![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user.
This book constitutes the proceedings of the 5th International Conference on Advances in Information Technology, IAIT 2012, held in Bangkok, Thailand, in December 2012. The 18 revised papers presented in this volume were carefully reviewed and selected from 37 submissions. They deal with all areas related to applied information technology, such as e-service; information and communication technology; intelligent systems; information management; and platform technology.
Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security. Applications Of Data Mining In Computer Security concentrates heavily on the use of data mining in the area of intrusion detection. The reason for this is twofold. First, the volume of data dealing with both network and host activity is so large that it makes it an ideal candidate for using data mining techniques. Second, intrusion detection is an extremely critical activity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence.
Secure Broadcast Communication in Wired and Wireless Networks
presents a set of fundamental protocols for building secure
information distribution systems. Applications include wireless
broadcast, IP multicast, sensor networks and webs, ad hoc networks,
and satellite broadcast. This book presents and compares new
techniques for basic operations including: This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.
Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against low-exponent RSA, Hastad's broadcast attack, and Franklin-Reiter attacks). Finally, the last chapter reviews the use of the RSA function in signature schemes. Recent Advances in RSA Cryptography is of interest to graduate level students and researchers who will gain an insight into current research topics in the field and an overview of recent results in a unified way. Recent Advances in RSA Cryptography is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.
High performance computing consumes and generates vast amounts of data, and the storage, retrieval, and transmission of this data are major obstacles to effective use of computing power. Challenges inherent in all of these operations are security, speed, reliability, authentication and reproducibility. This workshop focused on a wide variety of technical results aimed at meeting these challenges. Topics ranging from the mathematics of coding theory to the practicalities of copyright preservation for Internet resources drew spirited discussion and interaction among experts in diverse but related fields. We hope this volume contributes to continuing this dialogue.
This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.
This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.
The book introduces new techniques which imply rigorous lower bounds on the complexity of some number theoretic and cryptographic problems. These methods and techniques are based on bounds of character sums and numbers of solutions of some polynomial equations over finite fields and residue rings. It also contains a number of open problems and proposals for further research. We obtain several lower bounds, exponential in terms of logp, on the de grees and orders of * polynomials; * algebraic functions; * Boolean functions; * linear recurring sequences; coinciding with values of the discrete logarithm modulo a prime p at suf ficiently many points (the number of points can be as small as pI/He). These functions are considered over the residue ring modulo p and over the residue ring modulo an arbitrary divisor d of p - 1. The case of d = 2 is of special interest since it corresponds to the representation of the right most bit of the discrete logarithm and defines whether the argument is a quadratic residue. We also obtain non-trivial upper bounds on the de gree, sensitivity and Fourier coefficients of Boolean functions on bits of x deciding whether x is a quadratic residue. These results are used to obtain lower bounds on the parallel arithmetic and Boolean complexity of computing the discrete logarithm. For example, we prove that any unbounded fan-in Boolean circuit. of sublogarithmic depth computing the discrete logarithm modulo p must be of superpolynomial size.
Informational Macrodynamics (IMD) presents the unified information systemic approach with common information language for modeling, analysis and optimization of a variety of interactive processes, such as physical, biological, economical, social, and informational, including human activities. Comparing it with thermodynamics, which deals with transformation energy and represents a theoretical foundation of physical technology, IMD deals with transformation information, and can be considered a theoretical foundation of Information Computer Technology (ICT). ICT includes but is not limited to applied computer science, computer information systems, computer and data communications, software engineering, and artificial intelligence. In ICT, information flows from different data sources, and interacts to create new information products. The information flows may interact physically or via their virtual connections, initiating an information dynamic process that can be distributed in space. As in physics, a problem is understanding general regularities of the information processes in terms of information law, for the engineering and technological design, control, optimization, and development of computer technology, operations, manipulations, and management of real information objects. Information Systems Analysis and Modeling: An Informational Macrodynamics Approach belongs to an interdisciplinary science that represents the new theoretical and computer-based methodology for system informational description and improvement, including various activities in such interdisciplinary areas as thinking, intelligent processes, management, and other nonphysical subjects with their mutual interactions, informational superimpositions, and the information transferred between interactions. Information Systems Analysis and Modeling: An Informational Macrodynamics Approach can be used as a textbook or secondary text in courses on computer science, engineering, business, management, education, and psychology and as a reference for research and industry.
This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011. The 10 revised full papers were carefully reviewed and selected from numerour submissions. The papers span a wide spectrum of topics from foundations of cryptology, upto secret-key cryptosystems and hash functions, public-key cryptosystems, modes of operation, cryptographic protocols, hardware and software implementation of cryptosystems and their integration into secure systems, and applications such as watermarking and code obfuscation.
This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices.
This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology, and control and automation, and circuits, control, communication, electricity, electronics, energy, system, signal and simulation.
