![]() |
![]() |
Your cart is empty |
||
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This book constitutes the refereed proceedings of the 5th International Workshop on Multiple Access Communications, MACOM 2012, held in Maynooth, Ireland, in November 2012. The 13 full papers and 5 demo and poster papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on network coding, handling interference and localization techniques at PHY/MAC layers, wireless access networks, and medium access control.
This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.
Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.
This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.
Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. -Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems. -Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects).
In this highly readable book, H.S. Green, a former student of Max Born and well known as an author in physics and in the philosophy of science, presents a timely analysis of theoretical physics and related fundamental problems.
This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC 2011, held in Oxford, UK in December 2011. The 27 revised full papers presented together with one invited contribution were carefully reviewed and selected from 57 submissions. The papers cover a wide range of topics in the field of mathematics and computer science, including coding theory, homomorphic encryption, symmetric and public key cryptosystems, cryptographic functions and protocols, efficient pairing and scalar multiplication implementation, knowledge proof, and security analysis.
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.
The spreading of digital technology has resulted in a dramatic increase in the demand for data compression (DC) methods. At the same time, the appearance of highly integrated elements has made more and more com plicated algorithms feasible. It is in the fields of speech and image trans mission and the transmission and storage of biological signals (e.g., ECG, Body Surface Mapping) where the demand for DC algorithms is greatest. There is, however, a substantial gap between the theory and the practice of DC: an essentially nonconstructive information theoretical attitude and the attractive mathematics of source coding theory are contrasted with a mixture of ad hoc engineering methods. The classical Shannonian infor mation theory is fundamentally different from the world of practical pro cedures. Theory places great emphasis on block-coding while practice is overwhelmingly dominated by theoretically intractable, mostly differential predictive coding (DPC), algorithms. A dialogue between theory and practice has been hindered by two pro foundly different conceptions of a data source: practice, mostly because of speech compression considerations, favors non stationary models, while the theory deals mostly with stationary ones."
A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.
The objective of the present edition of this monograph is the same as that of earlier editions, namely, to provide readers with some mathemati cal maturity a rigorous and modern introduction to the ideas and principal theorems of probabilistic information theory. It is not necessary that readers have any prior knowledge whatever of information theory. The rapid development of the subject has had the consequence that any one book can now cover only a fraction of the literature. The latter is often written by engineers for engineers, and the mathematical reader may have some difficulty with it. The mathematician who understands the content and methods of this monograph should be able to read the literature and start on research of his own in a subject of mathematical beauty and interest. The present edition differs from the second in the following: Chapter 6 has been completely replaced by one on arbitrarily varying channels. Chapter 7 has been greatly enlarged. Chapter 8 on semi-continuous channels has been drastically shortened, and Chapter 11 on sequential decoding completely removed. The new Chapters 11-15 consist entirely of material which has been developed only in the last few years. The topics discussed are rate distortion, source coding, multiple access channels, and degraded broadcast channels. Even the specialist will find a new approach in the treatment of these subjects. Many of the proofs are new, more perspicuous, and considerably shorter than the original ones."
DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national standard in the mid 1970s, and had resisted all attacks in the last 15 years. This book presents the first successful attack which can break the full 16 round DES faster than via exhaustive search. It describes in full detail, the novel technique of Differential Cryptanalysis, and demonstrates its applicability to a wide variety of cryptosystems and hash functions, including FEAL, Khafre, REDOC-II, LOKI, Lucifer, Snefru, N-Hash, and many modified versions of DES. The methodology used offers valuable insights to anyone interested in data security and cryptography, and points out the intricacies of developing, evaluating, testing, and implementing such schemes. This book was written by two of the fields leading researchers, and describes state-of-the-art research in a clear and completely contained manner.
This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012. The 16 revised selected papers presented in this volume were carefully reviewed and selected from 53 submissions. They are organized in topical sections named: implementation; encryption and key exchange; cryptanalysis; and secure protocols.
