0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (86)
  • R500+ (1,946)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Artificial Intelligence for Communications and Networks - Second EAI International Conference, AICON 2020, Virtual Event,... Artificial Intelligence for Communications and Networks - Second EAI International Conference, AICON 2020, Virtual Event, December 19-20, 2020, Proceedings (Paperback, 1st ed. 2021)
Shuo Shi, Liang Ye, Yu Zhang
R2,969 Discovery Miles 29 690 Ships in 10 - 15 working days

This book constitutes the post-conference proceedings of the Second EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2020, held in December 2020. Due to COVID-19 pandemic the conference was held virtually.The 52 full papers were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on Deep Learning/Machine Learning on Information and Signal Processing; AI in Ubiquitous Mobile Wireless Communications; AI in UAV-assisted wireless communications; Smart Education: Educational Change in the age of artificial Intelligence; AI in SAR/ISAR Target Detection; Recent advances in AI and their applications in future electronic and information field.

Building Decentralized Trust - Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers (Paperback,... Building Decentralized Trust - Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers (Paperback, 1st ed. 2021)
Victoria L. Lemieux, Chen Feng
R3,576 Discovery Miles 35 760 Ships in 10 - 15 working days

This volume brings together a multidisciplinary group of scholars from diverse fields including computer science, engineering, archival science, law, business, psychology, economics, medicine and more to discuss the trade-offs between different "layers" in designing the use of blockchain/Distributed Ledger Technology (DLT) for social trust, trust in data and records, and trust in systems. Blockchain technology has emerged as a solution to the problem of trust in data and records, as well as trust in social, political and economic institutions, due to its profound potential as a digital trust infrastructure. Blockchain is a DLT in which confirmed and validated sets of transactions are stored in blocks that are chained together to make tampering more difficult and render records immutable. This book is dedicated to exploring and disseminating the latest findings on the relationships between socio-political and economic data, record-keeping, and technical aspects of blockchain.

Street Coder (Paperback): Sedat Kapanoglu Street Coder (Paperback)
Sedat Kapanoglu
R1,289 Discovery Miles 12 890 Ships in 12 - 19 working days

Software development isn't an "ivory tower" exercise.Street coders get the job done by prioritizing tasks, making quick decisions, and knowing which rules to break. Street Coder: Rules to break and how to break themis a programmer's survival guide, full of tips, tricks, and hacks that will make you a more efficient programmer. This book's rebel mindset challenges status quo thinking and exposes the important skills you need on the job. You'll learnthe crucial importance of algorithms and data structures, turn programming chores into programming pleasures, and shatter dogmatic principles keeping you from your full potential. Every new coder starts out with a lot of theory; the "streetsmarts" come with experience. To be successful, you need to know how toput theory into action, understand why "best practices" are the best, and know when to go rogue and break the unbreakable rules.

Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide (Paperback, 4th ed. 2020): Walter Fischer Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide (Paperback, 4th ed. 2020)
Walter Fischer
R3,590 Discovery Miles 35 900 Ships in 10 - 15 working days

This practical guide offers all important digital television, sound radio, and multimedia standards such as MPEG, DVB, DVD, DAB, ATSC, T-DMB, DMB-T, DRM and ISDB-T. It provides an in-depth look at these subjects in terms of practical experience. In addition explains the basics of essential topics like analog television, digital modulation, COFDM or mathematical transformations between time and frequency domains. The fourth edition addresses many new developments and features of digital broadcasting. Especially it includes Ultra High Definition Television (UHDTV), 4K, HEVC / H.265 (High Efficiency Video Coding), DVB-T2 measurement techniques and practice, DOCSIS 3.1, DVB - S2X, and 3DTV, as well as VHF-FM radio, HDMI, terrestrial transmitters, and stations. In the center of the treatments are always measuring techniques and of measuring practice for each case consolidating the knowledge imparted with numerous practical examples. The book is directed primarily at the specialist working in the field, on transmitters and transmission equipment, network planning, studio technology, playout centers and multiplex center technology and in the development departments for entertainment electronics or TV test engineering. Since the entire field of electrical communications technology is traversed in a wide arc, those who are students in this field are not excluded either.

Advances in Cyber Security - Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected... Advances in Cyber Security - Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Mohammed Anbar, Nibras Abdullah, Selvakumar Manickam
R3,008 Discovery Miles 30 080 Ships in 10 - 15 working days

This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 46 full papers and 1 short paper were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on internet of things, industry 4.0 and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication; governance, social media, mobile and web, data privacy, data policy and fake news.

Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation - IFIP WG 8.6... Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation - IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2020, Tiruchirappalli, India, December 18-19, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Sujeet K. Sharma, Yogesh K. Dwivedi, Bhimaraya Metri, Nripendra P. Rana
R4,476 Discovery Miles 44 760 Ships in 10 - 15 working days

This two-volume set of IFIP AICT 617 and 618 constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation" on Transfer and Diffusion of IT, TDIT 2020, held in Tiruchirappalli, India, in December 2020.The 86 revised full papers and 36 short papers presented were carefully reviewed and selected from 224 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts: Part I: artificial intelligence and autonomous systems; big data and analytics; blockchain; diffusion and adoption technology; emerging technologies in e-Governance; emerging technologies in consumer decision making and choice; fin-tech applications; healthcare information technology; and Internet of Things Part II: diffusion of information technology and disaster management; adoption of mobile and platform-based applications; smart cities and digital government; social media; and diffusion of information technology and systems

IoT as a Service - 6th EAI International Conference, IoTaaS 2020, Xi'an, China, November 19-20, 2020, Proceedings... IoT as a Service - 6th EAI International Conference, IoTaaS 2020, Xi'an, China, November 19-20, 2020, Proceedings (Paperback, 1st ed. 2021)
Bo Li, Changle Li, Mao Yang, Zhongjiang Yan, Jie Zheng
R3,028 Discovery Miles 30 280 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 6st International Conference on IoT as a Service, IoTaaS 2020, which took place in Xi'an, China, in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 69 revised full papers were carefully reviewed and selected from 136 submissions. The papers present two technical tracks and three workshops: The Second Workshop on Edge Intelligence and Computing for Iot Communications and Applications, the Workshop on Satellite Communication Networks for Internet of Things, the Workshop on Satellite Communications

Advanced Hybrid Information Processing - 4th EAI International Conference, ADHIP 2020, Binzhou, China, September 26-27, 2020,... Advanced Hybrid Information Processing - 4th EAI International Conference, ADHIP 2020, Binzhou, China, September 26-27, 2020, Proceedings, Part I (Paperback, 1st ed. 2021)
Shuai Liu, Liyun Xia
R2,949 Discovery Miles 29 490 Ships in 10 - 15 working days

This two-volume set constitutes the post-conference proceedings of the 4th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2020, held in Binzhou, China, in September 2020. Due to COVID-19 the conference was held virtually. The 89 papers presented were selected from 190 submissions and focus on theory and application of hybrid information processing technology for smarter and more effective research and application. The theme of ADHIP 2020 was "Industrial applications of aspects with big data". The papers are named in topical sections as follows: Industrial application of multi-modal information processing; Industrialized big data processing; Industrial automation and intelligent control; Visual information processing.

Lattice Coding for Signals and Networks - A Structured Coding Approach to Quantization, Modulation and Multiuser Information... Lattice Coding for Signals and Networks - A Structured Coding Approach to Quantization, Modulation and Multiuser Information Theory (Hardcover)
Ram Zamir; Contributions by Bobak Nazer, Yuval Kochman; Illustrated by Ilai Bistritz
R4,787 Discovery Miles 47 870 Ships in 12 - 19 working days

Unifying information theory and digital communication through the language of lattice codes, this book provides a detailed overview for students, researchers and industry practitioners. It covers classical work by leading researchers in the field of lattice codes and complementary work on dithered quantization and infinite constellations, and then introduces the more recent results on 'algebraic binning' for side-information problems, and linear/lattice codes for networks. It shows how high dimensional lattice codes can close the gap to the optimal information theoretic solution, including the characterisation of error exponents. The solutions presented are based on lattice codes, and are therefore close to practical implementations, with many advanced setups and techniques, such as shaping, entropy-coding, side-information and multi-terminal systems. Moreover, some of the network setups shown demonstrate how lattice codes are potentially more efficient than traditional random-coding solutions, for instance when generalising the framework to Gaussian networks.

Forward Error Correction via Channel Coding (Paperback, 1st ed. 2020): Orhangazi Forward Error Correction via Channel Coding (Paperback, 1st ed. 2020)
Orhangazi
R2,884 Discovery Miles 28 840 Ships in 10 - 15 working days

This book provides a comprehensive explanation of forward error correction, which is a vital part of communication systems. The book is written in such a way to make the subject easy and understandable for the reader. The book starts with a review of linear algebra to provide a basis for the text. The author then goes on to cover linear block codes, syndrome error correction, cyclic codes, Galois fields, BCH codes, Reed Solomon codes, and convolutional codes. Examples are provided throughout the text.

Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA,... Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
R2,948 Discovery Miles 29 480 Ships in 10 - 15 working days

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

6GN for Future Wireless Networks - Third EAI International Conference, 6GN 2020, Tianjin, China, August 15-16, 2020,... 6GN for Future Wireless Networks - Third EAI International Conference, 6GN 2020, Tianjin, China, August 15-16, 2020, Proceedings (Paperback, 1st ed. 2020)
Xiaofei Wang, Victor C. M. Leung, Keqiu Li, Haijun Zhang, Xiping Hu, …
R3,445 Discovery Miles 34 450 Ships in 10 - 15 working days

This book constitutes the proceedings of the Third International Conference on 6G for Future Wireless Networks, 6GN 2020, held in Tianjin, China, in August 2020. The conference was held virtually due to the COVID-19 pandemic. The 45 full papers were selected from 109 submissions and present the state of the art and practical applications of 6G technologies. The papers are arranged thematically on network scheduling and optimization; wireless system and platform; intelligent applications; network performance evaluation; cyber security and privacy; technologies for private 5G/6G.

Digital Transformation for a Sustainable Society in the 21st Century - I3E 2019 IFIP WG 6.11 International Workshops,... Digital Transformation for a Sustainable Society in the 21st Century - I3E 2019 IFIP WG 6.11 International Workshops, Trondheim, Norway, September 18-20, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Ilias O. Pappas, Patrick Mikalef, Yogesh K. Dwivedi, Letizia Jaccheri, John Krogstie, …
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes papers from the workshops held at the 18th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2019, which took place in Trondheim, Norway, in September 2019. The 11 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 33 submissions to the following workshops: DTIS: Digital Transformation for an Inclusive Society TPSIE: Trust and Privacy Aspects of Smart Information Environments 3(IT): Innovative Teaching of Introductory Topics in Information Technology CROPS: CROwd-Powered e-Services

Metabiology - Non-standard Models, General Semantics and Natural Evolution (Paperback, 1st ed. 2020): Arturo Carsetti Metabiology - Non-standard Models, General Semantics and Natural Evolution (Paperback, 1st ed. 2020)
Arturo Carsetti
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

In the context of life sciences, we are constantly confronted with information that possesses precise semantic values and appears essentially immersed in a specific evolutionary trend. In such a framework, Nature appears, in Monod's words, as a tinkerer characterized by the presence of precise principles of self-organization. However, while Monod was obliged to incorporate his brilliant intuitions into the framework of first-order cybernetics and a theory of information with an exclusively syntactic character such as that defined by Shannon, research advances in recent decades have led not only to the definition of a second-order cybernetics but also to an exploration of the boundaries of semantic information. As H. Atlan states, on a biological level "the function self-organizes together with its meaning". Hence the need to refer to a conceptual theory of complexity and to a theory of self-organization characterized in an intentional sense. There is also a need to introduce, at the genetic level, a distinction between coder and ruler as well as the opportunity to define a real software space for natural evolution. The recourse to non-standard model theory, the opening to a new general semantics, and the innovative definition of the relationship between coder and ruler can be considered, today, among the most powerful theoretical tools at our disposal in order to correctly define the contours of that new conceptual revolution increasingly referred to as metabiology. This book focuses on identifying and investigating the role played by these particular theoretical tools in the development of this new scientific paradigm. Nature "speaks" by means of mathematical forms: we can observe these forms, but they are, at the same time, inside us as they populate our organs of cognition. In this context, the volume highlights how metabiology appears primarily to refer to the growth itself of our instruments of participatory knowledge of the world.