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
YUNMIN ZHU In the past two decades, multi sensor or multi-source information fusion tech niques have attracted more and more attention in practice, where observations are processed in a distributed manner and decisions or estimates are made at the individual processors, and processed data (or compressed observations) are then transmitted to a fusion center where the final global decision or estimate is made. A system with multiple distributed sensors has many advantages over one with a single sensor. These include an increase in the capability, reliability, robustness and survivability of the system. Distributed decision or estimation fusion prob lems for cases with statistically independent observations or observation noises have received significant attention (see Varshney's book Distributed Detec tion and Data Fusion, New York: Springer-Verlag, 1997, Bar-Shalom's book Multitarget-Multisensor Tracking: Advanced Applications, vol. 1-3, Artech House, 1990, 1992,2000). Problems with statistically dependent observations or observation noises are more difficult and have received much less study. In practice, however, one often sees decision or estimation fusion problems with statistically dependent observations or observation noises. For instance, when several sensors are used to detect a random signal in the presence of observation noise, the sensor observations could not be statistically independent when the signal is present. This book provides a more complete treatment of the fundamentals of multi sensor decision and estimation fusion in order to deal with general random ob servations or observation noises that are correlated across the sensors."
In 1978 Edwin T. Jaynes and Myron Tribus initiated a series of workshops to exchange ideas and recent developments in technical aspects and applications of Bayesian probability theory. The first workshop was held at the University of Wyoming in 1981 organized by C.R. Smith and W.T. Grandy. Due to its success, the workshop was held annually during the last 18 years. Over the years, the emphasis of the workshop shifted gradually from fundamental concepts of Bayesian probability theory to increasingly realistic and challenging applications. The 18th international workshop on Maximum Entropy and Bayesian Methods was held in Garching / Munich (Germany) (27-31. July 1998). Opening lectures by G. Larry Bretthorst and by Myron Tribus were dedicated to one of th the pioneers of Bayesian probability theory who died on the 30 of April 1998: Edwin Thompson Jaynes. Jaynes revealed and advocated the correct meaning of 'probability' as the state of knowledge rather than a physical property. This inter pretation allowed him to unravel longstanding mysteries and paradoxes. Bayesian probability theory, "the logic of science" - as E.T. Jaynes called it - provides the framework to make the best possible scientific inference given all available exper imental and theoretical information. We gratefully acknowledge the efforts of Tribus and Bretthorst in commemorating the outstanding contributions of E.T. Jaynes to the development of probability theory."
This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.
This book offers a new, theoretical approach to information dynamics, i.e., information processing in complex dynamical systems. The presentation establishes a consistent theoretical framework for the problem of discovering knowledge behind empirical, dynamical data and addresses applications in information processing and coding in dynamical systems. This will be an essential reference for those in neural computing, information theory, nonlinear dynamics and complex systems modeling.
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management.
This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems.
This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99, which has been held in Singapore during the week of November 22-26, 1999. The workshop was organized by the Centre for Systems Security of the Na tional University of Singapore. We gratefully acknowledge the financial support from the Singapore National Science and Technology Board under the grant num ber RP960668/M. The idea for this workshop grew out of the recognition of the recent, rapid development in various areas of cryptography and computational number the ory. The event followed the concept of the research programs at such well-known research institutions as the Newton Institute (UK), Oberwolfach and Dagstuhl (Germany), and Luminy (France). Accordingly, there were only invited lectures at the workshop with plenty of time for informal discussions. It was hoped and successfully achieved that the meeting would encourage and stimulate further research in information and computer security as well as in the design and implementation of number theoretic cryptosystems and other related areas. Another goal of the meeting was to stimulate collaboration and more active interaction between mathematicians, computer scientists, practical cryptographers and engineers in academia, industry and government."
"Digital Communications" presents the theory and application of the philosophy of Digital Communication systems in a unique but lucid form. The book inserts equal importance to the theory and application aspect of the subject whereby the authors selected a wide class of problems. The Salient features of the book are: 1. The foundation of Fourier series, Transform and wavelets are introduces in a unique way but in lucid language. 2. The application area is rich and resemblance to the present trend of research, as we are attached with those areas professionally. 3. Elegant exercise section is designed in such a way that, the readers can get the flavor of the subject and get attracted towards the future scopes of the subject. 4. Unparallel tabular, flow chart based and pictorial methodology description will be there for sustained impression of the proposed design/algorithms in mind.
This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas.
Introduction to Convolutional Codes with Applications is an introduction to the basic concepts of convolutional codes, their structure and classification, various error correction and decoding techniques for convolutionally encoded data, and some of the most common applications. The definition and representations, distance properties, and important classes of convolutional codes are also discussed in detail. The book provides the first comprehensive description of table-driven correction and decoding of convolutionally encoded data. Complete examples of Viterbi, sequential, and majority-logic decoding technique are also included, allowing a quick comparison among the different decoding approaches. Introduction to Convolutional Codes with Applications summarizes the research of the last two decades on applications of convolutional codes in hybrid ARQ protocols. A new classification allows a natural way of studying the underlying concepts of hybrid schemes and accommodates all of the new research. A novel application of fast decodable invertible convolutional codes for lost packet recovery in high speed networks is described. This opens the door for using convolutional coding for error recovery in high speed networks. Practicing communications, electronics, and networking engineers who want to get a better grasp of the underlying concepts of convolutional coding and its applications will greatly benefit by the simple and concise style of explanation. An up-to-date bibliography of over 300 papers is included. Also suitable for use as a textbook or a reference text in an advanced course on coding theory with emphasis on convolutional codes. |
You may like...
Cape Cod Bay - A History of Salt & Sea
Theresa Mitchell Barbo
Paperback
|