![]() |
![]() |
Your cart is empty |
||
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.
This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The seven papers included in this special issue were carefully reviewed and selected from 21 submissions. They address the challenges faced by the emerging area of visual cryptography and provide the readers with an overview of the state of the art in this field of research.
David Middleton was a towering figure of 20th Century engineering and science and one of the founders of statistical communication theory. During the second World War, the young David Middleton, working with Van Fleck, devised the notion of the matched filter, which is the most basic method used for detecting signals in noise. Over the intervening six decades, the contributions of Middleton have become classics. This collection of essays by leading scientists, engineers and colleagues of David are in his honor and reflect the wide influence that he has had on many fields. Also included is the introduction by Middleton to his forthcoming book, which gives a wonderful view of the field of communication, its history and his own views on the field that he developed over the past 60 years. Focusing on classical noise modeling and applications, Classical, Semi-Classical and Quantum Noise includes coverage of statistical communication theory, non-stationary noise, molecular footprints, noise suppression, Quantum error correction, and other related topics.
"The book is outstanding and admirable in many respects. ... is necessary reading for all kinds of readers from undergraduate students to top authorities in the field." Journal of Symbolic Logic Written by two experts in the field, this is the only comprehensive and unified treatment of the central ideas and applications of Kolmogorov complexity. The book presents a thorough treatment of the subject with a wide range of illustrative applications. Such applications include the randomness of finite objects or infinite sequences, Martin-Loef tests for randomness, information theory, computational learning theory, the complexity of algorithms, and the thermodynamics of computing. It will be ideal for advanced undergraduate students, graduate students, and researchers in computer science, mathematics, cognitive sciences, philosophy, artificial intelligence, statistics, and physics. The book is self-contained in that it contains the basic requirements from mathematics and computer science. Included are also numerous problem sets, comments, source references, and hints to solutions of problems. New topics in this edition include Omega numbers, Kolmogorov-Loveland randomness, universal learning, communication complexity, Kolmogorov's random graphs, time-limited universal distribution, Shannon information and others.
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.
This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.
This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following workshops: Second International Workshop on Security in Self-Organising Networks (Self Net 2014); Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2014); Second International Workshop on Trust and Privacy in Cyberspace (Cyber Trust 2014).
As the theoretical foundations of multiple-antenna techniques evolve and as these multiple-input multiple-output (MIMO) techniques become essential for providing high data rates in wireless systems, there is a growing need to understand the performance limits of MIMO in practical networks. To address this need, "MIMO Communication for Cellular Networks "presents a systematic description of MIMO technology classes and a framework for MIMO system design that takes into account the essential physical-layer features of practical cellular networks. In contrast to works that focus on the theoretical performance of abstract MIMO channels, "MIMO Communication for Cellular Networks "emphasizes the practical performance of realistic MIMO systems. A unified set of system simulation results highlights relative performance gains of different MIMO techniques and provides insights into how best to use multiple antennas in cellular networks under various conditions. "MIMO Communication for Cellular Networks" describes single-user, multiuser, network MIMO technologies and system-level aspects of cellular networks, including channel modeling, resource scheduling, interference mitigation, and simulation methodologies. The key concepts are presented with sufficient generality to be applied to a wide range of wireless systems, including those based on cellular standards such as LTE, LTE-Advanced, WiMAX, and WiMAX2. The book is intended for use by graduate students, researchers, and practicing engineers interested in the physical-layer design of state-of-the-art wireless systems.
This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.
This text offers an introduction to error-correcting linear codes for researchers and graduate students in mathematics, computer science and engineering. The book differs from other standard texts in its emphasis on the classification of codes by means of isometry classes. The relevant algebraic are developed rigorously. Cyclic codes are discussed in great detail. In the last four chapters these isometry classes are enumerated, and representatives are constructed algorithmically.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.
This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.
This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013. The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system security.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.
This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held at Oxford, UK, in December 2013. The 20 papers presented were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: bits and booleans; homomorphic encryption; codes and applications; cryptanalysis; protecting against leakage; hash functions; key issues and public key primitives.
This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2014, held in Ibiza, Spain in September 2014 under the sponsorship of the UNESCO chair in Data Privacy. The 27 revised full papers presented were carefully reviewed and selected from 41 submissions. The scope of the conference is on following topics: tabular data protection, microdata masking, protection using privacy models, synthetic data, record linkage, remote access, privacy-preserving protocols, and case studies.
This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and selected from 127 submissions. They are organized in topical sections named: side-channel attacks; new attacks and constructions; countermeasures; algorithm specific SCA; ECC implementations; implementations; hardware implementations of symmetric cryptosystems; PUFs; and RNGs and SCA issues in hardware.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them - so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future.
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.
Interference Cancellation Using Space-Time Processing and Precoding Design introduces original design methods to achieve interference cancellation, low-complexity decoding and full diversity for a series of multi-user systems. In multi-user environments, co-channel interference will diminish the performance of wireless communications systems. In this book, we investigate how to design robust space-time codes and pre-coders to suppress the co-channel interference when multiple antennas are available. This book offers a valuable reference work for graduate students, academic researchers and engineers who are interested in interference cancellation in wireless communications. Rigorous performance analysis and various simulation illustrations are included for each design method. Dr. Feng Li is a scientific researcher at Cornell University. |
![]() ![]() You may like...
Electrical Energy Generation in Europe…
Jorge Morales Pedraza
Hardcover
R4,549
Discovery Miles 45 490
Hybrid Power Cycle Arrangements for…
Anoop Kumar Shukla, Onkar Singh, …
Hardcover
R2,894
Discovery Miles 28 940
The Electric Power Engineering Handbook…
Leonard L. Grigsby
Hardcover
R11,423
Discovery Miles 114 230
Applied Soft Computing and Embedded…
Mangey Ram, Rupendra Kumar Pachauri, …
Hardcover
R4,483
Discovery Miles 44 830
Lithium-Ion Batteries and Solar Cells…
Ming-Fa Lin, Wen-Dung Hsu, …
Hardcover
R4,484
Discovery Miles 44 840
Modern Computational Techniques for…
Krishan Arora, Vikram Kumar, …
Hardcover
R3,879
Discovery Miles 38 790
Advanced Power Generation Systems
Ibrahim Dincer, Calin Zamfirescu
Hardcover
Real-Time Systems Development with RTEMS…
Gedare Bloom, Joel Sherrill, …
Hardcover
R5,078
Discovery Miles 50 780
|