This book contains the lectures given at the Conference on Dynamics and Randomness held at the Centro de Modelamiento Matematico of the Universidad de Chile from December 11th to 15th, 2000. This meeting brought together mathematicians, theoretical physicists and theoretical computer scientists, and graduate students interested in fields re lated to probability theory, ergodic theory, symbolic and topological dynam ics. We would like to express our gratitude to all the participants of the con ference and to the people who contributed to its organization. In particular, to Pierre Collet, Bernard Host and Mike Keane for their scientific advise. VVe want to thank especially the authors of each chapter for their well prepared manuscripts and the stimulating conferences they gave at Santiago. We are also indebted to our sponsors and supporting institutions, whose interest and help was essential to organize this meeting: ECOS-CONICYT, FONDAP Program in Applied Mathematics, French Cooperation, Fundacion Andes, Presidential Fellowship and Universidad de Chile. We are grateful to Ms. Gladys Cavallone for their excellent work during the preparation of the meeting as well as for the considerable task of unifying the typography of the different chapters of this book.
Approach your problems from the right end It isn't that they can't see the solution. It is and begin with the answers. Then one day, that they can't see the problem. perhaps you will find the final question. G. K. Chesterton. The Scandal of Father 'The Hermit Clad in Crane Feathers' in R. Brown 'The point of a Pin'. van Gulik's The Chif1ese Maze Murders. Growing specialization and diversification have brought a host of monographs and textbooks on increasingly specialized topics. However, the "tree" of knowledge of mathematics and related fields does not grow only by putting forth new branches. It also happens, quite often in fact, that branches which were thought to be completely disparate are suddenly seen to be related. Further, the kind and level of sophistication of mathematics applied in various sciences has changed drastically in recent years: measure theory is used (non trivially) in regional and theoretical economics; algebraic geometry interacts with physics; the Minkowsky lemma, coding theory and the structure of water meet one another in packing and covering theory; quantum fields, crystal defects and mathematical programming profit from homotopy theory; Lie algebras are relevant to filtering; and prediction and electrical engineering can use Stein spaces. And in addition to this there are such new emerging subdisciplines as "experimental mathematics", "CFD", "completely integrable systems", "chaos, synergetics and large-scale order", which are almost impossible to fit into the existing classification schemes. They draw upon widely different sections of mathematics.
For four decades, information theory has been viewed almost exclusively as a theory based upon the Shannon measure of uncertainty and information, usually referred to as Shannon entropy. Since the publication of Shannon's seminal paper in 1948, the theory has grown extremely rapidly and has been applied with varied success in almost all areas of human endeavor. At this time, the Shannon information theory is a well established and developed body of knowledge. Among its most significant recent contributions have been the use of the complementary principles of minimum and maximum entropy in dealing with a variety of fundamental systems problems such as predic tive systems modelling, pattern recognition, image reconstruction, and the like. Since its inception in 1948, the Shannon theory has been viewed as a restricted information theory. It has often been argued that the theory is capable of dealing only with syntactic aspects of information, but not with its semantic and pragmatic aspects. This restriction was considered a v~rtue by some experts and a vice by others. More recently, however, various arguments have been made that the theory can be appropriately modified to account for semantic aspects of in formation as well. Some of the most convincing arguments in this regard are in cluded in Fred Dretske's Know/edge & Flow of Information (The M.LT. Press, Cambridge, Mass., 1981) and in this book by Guy lumarie.
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 1-7, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.
The genesis of this volume was the participation of the editors in an ACMlSIGIR (Association for Computing Machinery/Special Interest Group on Information Retrieval) workshop entitled "Beyond Word Relations" (Hetzler, 1997). This workshop examined a number of relationship types with significance for information retrieval beyond the conventional topic-matching relationship. From this shared participation came the idea for an edited volume on relationships, with chapters to be solicited from researchers and practitioners throughout the world. Ultimately, one volume became two volumes. The first volume, Relationships in the Organization of Knowledge (Bean & Green, 200 I), examines the role of relationships in knowledge organization theory and practice, with emphasis given to thesaural relationships and integration across systems, languages, cultures, and disciplines. This second volume examines relationships in a broader array of contexts. The two volumes should be seen as companions, each informing the other. As with the companion volume, we are especially grateful to the authors who willingly accepted challenges of space and time to produce chapters that summarize extensive bodies of research. The value of the volume clearly resides in the quality of the individual chapters. In naming this volume The Semantics of Relationships: An Interdisciplinary Perspective, we wanted to highlight the fact that relationships are not just empty connectives. Relationships constitute important conceptual units and make significant contributions to meaning.
