![]() |
![]() |
Your cart is empty |
||
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.
This two-volume set of IFIP AICT 617 and 618 constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation" on Transfer and Diffusion of IT, TDIT 2020, held in Tiruchirappalli, India, in December 2020.The 86 revised full papers and 36 short papers presented were carefully reviewed and selected from 224 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts: Part I: artificial intelligence and autonomous systems; big data and analytics; blockchain; diffusion and adoption technology; emerging technologies in e-Governance; emerging technologies in consumer decision making and choice; fin-tech applications; healthcare information technology; and Internet of Things Part II: information technology and disaster management; adoption of mobile and platform-based applications; smart cities and digital government; social media; and diffusion of information technology and systems
This book shows how information theory, probability, statistics, mathematics and personal computers can be applied to the exploration of numbers and proportions in music. It brings the methods of scientific and quantitative thinking to questions like: What are the ways of encoding a message in music and how can we be sure of the correct decoding? How do claims of names hidden in the notes of a score stand up to scientific analysis? How many ways are there of obtaining proportions and are they due to chance? After thoroughly exploring the ways of encoding information in music, the ambiguities of numerical alphabets and the words to be found "hidden" in a score, the book presents a novel way of exploring the proportions in a composition with a purpose-built computer program and gives example results from the application of the techniques. These include information theory, combinatorics, probability, hypothesis testing, Monte Carlo simulation and Bayesian networks, presented in an easily understandable form including their development from ancient history through the life and times of J. S. Bach, making connections between science, philosophy, art, architecture, particle physics, calculating machines and artificial intelligence. For the practitioner the book points out the pitfalls of various psychological fallacies and biases and includes succinct points of guidance for anyone involved in this type of research. This book will be useful to anyone who intends to use a scientific approach to the humanities, particularly music, and will appeal to anyone who is interested in the intersection between the arts and science.With a foreword by Ruth Tatlow (Uppsala University), award winning author of Bach's Numbers: Compositional Proportion and Significance and Bach and the Riddle of the Number Alphabet."With this study Alan Shepherd opens a much-needed examination of the wide range of mathematical claims that have been made about J. S. Bach's music, offering both tools and methodological cautions with the potential to help clarify old problems." Daniel R. Melamed, Professor of Music in Musicology, Indiana University
This book is a timely document of state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this topic has recently received attention from governments, industries and academic communities due to the COVID-19 pandemic. This book provides a link between new proposals related to contact tracing applications and a contextual literature review primarily from the cryptologic viewpoint. As these applications are related to security and privacy of individuals, analyzing them from cryptologic viewpoint is of utmost importance. Therefore, present developments from cryptologic aspects of most proposals around the world, including Singapore, Europe, USA, Australia and India, have been discussed. Providing an in-depth study on the design rationale of each protocol, this book is of value to researchers, students and professionals alike.
This book constitutes the refereed proceedings of the 16th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2020, which was supposed to be held in Salford, UK, in June 2020, but was held virtually instead due to the COVID-19 pandemic. The 18 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: digital platforms and gig economy; education and health; inclusion and participation; and business innovation and data privacy.
This book describes a set of novel statistical algorithms designed to infer functional connectivity of large-scale neural assemblies. The algorithms are developed with the aim of maximizing computational accuracy and efficiency, while faithfully reconstructing both the inhibitory and excitatory functional links. The book reports on statistical methods to compute the most significant functional connectivity graph, and shows how to use graph theory to extract the topological features of the computed network. A particular feature is that the methods used and extended at the purpose of this work are reported in a fairly completed, yet concise manner, together with the necessary mathematical fundamentals and explanations to understand their application. Furthermore, all these methods have been embedded in the user-friendly open source software named SpiCoDyn, which is also introduced here. All in all, this book provides researchers and graduate students in bioengineering, neurophysiology and computer science, with a set of simplified and reduced models for studying functional connectivity in in silico biological neuronal networks, thus overcoming the complexity of brain circuits.
This eighteenth volume in the Poincare Seminar Series provides a thorough description of Information Theory and some of its most active areas, in particular, its relation to thermodynamics at the nanoscale and the Maxwell Demon, and the emergence of quantum computation and of its counterpart, quantum verification. It also includes two introductory tutorials, one on the fundamental relation between thermodynamics and information theory, and a primer on Shannon's entropy and information theory. The book offers a unique and manifold perspective on recent mathematical and physical developments in this field.
This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 29 full papers presented were carefully reviewed and selected from 149 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on channel attacks; connection security; human aspects of security and privacy; detecting malware and software weaknesses; system security; network security and privacy; access control and authentication; crypto currencies; privacy and security management; and machine learning and security.
