0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (100)
  • R500+ (1,923)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

VLSI-SoC: Technologies for Systems Integration - 17th IFIP WG 10.5/IEEE International Conference on Very Large Scale... VLSI-SoC: Technologies for Systems Integration - 17th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2009, Florianopolis, Brazil, October 12-15, 2009, Revised Selected Papers (Hardcover, 2011 Ed.)
Jurgen Becker, Marcelo De Oliveira Johann, Ricardo Reis
R1,476 Discovery Miles 14 760 Ships in 10 - 15 working days

This book contains extended and revised versions of the best papers presented at the 17th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2009, held in Florian polis, Brazil, in October 2009. The 8 papers included in the book together with two keynote talks were carefully reviewed and selected from 27 papers presented at the conference. The papers cover a wide variety of excellence in VLSI technology and advanced research addressing the current trend toward increasing chip integration and technology process advancements bringing about stimulating new challenges both at the physical and system-design levels, as well as in the test of theses systems.

Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2... Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers (Hardcover, 1st ed. 2022)
Michael Friedewald, Stephan Krenn, Ina Schiering, Stefan Schiffner
R2,500 Discovery Miles 25 000 Ships in 12 - 17 working days

This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August 2021.The 9 full papers included in this volume were carefully reviewed and selected from 23 submissions. Also included are 2 invited keynote papers and 3 tutorial/workshop summary papers. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.

Critical Infrastructure Protection II (Hardcover, 2008 ed.): Mauricio Papa, Sujeet Shenoi Critical Infrastructure Protection II (Hardcover, 2008 ed.)
Mauricio Papa, Sujeet Shenoi
R2,959 Discovery Miles 29 590 Ships in 10 - 15 working days

Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.

This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

Integrated Research in Steganography (Hardcover): Audrey Coon Integrated Research in Steganography (Hardcover)
Audrey Coon
R1,484 Discovery Miles 14 840 Ships in 12 - 17 working days
Hacking Connected Cars - Tactics, Techniques, and Procedures (Paperback): A. Knight Hacking Connected Cars - Tactics, Techniques, and Procedures (Paperback)
A. Knight
R841 Discovery Miles 8 410 Ships in 12 - 17 working days

A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars. Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle's systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity. Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability Conduct penetration testing using the same tactics, techniques, and procedures used by hackers From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars--all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.

Computing Security & Cryptography Handbook (Hardcover): Stephen Mason Computing Security & Cryptography Handbook (Hardcover)
Stephen Mason
R2,088 Discovery Miles 20 880 Ships in 12 - 17 working days
Allied and Axis Signals Intelligence in World War II (Hardcover, annotated edition): David Alvarez Allied and Axis Signals Intelligence in World War II (Hardcover, annotated edition)
David Alvarez
R4,308 Discovery Miles 43 080 Ships in 12 - 17 working days

In the 25 years since the revelation of the so-called 'Ultra secret', the importance of codebreaking and signals intelligence in the diplomacy and military operations of the Second World War has become increasingly evident. Studies of wartime signals intelligence, however, have largely focused on Great Britain and the United States and their successes against, respectively, the German Enigma and Japanese Purple cipher machines. Drawing upon newly available sources in Australia, Britain, China, France and the United States, the articles in this volume demonstrate that the codebreaking war was a truly global conflict in which many countries were active and successful. They discuss the work of Australian, Chinese, Finnish, French and Japanese codebreakers, shed new light on the work of their American and British counterparts, and describe the struggle to apply technology to the problems of radio intercept and cryptanalysis. The contributions also reveal that, for the Axis as well as the Allies, success in the signals war often depended upon close collaboration among alliance partners.

Allied and Axis Signals Intelligence in World War II (Paperback): David Alvarez Allied and Axis Signals Intelligence in World War II (Paperback)
David Alvarez
R1,831 Discovery Miles 18 310 Ships in 12 - 17 working days

In the 25 years since the revelation of the so-called 'Ultra secret', the importance of codebreaking and signals intelligence in the diplomacy and military operations of the Second World War has become increasingly evident. Studies of wartime signals intelligence, however, have largely focused on Great Britain and the United States and their successes against, respectively, the German Enigma and Japanese Purple cipher machines. Drawing upon newly available sources in Australia, Britain, China, France and the United States, the articles in this volume demonstrate that the codebreaking war was a truly global conflict in which many countries were active and successful. They discuss the work of Australian, Chinese, Finnish, French and Japanese codebreakers, shed new light on the work of their American and British counterparts, and describe the struggle to apply technology to the problems of radio intercept and cryptanalysis. The contributions also reveal that, for the Axis as well as the Allies, success in the signals war often depended upon close collaboration among alliance partners.

