![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
The two-volume set LNCS 12794-12795 constitutes the refereed proceedings of the 9th International Conference on Culture and Computing, C&C 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers included in the HCII-C&C volume set were organized in topical sections as follows: Part I: ICT for cultural heritage; technology and art; visitors' experiences in digital culture; Part II: Design thinking in cultural contexts; digital humanities, new media and culture; perspectives on cultural computing.
This text presents an algebraic approach to the construction of several important families of quantum codes derived from classical codes by applying the well-known Calderbank-Shor-Steane (CSS), Hermitian, and Steane enlargement constructions to certain classes of classical codes. In addition, the book presents families of asymmetric quantum codes with good parameters and provides a detailed description of the procedures adopted to construct families of asymmetric quantum convolutional codes.Featuring accessible language and clear explanations, the book is suitable for use in advanced undergraduate and graduate courses as well as for self-guided study and reference. It provides an expert introduction to algebraic techniques of code construction and, because all of the constructions are performed algebraically, it enables the reader to construct families of codes, rather than only codes with specific parameters. The text offers an abundance of worked examples, exercises, and open-ended problems to motivate the reader to further investigate this rich area of inquiry. End-of-chapter summaries and a glossary of key terms allow for easy review and reference.
This book presents revised selected papers from the 17th International Forum on Digital TV and Wireless Multimedia Communication, IFTC 2020, held in Shanghai, China, in December 2020.The 21 full papers and 16 short papers presented in this volume were carefully reviewed and selected from 120 submissions. They were organized in topical sections on image processing; machine learning; quality assessment; telecommunications; video surveillance; and virtual reality.
This book constitutes selected and revised papers of the 5th International Conference on Space Information Networks, SINC 2020, held in Shenzhen, China, in December 2020.The 11 full and 2 short papers presented in this volume were carefully reviewed and selected from 104 submissions. The papers present the latest research in the fields of space information networks.
This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.
This book constitutes thoroughly reviewed, revised and selected papers from the 6th International Conference on Human Centered Computing, HCC 2020, held in virtually, due to COVID- 19, in December 2020. The 28 full and 20 short papers presented in this volume were carefully reviewed and selected from a total of 133 submissions.The conference focuses on the following three main themes as follows: Data such as Data Visualization, Big Data, Data Security, Hyper connectivity such as Internet of Things, Cloud Computing, Mobile Network and Collaboration such as Collective Intelligence, Peer Production, Context Awareness and much more.
This volume constitutes the refereed and revised post-conference proceedings of the 4th IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2019, in Kyiv, Ukraine, in October 2019. The 17 full papers and 2 short papers presented were carefully reviewed and selected from 53 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, and disaster risk assessment and management.
This two-volume set LNICST 357-358 constitutes the post-conference proceedings of the 11th EAI International Conference on Wireless and Satellite Services, WiSATS 2020, held in Nanjing, China, in September 2020. The 91 full papers and workshop papers were carefully reviewed and selected from 200 submissions. Part I - LNICST 357 - details original research and results of wireless and satellite technology for a smarter global communication architecture. The theme of WISATS 2020 is "Intelligent Wireless and Satellite Communications for Beyond 5G". Part II - LNICST 358 - presents 6 workshop papers: High Speed Space Communication and Space Information Networks (HSSCSIN); Integrated Space and Onboard Networks (ISON); Intelligent Satellite Operations, Managements, and Applications (ISOMA); Intelligent Satellites in Future Space Networked System (ISFSNS); Satellite Communications, Networking and Applications (SCNA); Satellite Internet of Things; Trusted Data Sharing, Secure Communication (SIOTTDSSC).
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.
This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2020, held in Rennes, France in July 2020. Due to the COVID-19, the workshop was held online. The 12 revised full papers and 3 invited talks presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on invited talks, Finite Field Arithmetic, Coding Theory, Network Security and much more.
This book constitutes the post-conference proceedings of the Second EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2020, held in December 2020. Due to COVID-19 pandemic the conference was held virtually.The 52 full papers were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on Deep Learning/Machine Learning on Information and Signal Processing; AI in Ubiquitous Mobile Wireless Communications; AI in UAV-assisted wireless communications; Smart Education: Educational Change in the age of artificial Intelligence; AI in SAR/ISAR Target Detection; Recent advances in AI and their applications in future electronic and information field.
