![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This book constitutes the revised and extended papers of the First International Conference on Innovations in Digital Economy, SPBU IDE 2019, held in St. Petersburg, Russia, in October 2019. The 8 papers presented were thoroughly reviewed and selected for publication from 78 submissions. The papers are organized according the following topical sections: economic efficiency and social consequences of digital innovations implementation; industrial, service and agricultural digitalization; regional innovation systems and clusters as drivers of the economic growth during the Fourth Industrial Revolution; response of an educational system and labor market to the digital-driven changes in the economic system.
This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020. The 31 papers presented in this volume were carefully reviewed and selected from 65 submissions. They stem from the following workshops: AIBlock 2020: Second International Workshop on Application Intelligence and Blockchain Security AIHWS 2020: First International Workshop on Artificial Intelligence in Hardware Security AIoTS 2020: Second International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2020: Second International Workshop on Cloud Security and Privacy SCI 2020: First International Workshop on Secure Cryptographic Implementation SecMT 2020: First International Workshop on Security in Mobile Technologies SiMLA 2020: Second International Workshop on Security in Machine Learning and its Applications
This book constitutes the refereed proceedings of the 19th International Conference on Ad-Hoc, Mobile, and Wireless Networks, ADHOC-NOW 2020, held in Bari, Italy, in October 2020.*The 19 full and 4 short papers presented were carefully reviewed and selected from 39 submissions. The papers provide an in-depth and stimulating view on the new frontiers in the field of mobile, ad hoc and wireless computing. They are organized in the following topical sections: intelligent, programmable and delay- and disruption- tolerant networks; internet of drones and smart mobility; internet of things and internet of medical things; secure communication protocols and architectures; and wireless systems. *The conference was held virtually due to the COVID-19 pandemic.
This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security.
This book constitutes the proceedings of the 5th International Conference on Electronic Voting, E-Vote-ID 2020, held online -due to COVID -19- in Bregenz, Austria, in October 2020. The 14 full papers presented were carefully reviewed and selected from 55 submissions.The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social or political aspects, amongst others; turning out to be an important global referent in relation to this issue.
Intelligence results from the interaction of the brain, body and environment. The question addressed in this book is, can we measure the contribution of the body and its' interaction with the environment? To answer this, we first present a comprehensive overview of the various ways in which a body reduces the amount of computation that the brain has to perform to solve a task. This chapter will broaden your understanding of how important inconspicuously appearing physical processes and physical properties of the body are with respect to our cognitive abilities. This form of contribution to intelligence is called Morphological Intelligence. The main contribution of this book to the field is a detailed discussion of how Morphological Intelligence can be measured from observations alone. The required mathematical framework is provided so that readers unfamiliar with information theory will be able to understand and apply the measures. Case studies from biomechanics and soft robotics illustrate how the presented quantifications can, for example, be used to measure the contribution of muscle physics to jumping and optimise the shape of a soft robotic hand. To summarise, this monograph presents various examples of how the physical properties of the body and the body's interaction with the environment contribute to intelligence. Furthermore, it treats theoretical and practical aspects of Morphological Intelligence and demonstrates the value in two case studies.
This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2020, held in Bratislava, Slovakia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 11 full and 4 short papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: blockchain, cloud security/hardware; economics/privacy; human aspects; privacy; privacy and machine learning; trust.
This volume constitutes the refereed proceedings of the three workshops held at the 31st International Conference on Database and Expert Systems Applications, DEXA 2020, held in September 2020: The 11th International Workshop on Biological Knowledge Discovery from Data, BIOKDD 2020, the 4th International Workshop on Cyber-Security and Functional Safety in Cyber-Physical Systems, IWCFS 2020, the 2nd International Workshop on Machine Learning and Knowledge Graphs, MLKgraphs2019. Due to the COVID-19 pandemic the conference and workshops were held virtually. The 10 papers were thoroughly reviewed and selected from 15 submissions, and discuss a range of topics including: knowledge discovery, biological data, cyber security, cyber-physical system, machine learning, knowledge graphs, information retriever, data base, and artificial intelligence.
This book constitutes the 14th edition of the annual Multi-Agent Programming Contest, MAPC 2019, and presents its participants.The 2019 scenario and all its changes from previous competitions are described in the first contribution, together with a brief description and analysis of the five participating teams and a closer look at the matches. It is followed by a contribution from each team, introducing their methods and tools used to create their agent team and analyzing their performance and the contest.
