0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (100)
  • R500+ (1,923)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Intelligence Science III - 4th IFIP TC 12 International Conference, ICIS 2020, Durgapur, India, February 24-27, 2021, Revised... Intelligence Science III - 4th IFIP TC 12 International Conference, ICIS 2020, Durgapur, India, February 24-27, 2021, Revised Selected Papers (Hardcover, 1st ed. 2021)
Zhongzhi Shi, Mihir Chakraborty, Samarjit Kar
R1,510 Discovery Miles 15 100 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 4th International Conference on Intelligence Science, ICIS 2020, held in Durgapur, India, in February 2021 (originally November 2020). The 23 full papers and 4 short papers presented were carefully reviewed and selected from 42 submissions. One extended abstract is also included. They deal with key issues in brain cognition; uncertain theory; machine learning; data intelligence; language cognition; vision cognition; perceptual intelligence; intelligent robot; and medical artificial intelligence.

Identity-Based Encryption (Hardcover, 2011 ed.): Sanjit Chatterjee, Palash Sarkar Identity-Based Encryption (Hardcover, 2011 ed.)
Sanjit Chatterjee, Palash Sarkar
R2,788 Discovery Miles 27 880 Ships in 10 - 15 working days

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Probability, Random Processes, and Ergodic Properties (Hardcover, 2nd ed. 2009): Robert M. Gray Probability, Random Processes, and Ergodic Properties (Hardcover, 2nd ed. 2009)
Robert M. Gray
R4,337 Discovery Miles 43 370 Ships in 12 - 17 working days

Probability, Random Processes, and Ergodic Properties is for mathematically inclined information/communication theorists and people working in signal processing. It will also interest those working with random or stochastic processes, including mathematicians, statisticians, and economists.

Highlights:

Complete tour of book and guidelines for use given in Introduction, so readers can see at a glance the topics of interest.

Structures mathematics for an engineering audience, with emphasis on engineering applications.

New in the Second Edition:

Much of the material has been rearranged and revised for pedagogical reasons.

The original first chapter has been split in order to allow a more thorough treatment of basic probability before tackling random processes and dynamical systems.

The final chapter has been broken into two pieces to provide separate emphasis on process metrics and the ergodic decomposition of affine functionals.

Many classic inequalities are now incorporated into the text, along with proofs; and many citations have been added.

Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach (Hardcover, 1st ed. 2021): Maamar Ouladj, Sylvain... Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach (Hardcover, 1st ed. 2021)
Maamar Ouladj, Sylvain Guilley
R1,824 Discovery Miles 18 240 Ships in 10 - 15 working days

It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting approaches. It will be useful as a graduate level introduction, also for self-study by researchers and professionals, and the examples are taken from real-world datasets.

Contact Tracing in Post-Covid World - A Cryptologic Approach (Hardcover, 1st ed. 2020): Pranab Chakraborty, Subhamoy Maitra,... Contact Tracing in Post-Covid World - A Cryptologic Approach (Hardcover, 1st ed. 2020)
Pranab Chakraborty, Subhamoy Maitra, Mridul Nandi, Suprita Talnikar
R3,508 Discovery Miles 35 080 Ships in 10 - 15 working days

This book is a timely document of state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this topic has recently received attention from governments, industries and academic communities due to the COVID-19 pandemic. This book provides a link between new proposals related to contact tracing applications and a contextual literature review primarily from the cryptologic viewpoint. As these applications are related to security and privacy of individuals, analyzing them from cryptologic viewpoint is of utmost importance. Therefore, present developments from cryptologic aspects of most proposals around the world, including Singapore, Europe, USA, Australia and India, have been discussed. Providing an in-depth study on the design rationale of each protocol, this book is of value to researchers, students and professionals alike.

Innovations in Digital Watermarking Techniques (Hardcover, 2009 ed.): Feng-Hsing Wang Innovations in Digital Watermarking Techniques (Hardcover, 2009 ed.)
Feng-Hsing Wang
R2,900 Discovery Miles 29 000 Ships in 10 - 15 working days

Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions. This book is directed to students, professors, researchers and application engineers who are interested in the area of information security.

