Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.
This book provides an elementary introduction to Information Theory and Coding Theory - two related aspects of the problem of how to transmit information efficiently and accurately. The first part of the book focuses on Information Theory, covering uniquely decodable and instantaneous codes, Huffman coding, entropy, information channels, and Shannon's Fundamental Theorem. In the second part, on Coding Theory, linear algebra is used to construct examples of such codes, such as the Hamming, Hadamard, Golay and Reed-Muller codes.The book emphasises carefully explained proofs and worked examples; exercises (with solutions) are integrated into the text as part of the learning process. Only some basic probability theory and linear algebra, together with a little calculus (as covered in most first-year university syllabuses), is assumed, making it suitable for second- and third-year undergraduates in mathematics, electronics and computer science.
This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021.The 35 full papers presented were carefully revised and selected from 157 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.
The present book includes extended and revised versions of a set of selected papers presented at the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020, held as an online web-based event (due to the COVID-19 pandemic) in July 2020.ICETE 2020 is a joint conference aimed at bringing together researchers, engineers and practitioners interested in information and communication technologies, including data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, and wireless networks and mobile systems.The 10 full papers included in the volume were carefully selected from the 30 submissions accepted to participate in the conference.
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021.The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.
This book constitutes the refereed proceedings of the 20th International Conference on Cryptology and Network Security, CANS 2021, which was held during December 13-15, 2021. The conference was originally planned to take place in Vienna, Austria, and changed to an online event due to the COVID-19 pandemic.The 25 full and 3 short papers presented in these proceedings were carefully reviewed and selected from 85 submissions. They were organized in topical sections as follows: Encryption; signatures; cryptographic schemes and protocols; attacks and counter-measures; and attestation and verification.
This monograph offers a new foundation for information theory that is based on the notion of information-as-distinctions, being directly measured by logical entropy, and on the re-quantification as Shannon entropy, which is the fundamental concept for the theory of coding and communications. Information is based on distinctions, differences, distinguishability, and diversity. Information sets are defined that express the distinctions made by a partition, e.g., the inverse-image of a random variable so they represent the pre-probability notion of information. Then logical entropy is a probability measure on the information sets, the probability that on two independent trials, a distinction or "dit" of the partition will be obtained. The formula for logical entropy is a new derivation of an old formula that goes back to the early twentieth century and has been re-derived many times in different contexts. As a probability measure, all the compound notions of joint, conditional, and mutual logical entropy are immediate. The Shannon entropy (which is not defined as a measure in the sense of measure theory) and its compound notions are then derived from a non-linear dit-to-bit transform that re-quantifies the distinctions of a random variable in terms of bits-so the Shannon entropy is the average number of binary distinctions or bits necessary to make all the distinctions of the random variable. And, using a linearization method, all the set concepts in this logical information theory naturally extend to vector spaces in general-and to Hilbert spaces in particular-for quantum logical information theory which provides the natural measure of the distinctions made in quantum measurement. Relatively short but dense in content, this work can be a reference to researchers and graduate students doing investigations in information theory, maximum entropy methods in physics, engineering, and statistics, and to all those with a special interest in a new approach to quantum information theory.
This book constitutes the refereed proceedings of the 17th China Conference on Machine Translation, CCMT 2020, held in Xining, China, in October 2021. The 10 papers presented in this volume were carefully reviewed and selected from 25 submissions and focus on all aspects of machine translation, including preprocessing, neural machine translation models, hybrid model, evaluation method, and post-editing.
This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols.
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.The 47 revised full papers and 4 short papers together with 3 as Systematization of Knowledge (SoK) papers were carefully selected and reviewed from 223 submissions. The accepted papers were organized according to their topics in 12 sessions: Smart Contracts, Anonymity and Privacy in Cryptocurrencies, Secure Multi-Party Computation, System and Application Security, Zero-Knowledge Proofs, Blockchain Protocols, Payment Channels, Mining, Scaling Blockchains, Authentication and Usability, Measurement, and Cryptography.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.
