![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This book constitutes the proceedings of the 16th IMA International Conference on Cryptography and Coding, IMACC 2017, held at Oxford, UK, in December 2017. The 19 papers presented were carefully reviewed and selected from 32 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.
This book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017. The 14 papers presented in this volume were carefully reviewed and selected from 40 submissions. They were organized in topical sections named: information flow; security protocols; security policies; and information leakage.
Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators. Investigating Cryptocurrencies is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum. Understand blockchain and transaction technologies Set up and run cryptocurrency accounts Build information about specific addresses Access raw data on blockchain ledgers Identify users of cryptocurrencies Extracting cryptocurrency data from live and imaged computers Following the money With nearly $150 billion in cryptocurrency circulating and $3 billion changing hands daily, crimes committed with or paid for with digital cash are a serious business. Luckily, Investigating Cryptocurrencies Forensics shows you how to detect it and, more importantly, stop it in its tracks.
Digital Transmission - A Simulation-Aided Introduction with VisSim/Comm is a book in which basic principles of digital communication, mainly pertaining to the physical layer, are emphasized. Nevertheless, these principles can serve as the fundamentals that will help the reader to understand more advanced topics and the associated technology. In this book, each topic is addressed in two different and complementary ways: theoretically and by simulation. The theoretical approach encompasses common subjects covering principles of digital transmission, like notions of probability and stochastic processes, signals and systems, baseband and passband signaling, signal-space representation, spread spectrum, multi-carrier and ultra wideband transmission, carrier and symbol-timing recovery, information theory and error-correcting codes. The simulation approach revisits the same subjects, focusing on the capabilities of the communication system simulation software VisSim/Comm on helping the reader to fulfill the gap between the theory and its practical meaning. The presentation of the theory is made easier with the help of 357 illustrations. A total of 101 simulation files supplied in the accompanying CD support the simulation-oriented approach. A full evaluation version and a viewer-only version of VisSim/Comm are also supplied in the CD.
This book constitutes the proceedings of the 8th International Conference on Wireless and Satellite Services, WiSATS 2016, held in Cardiff, UK, in September 2016. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. As the scope of the conference widened to include wireless systems, the conference was renamed WiSATS. The 22 revised papers were selected from 32 submissions and cover a broad range of related state-of-the-art topics in antennas and mobile terminals, symbol precoding and network coding schemes, energy efficient strategies in satellite communication and cloud radio access networks, smart grid communication and optimization, security issues in vehicular ad-hoc networks (VANET) and delay tolerant net-works (DTN), interference mitigation in high throughput geostationary and non-geostationary satellite systems.
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. What You Will Learn Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker Who This Book Is For Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.
This book discusses in detail the basic algorithms of video compression that are widely used in modern video codec. The authors dissect complicated specifications and present material in a way that gets readers quickly up to speed by describing video compression algorithms succinctly, without going to the mathematical details and technical specifications. For accelerated learning, hybrid codec structure, inter- and intra- prediction techniques in MPEG-4, H.264/AVC, and HEVC are discussed together. In addition, the latest research in the fast encoder design for the HEVC and H.264/AVC is also included.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.
Protesters called it an act of war when the U.S. Coast Guard sank a Canadian-flagged vessel in the Gulf of Mexico in 1929. It took a cool-headed codebreaker solving a ""trunk-full"" of smugglers' encrypted messages to get Uncle Sam out of the mess: Elizebeth Smith Friedman's groundbreaking work helped prove the boat was owned by American gangsters. This book traces the career of a legendary U.S. law enforcement agent, from her work for the Allies during World War I through Prohibition, when she faced danger from mobsters while testifying in high profile trials. Friedman founded the cryptanalysis unit that provided evidence against American rum runners and Chinese drug smugglers. During World War II, her decryptions brought a Japanese spy to justice and her Coast Guard unit solved the Enigma ciphers of German spies. Friedman's ""all source intelligence"" model is still used by law enforcement and counterterrorism agencies against 21st century threats.