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,284 Discovery Miles 32 840 Ships in 12 - 17 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

"Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems.

Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."

Computer & Internet Security - A Hands-on Approach (Hardcover, 2nd ed.): Wenliang Du Computer & Internet Security - A Hands-on Approach (Hardcover, 2nd ed.)
Wenliang Du
R2,454 R1,846 Discovery Miles 18 460 Save R608 (25%) Ships in 12 - 17 working days
Co-creating for Context in the Transfer and Diffusion of IT - IFIP WG 8.6 International Working Conference on Transfer and... Co-creating for Context in the Transfer and Diffusion of IT - IFIP WG 8.6 International Working Conference on Transfer and Diffusion of IT, TDIT 2022, Maynooth, Ireland, June 15-16, 2022, Proceedings (Hardcover, 1st ed. 2022)
Amany Elbanna, Shane McLoughlin, Yogesh K. Dwivedi, Brian Donnellan, David Wastell
R2,842 Discovery Miles 28 420 Ships in 10 - 15 working days

This volume, IFIP AICT 660, constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Co-creating for Context in Prospective Transfer and Diffusion of IT" on Transfer and Diffusion of IT, TDIT 2022, held in Maynooth, Ireland, during June 15-16, 2022. The 19 full papers and 10 short papers presented were carefully reviewed and selected from 60 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts:

Cryptocurrency Trading & Investing - 2 manuscripts (Hardcover): Keizer Soeze Cryptocurrency Trading & Investing - 2 manuscripts (Hardcover)
Keizer Soeze
R943 R778 Discovery Miles 7 780 Save R165 (17%) Ships in 10 - 15 working days
Cryptocurrency Trading - Strategies & Techniques for successful Portfolio Management (Hardcover): Keizer Soeze Cryptocurrency Trading - Strategies & Techniques for successful Portfolio Management (Hardcover)
Keizer Soeze
R725 R605 Discovery Miles 6 050 Save R120 (17%) Ships in 10 - 15 working days
ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June... ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings (Hardcover, 1st ed. 2022)
Weizhi Meng, Simone Fischer-Hubner, Christian D. Jensen
R3,130 Discovery Miles 31 300 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.

Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback)
Jeff Stapleton
R1,133 Discovery Miles 11 330 Ships in 12 - 17 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks (Hardcover, 1st ed. 2022): Ikram Ali, Yong Chen, Mohammad... Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks (Hardcover, 1st ed. 2022)
Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li
R3,943 Discovery Miles 39 430 Ships in 12 - 17 working days

This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.

Cryptographic Engineering (Hardcover, 2009 ed.): Cetin Kaya Koc Cryptographic Engineering (Hardcover, 2009 ed.)
Cetin Kaya Koc
R6,531 Discovery Miles 65 310 Ships in 12 - 17 working days

Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry.

This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments. Students will have to have the knowledge of basic cryptographic algorithms before taking this course which will teach them how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems.

Additionally, engineers working in the industry will be interested in this book to learn how to design cryptographic chips and embedded software. Engineers working on the design of cellular phones, mobile computing and sensor systems, web and enterprise security systems which rely upon cryptographic hardware and software will be interested in this book. Essential and advanced design techniques for cryptography will be covered by this book."

Understanding Blockchain and Cryptocurrencies - A Primer for Implementing and Developing Blockchain Projects (Paperback): Akira... Understanding Blockchain and Cryptocurrencies - A Primer for Implementing and Developing Blockchain Projects (Paperback)
Akira Summers
R1,412 Discovery Miles 14 120 Ships in 12 - 17 working days

Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need. You have probably noticed that blockchains are growing in popularity. Governments are investigating Digital Currencies, supply chains are adopting Digital Ledgers, games makers and artists are developing NFTs (Non-Fungible Tokens), and new use-cases are emerging regularly. With such growth, many people will find themselves needing to understand how these technologies work. There will be new project teams, with technical leads managing blockchain projects and developers creating distributed applications. This book is great for them as it explains the concepts on which blockchain technologies are based, in simple terms. We will discuss and explain topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms encryption, vulnerabilities, and much more. The structures and principles described will be relevant for developers and managers alike, and will be demonstrated through relevant examples throughout the text. If you are looking to understand this exciting new technology, this is the book for you.

Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos,... Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings (Hardcover, 1st ed. 2020)
Nathan Clarke, Steven Furnell
R1,524 Discovery Miles 15 240 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic.

