papers: High Speed Space Communication and Space Information Networks (HSSCSIN); Integrated Space and Onboard Networks (ISON); Intelligent Satellite Operations, Managements, and Applications (ISOMA); Intelligent Satellites in Future Space Networked System (ISFSNS); Satellite Communications, Networking and Applications (SCNA); Satellite Internet of Things; Trusted Data Sharing, Secure Communication (SIOTTDSSC).
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. |
You may like...
Readings from CRYPTOLOGIA on the Enigma…
Brian J. Winkel, Cipher Deavors, …
Hardcover
R2,798
Discovery Miles 27 980
Coding Theory and Applications - 4th…
Raquel Pinto, Paula Rocha Malonek, …
Hardcover
R2,731
Discovery Miles 27 310
Applications of Cryptography and Network…
Stephen Mason
Hardcover
|