![]() |
![]() |
Your cart is empty |
||
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lubeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.
This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.
This book constitutes the refereed proceedings of the 8th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2019, held in Goa, India, in December 2019. The 12 full papers presented were carefully reviewed and selected from 34 submissions. They were organized according to the following topical sections: cyber security; security and artifcial intelligence; access control models; and social networks.
This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISSA 2019, held in Johannesburg, South Africa, in August 2019. The 12 revised full papers presented were carefully reviewed and selected from 35 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.
The 22 full papers and 12 shorts papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are covering the following topics: deep learning for multimedia security; digital forensics and anti-forensics; digital watermarking; information hiding; steganography and steganalysis; authentication and security.
This book constitutes the proceedings of the 8th International Conference on Big Data Analytics, BDA 2020, which took place during December 15-18, 2020, in Sonepat, India. The 11 full and 3 short papers included in this volume were carefully reviewed and selected from 48 submissions; the book also contains 4 invited and 3 tutorial papers. The contributions were organized in topical sections named as follows: data science systems; data science architectures; big data analytics in healthcare; information interchange of Web data resources; and business analytics.
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
This first volume of the three-volume set (CCIS 1193, CCIS 1194, and CCIS 1195) constitutes the refereed proceedings of the First International Conference on Applied Technologies, ICAT 2019, held in Quito, Ecuador, in December 2019. The 124 full papers were carefully reviewed and selected from 328 submissions. The papers are organized according to the following topics: technology trends; computing; intelligent systems; machine vision; security; communication; electronics; e-learning; e-government; e-participation.
This volume constitutes the refereed proceedings of the Second International Conference on Computational Intelligence, Security and Internet of Things, ICCISIoT 2019, held in Agartala, India, in December 2019. The 31 full papers and 6 short papers were carefully reviewed and selected from 153 submissions. The papers are organised according to the following topics: Computational Intelligence, Security, Internet of Things. Papers from the extended track are also presented in the volume.
This book constitutes the refereed post-conference proceedings of the Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy, DETIPS 2020; the First International Workshop on Dependability and Safety of Emerging Cloud and Fog Systems, DeSECSys 2020; Third International Workshop on Multimedia Privacy and Security, MPS 2020; and the Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2020; held in Guildford, UK, in September 2020, in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. A total of 42 papers was submitted. For the DETIPS Workshop 8 regular papers were selected for presentation. Topics of interest address various aspect of the core areas in relation to digital economy. For the DeSECSys Workshop 4 regular papers are included. The workshop had the objective of fostering collaboration and discussion among cyber-security researchers and practitioners to discuss the various facets and trade-o s of cyber security. In particular, applications, opportunities and possible shortcomings of novel security technologies and their integration in emerging application domains. For the MPS Workshop 4 regular papers are presented which cover topics related to the security and privacy of multimedia systems of Internet-based video conferencing systems (e.g., Zoom, Microsoft Teams, Google Meet), online chatrooms (e.g., Slack), as well as other services to support telework capabilities. For the SPOSE Workshop 3 full papers were accepted for publication. They reflect the discussion, exchange, and development of ideas and questions regarding the design and engineering of technical security and privacy mechanisms with particular reference to organizational contexts.
This book constitutes selected papers from the 20th International Conference on Transport Systems Telematics, TST 2020, held in Krakow, Poland, in October 2020. The 34 full papers presented in this volume were carefully reviewed and selected from 97 submissions. They were organized in topical sections named: telematics in road transport - general view; telematics in road transport - details in applications.- telematics in rail and marine transport; general about telematics.
This book constitutes the refereed proceedings of the Second CCF China Blockchain Conference, CBCC 2019, held in Chengdu, China, in October 2019. The 16 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers deal with research results and development activities in all aspects of blockchain science and technology.
This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019. The 22 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, network security, information hiding.
This book constitutes revised papers from the 12th International Conference on Large-Scale Scientific Computing, LSSC 2019, held in Sozopol, Bulgaria, in June 2019. The 70 papers presented in this volume were carefully reviewed and selected from 81 submissions. The book also contains two invited talks. The papers were organized in topical sections named as follows: control and optimization of dynamical systems; meshfree and particle methods; fractional diffusion problems: numerical methods, algorithms and applications; pore scale flow and transport simulation; tensors based algorithms and structures in optimization and applications; HPC and big data: algorithms and applications; large-scale models: numerical methods, parallel computations and applications; monte carlo algorithms: innovative applications in conjunctions with other methods; application of metaheuristics to large-scale problems; large scale machine learning: multiscale algorithms and performance guarantees; and contributed papers.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Smart Card Research and Advanced Applications, CARDIS 2019, held in Prague, Czech Republic, in November 2019. The 15 revised full papers presented in this book were carefully reviewed and selected from 31 submissions. The papers are organized in the following topical sections: system-on-a-chip security; post-quantum cryptography; side-channel analysis; microarchitectural attacks; cryptographic primitives; advances in side-channel analysis. CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.
This volume constitutes the proceedings of the 17th International Conference on Services Computing 2020, held as Part of SCF 2020 in Honolulu, HI, USA in September 2020.. The 8 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 20 submissions. They cover topics such as: foundations of services computing; scientific workflows; business process integration and management; microservices; modeling of services systems; service security and privacy; SOA service applications; and service lifecycle management.