Information Technology in Disaster Risk Reduction - 6th IFIP WG 5.15 International Conference, ITDRR 2021, Morioka, Japan,... Information Technology in Disaster Risk Reduction - 6th IFIP WG 5.15 International Conference, ITDRR 2021, Morioka, Japan, October 25-27, 2021, Revised Selected Papers (Hardcover, 1st ed. 2022)
Jun Sasaki, Yuko Murayama, Dimiter Velev, Plamena Zlateva
R2,496 Discovery Miles 24 960 Ships in 12 - 17 working days

This volume constitutes the refereed and revised post-conference proceedings of the 6th IFIP WG 5.15 International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2021, in Morioka, Japan, in October 2021. The 11 full papers presented were carefully reviewed and selected from 18 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The papers are categorized in the following topical subheadings: Information Analysis for Situation Awareness; Evacuation and Rescue; COVID-19 Issues; and IT Use for Risk and Disaster Management.

Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover): Deepak Kumar Sharma, Koyel... Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover)
Deepak Kumar Sharma, Koyel Datta Gupta, Rinky Dwivedi
R3,040 Discovery Miles 30 400 Ships in 12 - 17 working days

This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices. Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.

Interference Cancellation Using Space-Time Processing and Precoding Design (Hardcover, 2013 ed.): Feng Li Interference Cancellation Using Space-Time Processing and Precoding Design (Hardcover, 2013 ed.)
Feng Li
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

Interference Cancellation Using Space-Time Processing and Precoding Design introduces original design methods to achieve interference cancellation, low-complexity decoding and full diversity for a series of multi-user systems. In multi-user environments, co-channel interference will diminish the performance of wireless communications systems. In this book, we investigate how to design robust space-time codes and pre-coders to suppress the co-channel interference when multiple antennas are available. This book offers a valuable reference work for graduate students, academic researchers and engineers who are interested in interference cancellation in wireless communications. Rigorous performance analysis and various simulation illustrations are included for each design method. Dr. Feng Li is a scientific researcher at Cornell University.

Advanced Cybersecurity Technologies (Paperback): Ralph Moseley Advanced Cybersecurity Technologies (Paperback)
Ralph Moseley
R1,465 Discovery Miles 14 650 Ships in 12 - 17 working days

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.

Recent Trends in Blockchain for Information Systems Security and Privacy (Hardcover): Amit Kumar Tyagi, Ajith Abraham Recent Trends in Blockchain for Information Systems Security and Privacy (Hardcover)
Amit Kumar Tyagi, Ajith Abraham
R2,926 Discovery Miles 29 260 Ships in 12 - 17 working days

Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges for research and academic communities. The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry. The reader will be provided with the most up-to-date knowledge of blockchain in mainstream areas of security and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and p2p applications are increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book provides a detailed explanation of security and privacy with respect to blockchain for information systems, and will be an essential resource for students, researchers and scientists studying blockchain uses in information systems and those wanting to explore the current state of play.

Number Theory Meets Wireless Communications (Hardcover, 1st ed. 2020): Victor Beresnevich, Alister Burr, Bobak Nazer, Sanju... Number Theory Meets Wireless Communications (Hardcover, 1st ed. 2020)
Victor Beresnevich, Alister Burr, Bobak Nazer, Sanju Velani
R4,908 Discovery Miles 49 080 Ships in 12 - 17 working days

This volume explores the rich interplay between number theory and wireless communications, reviewing the surprisingly deep connections between these fields and presenting new research directions to inspire future research. The contributions of this volume stem from the Workshop on Interactions between Number Theory and Wireless Communication held at the University of York in 2016. The chapters, written by leading experts in their respective fields, provide direct overviews of highly exciting current research developments. The topics discussed include metric Diophantine approximation, geometry of numbers, homogeneous dynamics, algebraic lattices and codes, network and channel coding, and interference alignment. The book is edited by experts working in number theory and communication theory. It thus provides unique insight into key concepts, cutting-edge results, and modern techniques that play an essential role in contemporary research. Great effort has been made to present the material in a manner that is accessible to new researchers, including PhD students. The book will also be essential reading for established researchers working in number theory or wireless communications looking to broaden their outlook and contribute to this emerging interdisciplinary area.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Protecting Privacy through Homomorphic…
Kristin Lauter, Wei Dai, … Hardcover R2,977 Discovery Miles 29 770
Quantum Computing for High School…
Yuly Billig Hardcover R677 Discovery Miles 6 770
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,177 Discovery Miles 31 770
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940
Secure Quantum Network Coding Theory
Tao Shang, Jianwei Liu Hardcover R4,269 Discovery Miles 42 690
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R639 Discovery Miles 6 390
Introduction to Bitcoin
David Ricardo Hardcover R733 Discovery Miles 7 330
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R798 Discovery Miles 7 980

 

Partners