Discrete Mathematics with Cryptographic Applications - A Self-Teaching Introduction (Hardcover): Alexander I Kheyfits Discrete Mathematics with Cryptographic Applications - A Self-Teaching Introduction (Hardcover)
Alexander I Kheyfits
R2,010 R1,604 Discovery Miles 16 040 Save R406 (20%) Ships in 10 - 15 working days

This book covers the discrete mathematics as it has been established after its emergence since the middle of the last century and its elementary applications to cryptography. It can be used by any individual studying discrete mathematics, finite mathematics, and similar subjects. Any necessary prerequisites are explained and illustrated in the book. As a background of cryptography, the textbook gives an introduction into number theory, coding theory, information theory, that obviously have discrete nature. Designed in a "self-teaching" format, the book includes about 600 problems (with and without solutions) and numerous, practical examples of cryptography. FEATURES Designed in a "self-teaching" format, the book includes about 600 problems (with and without solutions) and numerous examples of cryptography Provides an introduction into number theory, game theory, coding theory, and information theory as background for the coverage of cryptography Covers cryptography topics such as CRT, affine ciphers, hashing functions, substitution ciphers, unbreakable ciphers, Discrete Logarithm Problem (DLP), and more

E-Government, E-Services and Global Processes - Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010,... E-Government, E-Services and Global Processes - Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, 2010 ed.)
Marijn Janssen, Winfried Lamersdorf, Jan Pries-Heje, Michael Rosemann
R1,544 Discovery Miles 15 440 Ships in 10 - 15 working days

This book contains the proceedings of two of the IFIP conferences that took place at the IFIP World Computer Congress 2010 in Brisbane, Australia. The proceedings of each conference are allocated separate parts in this book each with their own editors. E-Government and E-Services (EGES) page 3 Marijn Janssen / Winfried Lamersdorf Global Information Systems Processes (GISP) page 183 Jan Pries-Heje / Michael Rosemann Organization E-Government and E-Services (EGES 2010) EGES Co-chairs Marijn Janssen Delft, The Netherlands Winfried Lamersdorf Hamburg, Germany Lalit Sawhney Bangalore, India Leon Strous Helmond, The Netherlands EGES Reviewers Agarwal Ashok ACS Technologies Ltd., Bhoopal, India Mark Borman University of Sydney, Australia Erwin Fielt Queensland University of Technology, Brisbane, Australia Ernest Foo Queensland University of Technology, Brisbane, Australia M.P. Gupta Indian Institute of Technology Delhi, India Paul Henman The University of Queensland, Australia Ralf Klischewski German University, Cairo, Egypt Christine Leitner Donau-Universit. at Krems, Austria Miriam Lips Victoria University of Wellington, New Zealand Zoran Milosevic Deontic, Brisbane, Australia Oystein Sabo University of Agder, Norway Jochen Scholl University of Washington, Seattle, USA Leif Skiftenes University of Agder, Norway Weerakoddy Vishanth Brunel University Business School, West London, UK Dirk Werth DFKI, Saarbruc . . ken, Germany Maria Wimmer University Koblenz-Landau, Germany EGES Subreviewers Alexandra Chapko, Andreas Emrich and Marc Graessle German Research Center for Arti?cial Intelligence, Saarbruc .. ken, Germany Kristof Hamann, Kai Jander, Ante Vilenica and Sonja Zaplata University of Hamburg, Germany Global Information Systems Processes (GISP 2010) GISP Co-chairs Jan Pries-Heje Roskilde University, Denmark

Improving Image Quality in Visual Cryptography (Paperback, 1st ed. 2020): Bin Yan, Yong Xiang, Guang Hua Improving Image Quality in Visual Cryptography (Paperback, 1st ed. 2020)
Bin Yan, Yong Xiang, Guang Hua
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in the analysis-by-synthesis approach. This book distinguishes itself from the existing literature in three ways. First, it not only reviews traditional VC for binary secret images, but also covers recent efforts in improving visual quality for gray scale secret images. Second, not only traditional quality measures are reviewed, but also measures that were not used for measuring perceptual quality of decrypted secret images, such as Radially Averaged Power Spectrum Density (RAPSD) and residual variance, are employed for evaluating and guiding the design of VC algorithms. Third, unlike most VC books following a mathematical formal style, this book tries to make a balance between engineering intuition and mathematical reasoning. All the targeted problems and corresponding solutions are fully motivated by practical applications and evaluated by experimental tests, while important security issues are presented as mathematical proof. Furthermore, important algorithms are summarized as pseudocodes, thus enabling the readers to reproduce the results in the book. Therefore, this book serves as a tutorial for readers with an engineering background as well as for experts in related areas to understand the basics and research frontiers in visual cryptography.