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, WISA 2020, held in Jeju Island, South Korea, in August 2020. The 30 full research papers included in this book were carefully reviewed and selected from 89 submissions. They are organized in the following topical sections: AI Security and Intrusion Detection; Steganography and Malware; Application, System, and Hardware Security; Cryptography; Advances in Network Security and Attack Defense; and Cyber Security.
This volume constitutes the refereed proceedings of the Third International Conference on Computational Intelligence, Security and Internet of Things, ICCISIoT 2020, held in Agartala, India, in December 2020. Due to the COVID-19 pandemic the conference was held online. The 23 full papers and 4 short papers were carefully reviewed and selected from 113 submissions. The papers are organised according to the following topics: computational intelligence, security, and internet of things.
This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020.The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.
This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.The 33 papers presented in this volume were carefully reviewed and selected from 87 submissions. They are organized in topical sections on blockchain; multiparty computation; oblivious RAM; primitives and constructions; signatures, encryption, and algebraic constructions; symmetric crypto; theory and lower bounds ; zero-knowledge. *The conference was held virtually due to the COVID-19 pandemic.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2020, CT-RSA 2020, held in San Francisco, CA, USA, in February 2020. The 28 papers presented in this volume were carefully reviewed and selected from 95 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto-graphic protocols to primitives and their implementation security.
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS 2020, held in Vienna, Austria, in December 2020.*The 30 full papers were carefully reviewed and selected from 118 submissions. The papers focus on topics such as cybersecurity; credentials; elliptic curves; payment systems; privacy-enhancing tools; lightweight cryptography; and codes and lattices. *The conference was held virtually due to the COVID-19 pandemic.
What is commonly called the information age began with a double big bang. It was 1948 and the United States of America was continuing to invest heavily in high-tech research, the ?rst advantages of which had been reaped during the Second World War. In the Bell Telephone Laboratories, set up in New Jersey, to the south of New York, several teams were set up around brilliant researchers, manyofwhomhadbeentrainedatMIT(MassachusettsInstituteofTechnology). Thatyeartwoexceptionaldiscoveriesweremade, onetechnologicalandtheother theoretical, which were to mark the 20th century. For, a few months apart, and in the same institution John Bardeen, Walter Brattain and William Shockley invented the transistor while Claude Elwood Shannon established information and digital communications theory. This phenomenal coincidence saw the birth ofnear-twins: thesemi-conductorcomponentwhich, accordingtoits conduction state (on or o?), is able to materially represent binary information ("0" or "1") andtheShannon orbit (shortforbinaryunit), a unit that measuresinformation capacity. Today we can recognize the full importance of these two inventions that - abledthe tremendousexpansionofcomputing andtelecommunications, to name but these two. Since 1948, the meteoric progress of electronics, then of mic- electronics, has providedengineers and researchersin the world of telecommu- cations with a support for their innovations, in order to continually increase the performanceof their systems.
This book constitutes the proceedings of the 19th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2020, held in Linkoeping, Sweden, in August/September 2020, in conjunction with the IFIP WG 8.5 IFIP International Conference on Electronic Participation (ePart 2020) and the International Conference for E-Democracy and Open Government Conference (CeDEM 2020). The conference was held virtually due to the COVID-19 pandemic. The 30 full papers presented were carefully reviewed and selected from 118 submissions. The papers are clustered under the following topical sections: e-government foundations; e-government services and open government; open data: social and technical aspects; AI, data analytics, and automated decision making; and smart cities.
As cryptocurrencies and their underlying data structure, blockchains, become further intertwined in our daily lives, a full understanding of them is essential to anyone who wants to keep up and remain informed of the future of finance. There is no better learning method than a hands-on one, and Learn Blockchain by Building One offers just that. Develop your own blockchain using Python with step-by-step instructions from author Daniel van Flymen, an expert in the field. You will come away with a confident working knowledge of popular cryptocurrencies such as Bitcoin and Ethereum and which foundations make them work. Through helpful exercises and real-world examples, you will understand the core concepts of peer-to-peer networking, proof of work, hashing, encryption, and digital signatures. Learn Blockchain by Building One gives you timely, real-world lessons in blockchain and cryptocurrencies that you will need as our modern society becomes increasingly digitally sophisticated. The lasting implications of such technology, including the security of personal transactions and the role of government regulation, are not to be underestimated. Stay ahead of the curve and become a confident blockchain builder now! What You Will Learn Develop a fully-fledged blockchain in Python Obtain a ground-up understanding of of Proof of Work Grasp core cryptographic concepts, such as hashing, encryption, and digital signatures Understand how gossip protocols and peer-to-peer networking works by implementing a TCP client-server Realize the differences and trade-offs between popular blockchains such as Bitcoin and Ethereum Who This Book Is For This book is aimed at intermediate programmers in any area from finance to academia. Readers should be comfortable reading and writing basic Python. |
![]() ![]() You may like...
Object-Oriented Analysis and Design for…
Raul Sidnei Wazlawick
Paperback
R1,186
Discovery Miles 11 860
Head First Java, 3rd Edition - A…
Kathy Sierra, Bert Bates, …
Paperback
Applications Of C++ Programming…
Fritz Solms, Willi-Hans Steeb
Hardcover
R1,670
Discovery Miles 16 700
UML 2 Certification Guide - Fundamental…
Tim Weilkiens, Bernd Oestereich
Paperback
R1,335
Discovery Miles 13 350
Learn to Code Practice Book 2 Third…
Claire Lotriet, Adam Chase
Paperback
R504
Discovery Miles 5 040
|