The two-volume set IFIP AICT 591 and 592 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2020, held in Novi Sad, Serbia, in August/September 2020. The 164 papers presented were carefully reviewed and selected from 199 submissions. They discuss globally pressing issues in smart manufacturing, operations management, supply chain management, and Industry 4.0. The papers are organized in the following topical sections: Part I: advanced modelling, simulation and data analytics in production and supply networks; advanced, digital and smart manufacturing; digital and virtual quality management systems; cloud-manufacturing; cyber-physical production systems and digital twins; IIOT interoperability; supply chain planning and optimization; digital and smart supply chain management; intelligent logistics networks management; artificial intelligence and blockchain technologies in logistics and DSN; novel production planning and control approaches; machine learning and artificial intelligence; connected, smart factories of the future; manufacturing systems engineering: agile, flexible, reconfigurable; digital assistance systems: augmented reality and virtual reality; circular products design and engineering; circular, green, sustainable manufacturing; environmental and social lifecycle assessments; socio-cultural aspects in production systems; data-driven manufacturing and services operations management; product-service systems in DSN; and collaborative design and engineering Part II: the Operator 4.0: new physical and cognitive evolutionary paths; digital transformation approaches in production management; digital transformation for more sustainable supply chains; data-driven applications in smart manufacturing and logistics systems; data-driven services: characteristics, trends and applications; the future of lean thinking and practice; digital lean manufacturing and its emerging practices; new reconfigurable, flexible or agile production systems in the era of industry 4.0; operations management in engineer-to-order manufacturing; production management in food supply chains; gastronomic service system design; product and asset life cycle management in the circular economy; and production ramp-up strategies for product
The two-volume set IFIP AICT 591 and 592 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2020, held in Novi Sad, Serbia, in August/September 2020.The 164 papers presented were carefully reviewed and selected from 199 submissions. They discuss globally pressing issues in smart manufacturing, operations management, supply chain management, and Industry 4.0. The papers are organized in the following topical sections: Part I: advanced modelling, simulation and data analytics in production and supply networks; advanced, digital and smart manufacturing; digital and virtual quality management systems; cloud-manufacturing; cyber-physical production systems and digital twins; IIOT interoperability; supply chain planning and optimization; digital and smart supply chain management; intelligent logistics networks management; artificial intelligence and blockchain technologies in logistics and DSN; novel production planning and control approaches; machine learning and artificial intelligence; connected, smart factories of the future; manufacturing systems engineering: agile, flexible, reconfigurable; digital assistance systems: augmented reality and virtual reality; circular products design and engineering; circular, green, sustainable manufacturing; environmental and social lifecycle assessments; socio-cultural aspects in production systems; data-driven manufacturing and services operations management; product-service systems in DSN; and collaborative design and engineering Part II: the Operator 4.0: new physical and cognitive evolutionary paths; digital transformation approaches in production management; digital transformation for more sustainable supply chains; data-driven applications in smart manufacturing and logistics systems; data-driven services: characteristics, trends and applications; the future of lean thinking and practice; digital lean manufacturing and its emerging practices; new reconfigurable, flexible or agile production systems in the era of industry 4.0; operations management in engineer-to-order manufacturing; production management in food supply chains; gastronomic service system design; product and asset life cycle management in the circular economy; and production ramp-up strategies for product
This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic.
This book constitutes the refereed post-conference proceedings of the IFIP TC 3 Open Conference on Computers in Education, OCCE 2020, held in Mumbai, India, in January 2020. The 11 full papers and 4 short papers included in this volume were carefully reviewed and selected from 57 submissions. The papers discuss key emerging topics and evolving practices in the area of educational computing research. They are organized in the following topical sections: computing education; learners' and teachers' perspectives; teacher professional development; the industry perspective; and further aspects.
This book constitutes selected papers from the Second International Conference on Microelectronic Devices, Circuits and Systems, ICMDCS 2021, held in Vellore, India, in February 2021. The 32 full papers and 6 short papers presented were thoroughly reviewed and selected from 103 submissions. They are organized in the topical sections on digital design for signal, image and video processing; VLSI testing and verification; emerging technologies and IoT; nano-scale modelling and process technology device; analog and mixed signal design; communication technologies and circuits; technology and modelling for micro electronic devices; electronics for green technology.
The two volumes IFIP AICT 551 and 552 constitute the refereed proceedings of the 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, held in Dar es Salaam, Tanzania, in May 2019. The 97 revised full papers and 2 short papers presented were carefully reviewed and selected from 185 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: communities, ICT-enabled networks, and development; digital platforms for development; ICT for displaced population and refugees. How it helps? How it hurts?; ICT4D for the indigenous, by the indigenous and of the indigenous; local technical papers; pushing the boundaries - new research methods, theory and philosophy in ICT4D; southern-driven human-computer interaction; sustainable ICT, informatics, education and learning in a turbulent world - "doing the safari way".
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.
This book consists of refereed selected papers from the International Conference on Security & Privacy - ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.