This volume constitutes the proceedings of the 17th International Conference on Services Computing 2020, held as Part of SCF 2020 in Honolulu, HI, USA in September 2020.. The 8 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 20 submissions. They cover topics such as: foundations of services computing; scientific workflows; business process integration and management; microservices; modeling of services systems; service security and privacy; SOA service applications; and service lifecycle management.
This book constitutes the proceedings of the Third International Conference on Blockchain, ICBC 2020, held as part of SCF 2020, during September 18-20, 2020. The conference was planned to take place in Honolulu, HI, USA and was changed to a virtual format due to the COVID-19 pandemic. The 14 full paper and 1 short paper presented were carefully reviewed and selected from 26 submissions. They deal with all topics regarding blockchain technologies, platforms, solutions and business models, including new blockchain architecture, platform constructions, blockchain development and blockchain services technologies as well as standards, and blockchain services innovation lifecycle including enterprise modeling, business consulting, solution creation, services orchestration, services optimization, services management, services marketing, business process integration and management.
This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located with the 25th European Symposium on Research in Computer Security, ESORICS 2020. The conference was planned to take place in Guildford, UK, but had to be moved to an online format due to the COVID-19 pandemic. The workshop took place during September 17-18, 2020. The 8 papers presented in this volume were carefully reviewed and selected from 20 submissions. They were organized in topical sections on security properties and attacks; confidentiality schema and security processes.
This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.The 33 papers presented in this volume were carefully reviewed and selected from 87 submissions. They are organized in topical sections on blockchain; multiparty computation; oblivious RAM; primitives and constructions; signatures, encryption, and algebraic constructions; symmetric crypto; theory and lower bounds ; zero-knowledge. *The conference was held virtually due to the COVID-19 pandemic.
This book constitutes the proceedings of the 23rd International Conference on Text, Speech, and Dialogue, TSD 2020, held in Brno, Czech Republic, in September 2020.* The 54 full papers presented in this volume were carefully reviewed and selected from 110 submissions. They were organized in topical sections named text, speech, and dialogue. The book also contains 3 invited talks. * The conference was held virtually due to the COVID-19 pandemic.
The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020. Due to COVID-19 pandemic the conference was organized in an online event. Computational Science is the main pillar of most of the present research, industrial and commercial applications, and plays a unique role in exploiting ICT innovative technologies. The 466 full papers and 32 short papers presented were carefully reviewed and selected from 1450 submissions. Apart from the general track, ICCSA 2020 also include 52 workshops, in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as software engineering, security, machine learning and artificial intelligence, blockchain technologies, and of applications in many fields.
This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.
Utilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to improve performance. Learn by example with source code in C# and .NET, and come away with an understanding of public key encryption systems and challenging cryptography mechanisms such as lattice-based cryptography. Modern cryptography is the lifeboat of a secure infrastructure. From global economies and governments, to meeting everyday consumer needs, cryptography is ubiquitous, and used in search, design, data, artificial intelligence, and other fields of information technology and communications. Its complexity can lead to misconfiguration, misuse, and misconceptions. For developers who are involved in designing and implementing cryptographic operations in their applications, understanding the implications of the algorithms, modes, and other parameters is vital. Pro Cryptography and Cryptanalysis is for the reader who has a professional need or personal interest in developing cryptography algorithms and security schemes using C# and .NET. You will learn how to implement advanced cryptographic algorithms (such as Elliptic Curve Cryptography Algorithms, Lattice-based Cryptography, Searchable Encryption, Homomorphic Encryption), and come away with a solid understanding of the internal cryptographic mechanisms, and common ways in which the algorithms are correctly implemented in real practice. With the new era of quantum computing, this book serves as a stepping stone to quantum cryptography, finding useful connections between current cryptographic concepts and quantum related topics. What You Will Learn Know when to enlist cryptography, and how it is often misunderstood and misused Explore modern cryptography algorithms, practices, and properties Design and implement usable, advanced cryptographic methods and mechanisms Understand how new features in C# and .NET impact the future of cryptographic algorithms Use the cryptographic model, services, and System.Security.Cryptography namespace in .NET Modernize your cryptanalyst mindset by exploiting the performance of C# and .NET with its weak cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures Discover how most algorithms can be broken Who This Book Is For Information security experts, cryptologists, software engineers, developers, data scientists, and academia who have experience with C#, .NET, as well as IDEs such as Visual Studio, VS Code, or Mono. Because this book is for an intermediate to advanced audience, readers should also possess an understanding of cryptography (symmetric and asymmetric) concepts.