Decoding Blockchain for Business - Understand the Tech and Prepare for the Blockchain Future (Paperback, 1st ed.): Stijn Van... Decoding Blockchain for Business - Understand the Tech and Prepare for the Blockchain Future (Paperback, 1st ed.)
Stijn Van Hijfte
R1,182 R989 Discovery Miles 9 890 Save R193 (16%) Ships in 10 - 15 working days

Business professionals looking to understand the impact, future, and limitations of blockchain need look no further. This revolutionary technology has impacted business and the economy in unprecedented ways within the past decade, and it is only continuing to grow. As a leader in your organization, it is vital that you decode blockchain and optimize all the ways in which it can improve your business. Author of Decoding Blockchain for Business, Stijn Van Hijfte, expertly emphasizes the imperative of professionals in any sector of industry to understand the core concepts and implications of blockchain technology. Cryptocurrencies, cryptotrading, and constantly-changing tax structures for financial systems using blockchain technologies are covered in detail. The lasting effects of blockchain across specific industries such as media, real estate, finance, and regulatory bodies are addressed with an insightful eye from Van Hijfte. If not properly implemented with care and a foundation of knowledge, blockchain brings risks and uncertainties to a company. Know your technology to be ready for the present and the future, and stay ahead of the curve. Blockchain is here to stay, and Decoding Blockchain for Business is your professional roadmap. What You Will Learn Discover the risks associated with blockchain if not properly implemented Gain insights on how blockchain technology affects other booming topics such as AI, IoT, and RPA Look at the regulations surrounding Blockchain in different countries Who This Book Is For Business professionals looking to understand the impact, future, and limitations of Blockchain and how individuals and companies should prepare for this technology.

Coding Strategies in Vertebrate Acoustic Communication (Paperback, 1st ed. 2020): Thierry Aubin, Nicolas Mathevon Coding Strategies in Vertebrate Acoustic Communication (Paperback, 1st ed. 2020)
Thierry Aubin, Nicolas Mathevon
R5,098 Discovery Miles 50 980 Ships in 10 - 15 working days

Information is a core concept in animal communication: individuals routinely produce, acquire, process and store information, which provides the basis for their social life. This book focuses on how animal acoustic signals code information and how this coding can be shaped by various environmental and social constraints. Taking birds and mammals, including humans, as models, the authors explore such topics as communication strategies for "public" and "private" signaling, static and dynamic signaling, the diversity of coded information and the way information is decoded by the receiver. The book appeals to a wide audience, ranging from bioacousticians, ethologists and ecologists to evolutionary biologists. Intended for students and researchers alike, it promotes the idea that Shannon and Weaver's Mathematical Theory of Communication still represents a strong framework for understanding all aspects of the communication process, including its dynamic dimensions.

Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications - 9th EAI International Conference, CloudComp 2019,... Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications - 9th EAI International Conference, CloudComp 2019, and 4th EAI International Conference, SmartGIFT 2019, Beijing, China, December 4-5, 2019, and December 21-22, 2019 (Paperback, 1st ed. 2020)
Xuyun Zhang, Guanfeng Liu, Meikang Qiu, Wei Xiang, Tao Huang
R3,000 Discovery Miles 30 000 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9thInternational Conference on Cloud Computing, CloudComp 2019, and the 4th International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2019, both held in Beijing, China, in December 2019. The55 full papers of both conferences were selected from 113 submissions. CloudComp 2019 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. The papers are grouped thematically in tracks on cloud architecture and scheduling; cloud-based data analytics; cloud applications; and cloud security and privacy. SmartGIFT 2019 focus on all aspects of smart grids and telecommunications, broadly understood as the renewable generation and distributed energy resources integration, computational intelligence applications, information and communication technologies.

Secure Quantum Network Coding Theory (Paperback, 1st ed. 2020): Tao Shang, Jianwei Liu Secure Quantum Network Coding Theory (Paperback, 1st ed. 2020)
Tao Shang, Jianwei Liu
R4,571 Discovery Miles 45 710 Ships in 10 - 15 working days

This is the first book on secure quantum network coding, which integrates quantum cryptography into quantum communication. It summarizes the main research findings on quantum network coding, while also systematically introducing readers to secure quantum network coding schemes. With regard to coding methods, coding models and coding security, the book subsequently provides a series of quantum network coding schemes based on the integration of quantum cryptography into quantum communication. Furthermore, it describes the general security analysis method for quantum cryptographic protocols. Accordingly, the book equips readers with effective tools for researching and applying quantum network coding.

Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part III (Paperback, 1st ed. 2020)
Shiho Moriai, Huaxiong Wang
R3,056 Discovery Miles 30 560 Ships in 10 - 15 working days

The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

Pro Cryptography and Cryptanalysis - Creating Advanced Algorithms with C# and .NET (Paperback, 1st ed.): Marius Iulian... Pro Cryptography and Cryptanalysis - Creating Advanced Algorithms with C# and .NET (Paperback, 1st ed.)
Marius Iulian Mihailescu, Stefania Loredana Nita
R2,264 Discovery Miles 22 640 Ships in 10 - 15 working days

Utilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to improve performance. Learn by example with source code in C# and .NET, and come away with an understanding of public key encryption systems and challenging cryptography mechanisms such as lattice-based cryptography. Modern cryptography is the lifeboat of a secure infrastructure. From global economies and governments, to meeting everyday consumer needs, cryptography is ubiquitous, and used in search, design, data, artificial intelligence, and other fields of information technology and communications. Its complexity can lead to misconfiguration, misuse, and misconceptions. For developers who are involved in designing and implementing cryptographic operations in their applications, understanding the implications of the algorithms, modes, and other parameters is vital. Pro Cryptography and Cryptanalysis is for the reader who has a professional need or personal interest in developing cryptography algorithms and security schemes using C# and .NET. You will learn how to implement advanced cryptographic algorithms (such as Elliptic Curve Cryptography Algorithms, Lattice-based Cryptography, Searchable Encryption, Homomorphic Encryption), and come away with a solid understanding of the internal cryptographic mechanisms, and common ways in which the algorithms are correctly implemented in real practice. With the new era of quantum computing, this book serves as a stepping stone to quantum cryptography, finding useful connections between current cryptographic concepts and quantum related topics. What You Will Learn Know when to enlist cryptography, and how it is often misunderstood and misused Explore modern cryptography algorithms, practices, and properties Design and implement usable, advanced cryptographic methods and mechanisms Understand how new features in C# and .NET impact the future of cryptographic algorithms Use the cryptographic model, services, and System.Security.Cryptography namespace in .NET Modernize your cryptanalyst mindset by exploiting the performance of C# and .NET with its weak cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures Discover how most algorithms can be broken Who This Book Is For Information security experts, cryptologists, software engineers, developers, data scientists, and academia who have experience with C#, .NET, as well as IDEs such as Visual Studio, VS Code, or Mono. Because this book is for an intermediate to advanced audience, readers should also possess an understanding of cryptography (symmetric and asymmetric) concepts.

Nuclear Scholars Initiative - A Collection of Papers from the 2014 Nuclear Scholars Initiative (Paperback): Sarah Minot Nuclear Scholars Initiative - A Collection of Papers from the 2014 Nuclear Scholars Initiative (Paperback)
Sarah Minot
R1,425 Discovery Miles 14 250 Ships in 12 - 19 working days

Addressing an increasingly complex array of nuclear weapons challenges in the future will require talented young people with the necessary technical and policy expertise to contribute to sound decisionmaking on nuclear issues over time. To that end, the CSIS Project on Nuclear Issues (PONI) runs a yearly Nuclear Scholars Initiative for graduate students and young professionals. Those accepted into the program are hosted once per month at CSIS in Washington, DC, where they participate in daylong workshops with senior government officials and policy experts. Over the course of the six-month program, scholars are required to prepare a research paper. This volume is a collection of the 2014 papers from the Nuclear Scholars Initiative.

Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Shiho Moriai, Huaxiong Wang
R3,063 Discovery Miles 30 630 Ships in 10 - 15 working days

The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Electrical Age [microform]; v.16
Anonymous Hardcover R1,040 Discovery Miles 10 400
International Library of Technology: A…
International Textbook Company Hardcover R872 R808 Discovery Miles 8 080
Historical Sketch of the Electric…
Alexander Jones Paperback R488 Discovery Miles 4 880
Electrical Age [microform]; v.49
Anonymous Hardcover R935 Discovery Miles 9 350
Partial-Update Adaptive Signal…
Kutluyil Dogancay Hardcover R2,926 Discovery Miles 29 260
Hawkins Electrical Guide…
N (Nehemiah) 1833-1928 Hawkins Hardcover R897 Discovery Miles 8 970
Electrical Age [microform]; v.36
Anonymous Hardcover R1,077 Discovery Miles 10 770
The Electric Telegraph - Was it Invented…
William Fothergill Cooke Paperback R355 Discovery Miles 3 550
Transfer Functions of Switching…
Christophe P. Basso Hardcover R3,405 Discovery Miles 34 050
Nonlinear Kalman Filter for Multi-Sensor…
Jean-Philippe Condomines Hardcover R2,737 Discovery Miles 27 370

 

Partners