This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.
Complex systems in nature and society make use of information for the development of their internal organization and the control of their functional mechanisms. Alongside technical aspects of storing, transmitting and processing information, the various semantic aspects of information, such as meaning, sense, reference and function, play a decisive part in the analysis of such systems. With the aim of fostering a better understanding of semantic systems from an evolutionary and multidisciplinary perspective, this volume collects contributions by philosophers and natural scientists, linguists, information and computer scientists. They do not follow a single research paradigm; rather they shed, in a complementary way, new light upon some of the most important aspects of the evolution of semantic systems. Evolution of Semantic Systems is intended for researchers in philosophy, computer science, and the natural sciences who work on the analysis or development of semantic systems, ontologies, or similar complex information structures. In the eleven chapters, they will find a broad discussion of topics ranging from underlying universal principles to representation and processing aspects to paradigmatic examples.
Introduction to the Theory of Quantum Information Processing provides the material for a one-semester graduate level course on quantum information theory and quantum computing for students who have had a one-year graduate course in quantum mechanics. Many standard subjects are treated, such as density matrices, entanglement, quantum maps, quantum cryptography, and quantum codes. Also included are discussions of quantum machines and quantum walks. In addition, the book provides detailed treatments of several underlying fundamental principles of quantum theory, such as quantum measurements, the no-cloning and no-signaling theorems, and their consequences. Problems of various levels of difficulty supplement the text, with the most challenging problems bringing the reader to the forefront of active research. This book provides a compact introduction to the fascinating and rapidly evolving interdisciplinary field of quantum information theory, and it prepares the reader for doing active research in this area.
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Scalable Information Systems, INFOSCALE 2014, held in September 2014 in Seoul, South Korea. The 9 revised full papers presented were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics such as scalable data analysis and big data applications.
A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.
This book describes the design, development, and testing of a novel digital watermarking technique for color images using Magic Square and Ridgelet transforms. The novel feature of the method is that it generates and uses multiple copies of the digital watermark. The book describes how the method was tested for embedding digital watermarks into color cover images, resulting in very high PSNR value and yielding comparable results with existing watermarking techniques.To reach this new method, eight different techniques are designed, developed and tested. First, the authors test two digital watermarking techniques based on encryption: Image Watermark Using Complete Complementary Code Technique (CCCT) and Image Watermarking Using CCC-Fast Walsh Hadamard Transform Technique (CCC-FWHTT). Next, four digital watermarking techniques based on curvelet transforms are discussed: Image Watermarking Using Curvelet Transform (WCT), Watermark Wavelets in Curvelets of Cover Image (WWCT), Resized Watermark into Curvelets of Cover Image (RWCT), and Resized Watermark Wavelets into Curvelets of Cover Image (RWWCT). Then, two final techniques are presented: Image Watermarking Based on Magic Square (MST) and Image watermarking based on Magic Square and Ridgelet Transform (MSRTT). Future research directions are explored in the final chapter.Designed for professionals and researchers in computer graphics and imaging, Digital Watermarking Techniques in Curvelet and Ridgelet Domain is also a useful tool for advanced-level students.
This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
This fundamental monograph introduces both the probabilistic and algebraic aspects of information theory and coding. It has evolved from the authors' years of experience teaching at the undergraduate level, including several Cambridge Maths Tripos courses. The book provides relevant background material, a wide range of worked examples and clear solutions to problems from real exam papers. It is a valuable teaching aid for undergraduate and graduate students, or for researchers and engineers who want to grasp the basic principles.