This book constitutes refereed proceedings of the 9th Conference on Information and Communication Technologies of Ecuador, TICEC 2021, held at the Universidad Politecnica Salesiana (UPS) campus in November 2021. The conference was organized in hybrid mode. The 24 full papers were carefully reviewed and selected from 126 qualified submissions. The papers cover a great variety of topics, such as data mining, neural networks, cyberphysical systems, telemedicine, traffic simulation, geospatial information, human-machine interaction, cloud computing, and others. The contributions are divided into the following thematic blocks: Data Science, ICTs Applications, Industry 4.0, Technology and Environment, Biomedical Sensors and Wearables Systems.
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.The 47 revised full papers and 4 short papers together with 3 as Systematization of Knowledge (SoK) papers were carefully selected and reviewed from 223 submissions. The accepted papers were organized according to their topics in 12 sessions: Smart Contracts, Anonymity and Privacy in Cryptocurrencies, Secure Multi-Party Computation, System and Application Security, Zero-Knowledge Proofs, Blockchain Protocols, Payment Channels, Mining, Scaling Blockchains, Authentication and Usability, Measurement, and Cryptography.
This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2021, held in Lugano, Switzerland, in October 2021. The 14 full papers carefully reviewed and selected from 31 submissions are presented in this volume together with the 4 extended keynote abstracts. The workshop covers the following subjects: cryptography, side-channel analysis, cryptographic implementations, fault attacks, implementation attacks, post-quantum cryptography, hardware accelerators, etc.
This book constitutes the post-conference proceedings of the 17th International Conference on Information Security and Cryptology, Inscrypt 2021, in August 2021. Due the COVID-19, the conference was held onlineThe 28 full papers presented were carefully reviewed and selected from 81 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications.
The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021.The 71 full papers presented in this book were carefully reviewed and selected from 351 submissions. They were organized in topical sections as follows: Part I: network security; attacks; fuzzing; malware; user behavior and underground economy; blockchain; machine learning; automotive; anomaly detection; Part II: encryption; cryptography; privacy; differential privacy; zero knowledge; key exchange; multi-party computation.
The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.
This book constitutes the proceedings of the 7th International Conference on Cryptology and Information Security in Latin America, LATIN 2021, which was held in October 2021. The conference was originally planned to take place in Bogota, Colombia, but changed to a virtual event due to the COVID-19 pandemic. The 22 full papers included in this volume were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: quantum cryptography; post-quantum cryptography; asymmetric cryptanalysis; cryptanalysis and side-channel analysis; distributed cryptographic protocols; and multiparty computation.
This book constitutes the conference proceedings of the 10th International Conference on Network Games, Control and Optimization, NETGCOOP 2020, held in Cargese, Corsica, France, in September 2021*.The 12 full papers and 16 short papers were carefully reviewed and selected from 44 submissions. The papers are organized in the following topical sections: game theory and iterative algorithms applied to wireless communication; stochastic models for network performance analysis; game theory in mobile and wireless networks; scheduling and resource allocation problems in networks; advance in game theory; social network; electrical network. * The conference was postponed to 2021 due to the COVID-19 pandemic.
This textbook provides a unique lens through which the myriad of existing Privacy Enhancing Technologies (PETs) can be easily comprehended and appreciated. It answers key privacy-centered questions with clear and detailed explanations. Why is privacy important? How and why is your privacy being eroded and what risks can this pose for you? What are some tools for protecting your privacy in online environments? How can these tools be understood, compared, and evaluated? What steps can you take to gain more control over your personal data? This book addresses the above questions by focusing on three fundamental elements: It introduces a simple classification of PETs that allows their similarities and differences to be highlighted and analyzed; It describes several specific PETs in each class, including both foundational technologies and important recent additions to the field; It explains how to use this classification to determine which privacy goals are actually achievable in a given real-world environment. Once the goals are known, this allows the most appropriate PETs to be selected in order to add the desired privacy protection to the target environment. To illustrate, the book examines the use of PETs in conjunction with various security technologies, with the legal infrastructure, and with communication and computing technologies such as Software Defined Networking (SDN) and Machine Learning (ML). Designed as an introductory textbook on PETs, this book is essential reading for graduate-level students in computer science and related fields, prospective PETs researchers, privacy advocates, and anyone interested in technologies to protect privacy in online environments.