The two-volume set IFIP AICT 566 and 567 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2019, held in Austin, TX, USA. The 161 revised full papers presented were carefully reviewed and selected from 184 submissions. They discuss globally pressing issues in smart manufacturing, operations management, supply chain management, and Industry 4.0. The papers are organized in the following topical sections: lean production; production management in food supply chains; sustainability and reconfigurability of manufacturing systems; product and asset life cycle management in smart factories of industry 4.0; variety and complexity management in the era of industry 4.0; participatory methods for supporting the career choices in industrial engineering and management education; blockchain in supply chain management; designing and delivering smart services in the digital age; operations management in engineer-to-order manufacturing; the operator 4.0 and the Internet of Things, services and people; intelligent diagnostics and maintenance solutions for smart manufacturing; smart supply networks; production management theory and methodology; data-driven production management; industry 4.0 implementations; smart factory and IIOT; cyber-physical systems; knowledge management in design and manufacturing; collaborative product development; ICT for collaborative manufacturing; collaborative technoloy; applications of machine learning in production management; and collaborative technology.
The two-volume set IFIP AICT 566 and 567 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2019, held in Austin, TX, USA. The 161 revised full papers presented were carefully reviewed and selected from 184 submissions. They discuss globally pressing issues in smart manufacturing, operations management, supply chain management, and Industry 4.0. The papers are organized in the following topical sections: lean production; production management in food supply chains; sustainability and reconfigurability of manufacturing systems; product and asset life cycle management in smart factories of industry 4.0; variety and complexity management in the era of industry 4.0; participatory methods for supporting the career choices in industrial engineering and management education; blockchain in supply chain management; designing and delivering smart services in the digital age; operations management in engineer-to-order manufacturing; the operator 4.0 and the Internet of Things, services and people; intelligent diagnostics and maintenance solutions for smart manufacturing; smart supply networks; production management theory and methodology; data-driven production management; industry 4.0 implementations; smart factory and IIOT; cyber-physical systems; knowledge management in design and manufacturing; collaborative product development; ICT for collaborative manufacturing; collaborative technoloy; applications of machine learning in production management; and collaborative technology.
Chapter "A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2020, held in Lisbon, Portugal, in September 2020.* The 27 full and 2 short papers included in this volume were carefully reviewed and selected from 116 submissions. They were organized in topical sections named: safety cases and argumentation; formal verification and analysis; security modelling and methods; assurance of learning-enabled systems; practical experience and tools; threat analysis and risk mitigation; cyber-physical systems security; and fault injection and fault tolerance. *The conference was held virtually due to the COVID-19 pandemic. The chapter 'Assurance Argument Elements for Off-the-Shelf, Complex Computational Hardware' is available open access under an Open Government License 3.0 via link.springer.com.
This book constitutes the refereed conference proceedings of the 8th Annual Privacy Forum, APF 2020, held in Lisbon, Portugal, in October 2020. The 12 revised full papers were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on impact assessment; privacy by design; data protection and security; and transparency.
This book constitutes the refereed proceedings of the 5th International Symposium on Ubiquitous Networking, UNet 2019, held in Limoges, France, in November 2019.The 17 revised full papers presented together with 1 short paper were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections: ubiquitous communication technologies and networking; ubiquitous Internet of things; pervasive services and applications.
This book constitutes the refereed proceedings of the 16th World Congress on Services, SERVICES 2020, held as part of the Services Conference Federation, SCF 2020, in Honolulu, HI, USA, in September 2020. The conference was held virtually due to the COVID-19 pandemic.The 5 full papers and 4 short papers presented were carefully reviewed and selected from 10 submissions. The papers cover topics in the field of software engineering foundations and applications with a focus on novel approaches for engineering requirements, design and architectures, testing, maintenance and evolution, model-driven development, software processes, metrics, quality assurance and new software economics models, search-based software engineering, benefiting day-to-day services sectors and derived through experiences, with appreciation to scale, pragmatism, transparency, compliance and/or dependability.
This book constitutes selected papers from the 20th International Conference on Transport Systems Telematics, TST 2020, held in Krakow, Poland, in October 2020. The 34 full papers presented in this volume were carefully reviewed and selected from 97 submissions. They were organized in topical sections named: telematics in road transport - general view; telematics in road transport - details in applications.- telematics in rail and marine transport; general about telematics. |
You may like...
The Story of Taxol - Nature and Politics…
Jordan Goodman, Vivien Walsh
Hardcover
Viral, Parasitic, Bacterial, and Fungal…
Debasis Bagchi, Amitava Das, …
Paperback
R3,433
Discovery Miles 34 330
|