This work presents new and old constructions of nearrings. Links
between properties of the multiplicative of nearrings (as
regularity conditions and identities) and the structure of
nearrings are studied. Primality and minimality properties of
ideals are collected. Some types of simpler' nearrings are
examined. Some nearrings of maps on a group are reviewed and linked
with group-theoretical and geometrical questions.
This volume represents the refereed proceedings of the "Sixth International Conference on Finite Fields and Applications (Fq6)" held in the city of Oaxaca, Mexico, between 22-26 May 200l. The conference was hosted by the Departmento do Matermiticas of the U niversidad Aut6noma Metropolitana- Iztapalapa, Nlexico. This event continued a series of biennial international conferences on Finite Fields and Applications, following earlier meetings at the University of Nevada at Las Vegas (USA) in August 1991 and August 1993, the University of Glasgow (Scotland) in July 1995, the University of Waterloo (Canada) in August 1997, and at the University of Augsburg (Ger- many) in August 1999. The Organizing Committee of Fq6 consisted of Dieter Jungnickel (University of Augsburg, Germany), Neal Koblitz (University of Washington, USA), Alfred }. lenezes (University of Waterloo, Canada), Gary Mullen (The Pennsylvania State University, USA), Harald Niederreiter (Na- tional University of Singapore, Singapore), Vera Pless (University of Illinois, USA), Carlos Renteria (lPN, Mexico). Henning Stichtenoth (Essen Univer- sity, Germany). and Horacia Tapia-Recillas, Chair (Universidad Aut6noma l'vIetropolitan-Iztapalapa. Mexico). The program of the conference consisted of four full days and one half day of sessions, with 7 invited plenary talks, close to 60 contributed talks, basic courses in finite fields. cryptography and coding theory and a series of lectures at local educational institutions. Finite fields have an inherently fascinating structure and they are im- portant tools in discrete mathematics.
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, in August 27, 2012. The 12 revised full papers presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on privacy protection, access control, secure storage on the cloud, and trust on the Web.
The means and ends of information theory and computational complexity have grown significantly closer over the past decade. Common analytic tools, such as combinatorial mathematics and information flow arguments, have been the cornerstone of VLSl complexity and cooperative computation. The basic assumption of limited computing resources is the premise for cryptography, where the distinction is made between available information and accessible information. Numerous other examples of common goals and tools between the two disciplines have shaped a new research category of 'information and complexity theory'. This volume is intended to expose to the research community some of the recent significant topics along this theme. The contributions selected here are all very basic, presently active, fairly well-established, and stimulating for substantial follow-ups. This is not an encyclopedia on the subject, it is concerned only with timely contributions of sufficient coherence and promise. The styles of the six chapters cover a wide spectrum from specific mathematical results to surveys of large areas. It is hoped that the technical content and theme of this volume will help establish this general research area. I would like to thank the authors of the chapters for contributing to this volume. I also would like to thank Ed Posner for his initiative to address this subject systematically, and Andy Fyfe and Ruth Erlanson for proofreading some of the chapters.
This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest. |
![]() ![]() You may like...
Blockchain Technology: Platforms, Tools…
Pethuru Raj, Ganesh Chandra Deka
Hardcover
R4,474
Discovery Miles 44 740
Transforming Management Using Artificial…
Vikas Garg, Rashmi Agrawal
Hardcover
R5,068
Discovery Miles 50 680
Machine Learning for Decision Sciences…
S. Sumathi, Suresh Rajappa, …
Hardcover
R5,313
Discovery Miles 53 130
The Next Era in Hardware Security - A…
Nikhil Rangarajan, Satwik Patnaik, …
Hardcover
R2,407
Discovery Miles 24 070
Analog Circuit Design for Process…
Marvin Onabajo, Jose Silva-Martinez
Hardcover
R2,874
Discovery Miles 28 740
|