This book constitutes the refereed proceedings of four workshops held at the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held virtually, in March 2021.The workshops are as follows: CoDecFin: The Second Workshop on Coordination of Decentralized Finance DeFi 2021 : First Workshop on Decentralized Finance VOTING 2021: Sixth Workshop on Advances in Secure Electronic Voting WTSC 2021: Fifth Workshop on Trusted Smart Contracts
This book constitutes the proceedings of the 4th Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2021, held in Volgograd, Russia, in September 2021.The 39 full papers, 7 short papers, and 2 keynote papers presented were carefully reviewed and selected from 182 submissions. The papers are organized in the following topical sections: Artificial intelligence and deep learning technologies: knowledge discovery in patent and open sources; open science semantic technologies; IoT and computer vision in knowledge-based control; Cyber-physical systems and big data-driven control: pro-active modeling in intelligent decision making support; design creativity in CASE/CAI/CAD/PDM; intelligent technologies in urban design and computing; Intelligent technologies in social engineering: data science in social networks analysis and cyber security; educational creativity and game-based learning; intelligent assistive technologies: software design and application.
The ten-volume set LNCS 12949 - 12958 constitutes the proceedings of the 21st International Conference on Computational Science and Its Applications, ICCSA 2021, which was held in Cagliari, Italy, during September 13 - 16, 2021. The event was organized in a hybrid mode due to the Covid-19 pandemic.The 466 full and 18 short papers presented in these proceedings were carefully reviewed and selected from 1588 submissions. Part VI of the set includes the proceedings of the following workshops: International Workshop on Digital Transformation and Smart City (DIGISMART 2021); International Workshop on Econometrics and Multidimensional Evaluation in Urban Environment (EMEUE 2021); International Workshop on Transformational Urban Mobility: Challenges and Opportunities During and Post COVID Era (FURTHER2021); International Workshop on Geodesign in Decision Making: meta planning and collaborative design for sustainable and inclusive development (GDM 2021);11th International Workshop on Future Computing System Technologies and Applications (FiSTA 2021); International Workshop on Geographical Analysis, Urban Modeling, Spatial Statistics (GEOG-AND-MOD 2021).
The ten-volume set LNCS 12949 - 12958 constitutes the proceedings of the 21st International Conference on Computational Science and Its Applications, ICCSA 2021, which was held in Cagliari, Italy, during September 13 - 16, 2021. The event was organized in a hybrid mode due to the Covid-19 pandemic.The 466 full and 18 short papers presented in these books were carefully reviewed and selected from 1588 submissions. Part X of the set includes the proceedings of the following workshops: International Workshop on Smart and Sustainable Island Communities (SSIC 2021); International Workshop on Science, Technologies and Policies to Innovate Spatial Planning (STP4P 2021); International Workshop on Sustainable Urban Energy Systems (SUREN-SYS 2021); International Workshop on Ports of the future - smartness and sustainability (SmartPorts 2021); International Workshop on Smart Tourism (SmartTourism 2021); International Workshop on Space Syntax for Cities in Theory and Practice (Syntax_City 2021); International Workshop on Theoretical and Computational Chemistryand its Applications (TCCMA 2021); International Workshop on Urban Form Studies (UForm 2021); International Workshop on Urban Space Accessibility and Safety (USAS2021); International Workshop on Virtual and Augmented Reality and Ap-plcations (VRA 2021); International Workshop on Advanced and Computational Methods for Earth Science applications (WACM4ES 2021). |
You may like...
New Research on the Voynich Manuscript…
National Security Agency
Hardcover
R503
Discovery Miles 5 030
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, …
Hardcover
R2,473
Discovery Miles 24 730
|