This two-volume set constitutes the refereed post-conference proceedings of the 12th International Conference on Simulation Tools and Techniques, SIMUTools 2020, held in Guiyang, China, in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 125 revised full papers were carefully selected from 354 submissions. The papers focus on simulation methods, simulation techniques, simulation software, simulation performance, modeling formalisms, simulation verification and widely used frameworks.
This book constitutes the refereed proceedings of the 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, held in Costa de Caparica, Portugal, in July 2020. The 20 full papers and 24 short papers presented were carefully reviewed and selected from 91 submissions. The papers present selected results produced in engineering doctoral programs and focus on technological innovation for industry and service systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: collaborative networks; decisions systems; analysis and synthesis algorithms; communication systems; optimization systems; digital twins and smart manufacturing; power systems; energy control; power transportation; biomedical analysis and diagnosis; and instrumentation in health.
This volume constitutes the refereed and revised post-conference proceedings of the 4th IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2019, in Kyiv, Ukraine, in October 2019. The 17 full papers and 2 short papers presented were carefully reviewed and selected from 53 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, and disaster risk assessment and management.
If you're browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you're relying on cryptography. And you're probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It's important to understand these tools so you can make the best decisions about how, where, and why to use them. Real-World Cryptography teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications. about the technologyCryptography is the foundation of information security. This simultaneously ancient and emerging science is based on encryption and secure communication using algorithms that are hard to crack even for high-powered computer systems. Cryptography protects privacy, secures online activity, and defends confidential information, such as credit cards, from attackers and thieves. Without cryptographic techniques allowing for easy encrypting and decrypting of data, almost all IT infrastructure would be vulnerable. about the book Real-World Cryptography helps you understand the cryptographic techniques at work in common tools, frameworks, and protocols so you can make excellent security choices for your systems and applications. There's no unnecessary theory or jargon-just the most up-to-date techniques you'll need in your day-to-day work as a developer or systems administrator. Cryptography expert David Wong takes you hands-on with cryptography building blocks such as hash functions and key exchanges, then shows you how to use them as part of your security protocols and applications. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, password-authenticated key exchange, and post-quantum cryptography. Throughout, all techniques are fully illustrated with diagrams and real-world use cases so you can easily see how to put them into practice. what's inside Best practices for using cryptography Diagrams and explanations of cryptographic algorithms Identifying and fixing cryptography bad practices in applications Picking the right cryptographic tool to solve problems about the readerFor cryptography beginners with no previous experience in the field. about the author David Wong is a senior engineer working on Blockchain at Facebook. He is an active contributor to internet standards like Transport Layer Security and to the applied cryptography research community. David is a recognized authority in the field of applied cryptography; he's spoken at large security conferences like Black Hat and DEF CON and has delivered cryptography training sessions in the industry.
This book provides a comprehensive explanation of forward error correction, which is a vital part of communication systems. The book is written in such a way to make the subject easy and understandable for the reader. The book starts with a review of linear algebra to provide a basis for the text. The author then goes on to cover linear block codes, syndrome error correction, cyclic codes, Galois fields, BCH codes, Reed Solomon codes, and convolutional codes. Examples are provided throughout the text.
Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.
This two-volume set LNICST 357-358 constitutes the post-conference proceedings of the 11th EAI International Conference on Wireless and Satellite Services, WiSATS 2020, held in Nanjing, China, in September 2020. The 91 full papers and workshop papers were carefully reviewed and selected from 200 submissions. Part I - LNICST 357 - details original research and results of wireless and satellite technology for a smarter global communication architecture. The theme of WISATS 2020 is "Intelligent Wireless and Satellite Communications for Beyond 5G". Part II - LNICST 358 - presents 6 workshop papers: High Speed Space Communication and Space Information Networks (HSSCSIN); Integrated Space and Onboard Networks (ISON); Intelligent Satellite Operations, Managements, and Applications (ISOMA); Intelligent Satellites in Future Space Networked System (ISFSNS); Satellite Communications, Networking and Applications (SCNA); Satellite Internet of Things; Trusted Data Sharing, Secure Communication (SIOTTDSSC).
This book constitutes the post-conference proceedings of the Second EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2020, held in December 2020. Due to COVID-19 pandemic the conference was held virtually.The 52 full papers were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on Deep Learning/Machine Learning on Information and Signal Processing; AI in Ubiquitous Mobile Wireless Communications; AI in UAV-assisted wireless communications; Smart Education: Educational Change in the age of artificial Intelligence; AI in SAR/ISAR Target Detection; Recent advances in AI and their applications in future electronic and information field. |
![]() ![]() You may like...
Excel 2021 / Microsoft 365 Programming…
Julitta Korol
Paperback
Financial Modelling and Asset Valuation…
Morten Helbaek, Ragnar Lovaas, …
Paperback
R2,847
Discovery Miles 28 470
The Shelly Cashman Series (R) Microsoft…
Steven Freund, Joy Starks
Paperback
Statistics for Managers Using Microsoft…
David Levine, David Stephan, …
Paperback
R2,727
Discovery Miles 27 270
|