A new starting-point and a new method are requisite, to insure a complete [classi?cation of the Steiner triple systems of order 15]. This method was furnished, and its tedious and di?cult execution und- taken, by Mr. Cole. F. N. Cole, L. D. Cummings, and H. S. White (1917) [129] The history of classifying combinatorial objects is as old as the history of the objects themselves. In the mid-19th century, Kirkman, Steiner, and others became the fathers of modern combinatorics, and their work - on various objects, including (what became later known as) Steiner triple systems - led to several classi?cation results. Almost a century earlier, in 1782, Euler [180] published some results on classifying small Latin squares, but for the ?rst few steps in this direction one should actually go at least as far back as ancient Greece and the proof that there are exactly ?ve Platonic solids. One of the most remarkable achievements in the early, pre-computer era is the classi?cation of the Steiner triple systems of order 15, quoted above. An onerous task that, today, no sensible person would attempt by hand calcu- tion. Because, with the exception of occasional parameters for which com- natorial arguments are e?ective (often to prove nonexistence or uniqueness), classi?cation in general is about algorithms and computation.
Probability, Random Processes, and Ergodic Properties is for mathematically inclined information/communication theorists and people working in signal processing. It will also interest those working with random or stochastic processes, including mathematicians, statisticians, and economists. Highlights: Complete tour of book and guidelines for use given in Introduction, so readers can see at a glance the topics of interest. Structures mathematics for an engineering audience, with emphasis on engineering applications. New in the Second Edition: Much of the material has been rearranged and revised for pedagogical reasons. The original first chapter has been split in order to allow a more thorough treatment of basic probability before tackling random processes and dynamical systems. The final chapter has been broken into two pieces to provide separate emphasis on process metrics and the ergodic decomposition of affine functionals. Many classic inequalities are now incorporated into the text, along with proofs; and many citations have been added.
Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in advanced computer systems and their applications within artificial intelligence, biometrics and information technology security. The volume also includes contributions on computational methods, algorithms and applications, computational science, education and industrial management applications.
Collaborative Networks for a Sustainable World Aiming to reach a sustainable world calls for a wider collaboration among multiple stakeholders from different origins, as the changes needed for sustainability exceed the capacity and capability of any individual actor. In recent years there has been a growing awareness both in the political sphere and in civil society including the bu- ness sectors, on the importance of sustainability. Therefore, this is an important and timely research issue, not only in terms of systems design but also as an effort to b- row and integrate contributions from different disciplines when designing and/or g- erning those systems. The discipline of collaborative networks especially, which has already emerged in many application sectors, shall play a key role in the implemen- tion of effective sustainability strategies. PRO-VE 2010 focused on sharing knowledge and experiences as well as identi- ing directions for further research and development in this area. The conference - dressed models, infrastructures, support tools, and governance principles developed for collaborative networks, as important resources to support multi-stakeholder s- tainable developments. Furthermore, the challenges of this theme open new research directions for CNs. PRO-VE 2010 held in St.
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.
This SpringerBrief presents channel estimation strategies for the physical later network coding (PLNC) systems. Along with a review of PLNC architectures, this brief examines new challenges brought by the special structure of bi-directional two-hop transmissions that are different from the traditional point-to-point systems and unidirectional relay systems. The authors discuss the channel estimation strategies over typical fading scenarios, including frequency flat fading, frequency selective fading and time selective fading, as well as future research directions. Chapters explore the performance of the channel estimation strategy and optimal structure of training sequences for each scenario. Besides the analysis of channel estimation strategies, the book also points out the necessity of revisiting other signal processing issues for the PLNC system. Channel Estimation of Physical Layer Network Coding Systems is a valuable resource for researchers and professionals working in wireless communications and networks. Advanced-level students studying computer science and electrical engineering will also find the content helpful. |
You may like...
Banking with Integrity - The Winners of…
H. Spitzeck, M. Pirson, …
Hardcover
R2,658
Discovery Miles 26 580
Organizations in Time - History, Theory…
Marcelo Bucheli, R. Daniel Wadhwani
Hardcover
R2,888
Discovery Miles 28 880
Hot Groups - Seeding Them, Feeding Them…
Jean Lipman-Blumen, Harold J. Leavitt
Hardcover
R932
Discovery Miles 9 320
|