This book constitutes the refereed proceedings of the 23rd International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2020, held in Nagoya, Japan, in November 2020. The 19 full papers presented and 13 short papers were carefully reviewed and selected from 50 submissions.Due to COVID-19, the conference was held online. The conference covers a wide range of ranging from foundations of agent theory and engineering aspects of agent systems, to emerging interdisciplinary areas of agent-based research.
The two-volume set LNCS 12615 + 12616 constitutes the refereed proceedings of the 12th International Conference on Intelligent Human Computer Interaction, IHCI 2020, which took place in Daegu, South Korea, during November 24-26, 2020.The 75 full and 18 short papers included in these proceedings were carefully reviewed and selected from a total of 185 submissions. The papers were organized in topical sections named: cognitive modeling and systems; biomedical signal processing and complex problem solving; natural language, speech, voice and study; algorithms and related applications; crowd sourcing and information analysis; intelligent usability and test system; assistive living; image processing and deep learning; and human-centered AI applications.
This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2020, held in Lugano, Switzerland, in April 2020. Due to COVID-19, the workshop was held online. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. The workshop covers subjects from wide ranges such as secure design, side channel attacks and countermeasures, and architectures and protocols.
This book constitutes selected papers from the 23rd International Conference on Information Security and Cryptology, ICISC 2020, held in Seoul, South Korea, in December 2020. Due to the COVID-19, the confere was held online.The total of 15 papers presented in this volume were carefully reviewed and selected from 51 submissions. The aim of this conference was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptology.
This volume constitutes the proceedings of the 19th International Workshop on Digital Forensics and Watermarking, IWDW 2020, held in Melbourne, VIC, Australia, in November 2020.The 20 full papers in this volume were carefully reviewed and selected from 43 submissions. They cover topics such as: novel research, development and application of digital watermarking and forensics techniques for multimedia security.
This book constitutes the refereed post-conference proceedings of the 6st International Conference on IoT as a Service, IoTaaS 2020, which took place in Xi'an, China, in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 69 revised full papers were carefully reviewed and selected from 136 submissions. The papers present two technical tracks and three workshops: The Second Workshop on Edge Intelligence and Computing for Iot Communications and Applications, the Workshop on Satellite Communication Networks for Internet of Things, the Workshop on Satellite Communications
This book constitutes the refereed post-conference proceedings of the 11th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2020, which took place in Qingdao, China, in December 2020. The 13 full papers presented were carefully reviewed and selected from 32 submissions. The papers are thematically grouped as a session on wireless network and security and a session on communication quality.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020.The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more.
This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 46 full papers and 1 short paper were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on internet of things, industry 4.0 and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication; governance, social media, mobile and web, data privacy, data policy and fake news.
This book constitutes the proceedings of the Third International Conference on 6G for Future Wireless Networks, 6GN 2020, held in Tianjin, China, in August 2020. The conference was held virtually due to the COVID-19 pandemic. The 45 full papers were selected from 109 submissions and present the state of the art and practical applications of 6G technologies. The papers are arranged thematically on network scheduling and optimization; wireless system and platform; intelligent applications; network performance evaluation; cyber security and privacy; technologies for private 5G/6G.
This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lubeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.
This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Multi-Agent-Based Simulation, MABS 2020, held in Auckland, New Zealand, in May 2020 collocated with 19th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2020). Due to COVID-19 the workshop has been held online. The 9 revised full papers included in this volume were carefully selected from 11 submissions. The workshop focused on finding efficient solutions to model complex social systems, in such areas as economics, management, organizational and social sciences in general and much more.
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography. |
You may like...
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst
Hardcover
Tamam Shud - How the Somerton Man's Last…
Mohammad H. Tamdgidi
Hardcover
R1,123
Discovery Miles 11 230
New Research on the Voynich Manuscript…
National Security Agency
Hardcover
R539
Discovery Miles 5 390
|