Privacy and Identity Management for Life - 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice,... Privacy and Identity Management for Life - 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers (Hardcover, 2010 ed.)
Michele Bezzi, Penny Duquenoy, Simone Fischer-Hubner, Marit Hansen, Ge Zhang
R1,505 Discovery Miles 15 050 Ships in 10 - 15 working days

NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies-andthepeopleresponsible for making decisions about them, designing, and implementing them-scarcely consider those requirements, thereby potentially putting individuals' privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may become hard for individuals to manage and control information that concerns them and particularly how to eliminate outdated or unwanted personal information, thus leavingpersonalhistoriesexposedpermanently. Theseactivitiesraisesubstantial new challenges for personal privacy at the technical, social, ethical, regulatory, and legal levels: How can privacy in emerging Internet applications such as c- laborative scenarios and virtual communities be protected? What frameworks and technical tools could be utilized to maintain life-long privacy? DuringSeptember3-10,2009, IFIP(InternationalFederationforInformation Processing)workinggroups9. 2 (Social Accountability),9. 6/11. 7(IT Misuseand theLaw),11. 4(NetworkSecurity)and11. 6(IdentityManagement)heldtheir5th InternationalSummerSchoolincooperationwiththeEUFP7integratedproject PrimeLife in Sophia Antipolis and Nice, France. The focus of the event was on privacy and identity managementfor emerging Internet applications throughout a person's lifetime. The aim of the IFIP Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity management and to build up collegial relationships with others. As such, the Summer Schools havebeen introducing participants to the social implications of information technology through the process of informed discussion.

Cryptography - Theory and Practice (Paperback, 4th edition): Douglas Robert Stinson, Maura Paterson Cryptography - Theory and Practice (Paperback, 4th edition)
Douglas Robert Stinson, Maura Paterson
R1,376 Discovery Miles 13 760 Ships in 12 - 17 working days

Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject's fundamentals while presenting the most current advances in cryptography. The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world. Key Features of the Fourth Edition: New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9). New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1). New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A). An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium. Interesting attacks on cryptosystems, including: padding oracle attack correlation attacks and algebraic attacks on stream ciphers attack on the DUAL-EC random bit generator that makes use of a trapdoor. A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard. Methods of key distribution in sensor networks. The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret. The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain. The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.

Mathematical Modelling and Computational Intelligence Techniques - ICMMCIT-2021, Gandhigram, India February 10-12 (Hardcover,... Mathematical Modelling and Computational Intelligence Techniques - ICMMCIT-2021, Gandhigram, India February 10-12 (Hardcover, 1st ed. 2021)
P. Balasubramaniam, Kuru Ratnavelu, Grienggrai Rajchakit, G. Nagamani
R5,479 Discovery Miles 54 790 Ships in 10 - 15 working days

This book collects papers presented at the International Conference on Mathematical Modelling and Computational Intelligence Techniques (ICMMCIT) 2021, held at the Department of Mathematics, The Gandhigram Rural Institute (Deemed to be University), Gandhigram, Tamil Nadu, India, from 10-12 February 2021. Significant contributions from renowned researchers from fields of applied analysis, mathematical modelling and computing techniques have been received for this conference. Chapters emphasize on the research of computational nature focusing on new algorithms, their analysis and numerical results, as well as applications in physical, biological, social, and behavioural sciences. The accepted papers are organized in topical sections as mathematical modelling, image processing, control theory, graphs and networks, and inventory control.

Turbo-like Codes - Design for High Speed Decoding (Hardcover, 2007 ed.): Aliazam Abbasfar Turbo-like Codes - Design for High Speed Decoding (Hardcover, 2007 ed.)
Aliazam Abbasfar
R2,843 Discovery Miles 28 430 Ships in 10 - 15 working days

Turbo-like Codes introduces turbo error correcting concept in a simple language, including a general theory and the algorithms for decoding turbo-like code. It presents a unified framework for the design and analysis of turbo codes and LDPC codes and their decoding algorithms. A major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several hundred million bits per second (Mbps). In this book a novel high-speed turbo decoder is presented that exploits parallelization. Parallelism is achieved very efficiently by exploiting the flexibility of message-passing algorithm. It has been shown that very large speed gains can be achieved by this scheme while the efficiency is maintained reasonably high. Memory access, which poses a practical problem for the proposed parallel turbo decoder, is solved by introducing the conflict-free interleaver. The latency is further improved by designing a special kind of conflict-free interleaver. Furthermore, an algorithm to design such interleaver is presented. It is shown that the performance of turbo code is not sacrificed by using the interleaver with the proposed structure.

Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Hardcover, 1st ed. 2020): Tuan D. Pham Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Hardcover, 1st ed. 2020)
Tuan D. Pham
R3,268 Discovery Miles 32 680 Ships in 10 - 15 working days

This book presents an original combination of three well-known methodological approaches for nonlinear data analysis: recurrence, networks, and fuzzy logic. After basic concepts of these three approaches are introduced, this book presents recently developed methods known as fuzzy recurrence plots and fuzzy recurrence networks. Computer programs written in MATLAB, which implement the basic algorithms, are included to facilitate the understanding of the developed ideas. Several applications of these techniques to biomedical problems, ranging from cancer and neurodegenerative disease to depression, are illustrated to show the potential of fuzzy recurrence methods. This book opens a new door to theorists in complex systems science as well as specialists in medicine, biology, engineering, physics, computer science, geosciences, and social economics to address issues in experimental nonlinear signal and data processing.

Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information... Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information Systems, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
David Avison, George M. Kasper, Barbara Pernici, Isabel Ramos, Dewald Roode
R2,919 Discovery Miles 29 190 Ships in 10 - 15 working days

Introduction The International Federation for Information Processing (IFIP) is a non-profit umbrella organization for national societies working in the field of information processing. It was founded in 1960 under the auspices of UNESCO. It is organized into several technical c- mittees. This book represents the proceedings of the 2008 conference of technical committee 8 (TC8), which covers the field of infor- tion systems. TC8 aims to promote and encourage the advancement of research and practice of concepts, methods, techniques and issues related to information systems in organisations. TC8 has established eight working groups covering the following areas: design and evaluation of information systems; the interaction of information systems and the organization; decision support systems; e-business information systems: multi-disciplinary research and practice; inf- mation systems in public administration; smart cards, technology, applications and methods; and enterprise information systems. Further details of the technical committee and its working groups can be found on our website (ifiptc8. dsi. uminho. pt). This conference was part of IFIP's World Computer Congress in Milan, Italy which took place 7-10 September 2008. The occasion celebrated the 32nd anniversary of IFIP TC8. The call for papers invited researchers, educators, and practitioners to submit papers and panel proposals that advance concepts, methods, techniques, tools, issues, education, and practice of information systems in organi- tions. Thirty one submissions were received.

ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24,... ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings (Hardcover, 1st ed. 2021)
Audun Josang, Lynn Futcher, Janne Hagen
R3,967 Discovery Miles 39 670 Ships in 12 - 17 working days

This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management. *The conference was held virtually.

Privacy and Identity Management for Life - 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School,... Privacy and Identity Management for Life - 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers (Hardcover, Edition.)
Simone Fischer-Hubner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.

Public-Key Cryptography and Computational Number Theory - Proceedings of the International Conference organized by the Stefan... Public-Key Cryptography and Computational Number Theory - Proceedings of the International Conference organized by the Stefan Banach International Mathematical Center Warsaw, Poland, September 11-15, 2000 (Hardcover, Reprint 2011)
Kazimierz Alster, Jerzy Urbanowicz, Hugh C. Williams
R5,061 Discovery Miles 50 610 Ships in 12 - 17 working days

The Proceedings contain twenty selected, refereed contributions arising from the International Conference on Public-Key Cryptography and Computational Number Theory held in Warsaw, Poland, on September 11-15, 2000. The conference, attended by eightyfive mathematicians from eleven countries, was organized by the Stefan Banach International Mathematical Center. This volume contains articles from leading experts in the world on cryptography and computational number theory, providing an account of the state of research in a wide variety of topics related to the conference theme. It is dedicated to the memory of the Polish mathematicians Marian Rejewski (1905-1980), Jerzy Rooycki (1909-1942) and Henryk Zygalski (1907-1978), who deciphered the military version of the famous Enigma in December 1932 ? January 1933. A noteworthy feature of the volume is a foreword written by Andrew Odlyzko on the progress in cryptography from Enigma time until now."

Codes and Designs - Proceedings of a conference honoring Professor Dijen K. Ray-Chaudhuri on the occasion of his 65th birthday.... Codes and Designs - Proceedings of a conference honoring Professor Dijen K. Ray-Chaudhuri on the occasion of his 65th birthday. The Ohio State University May 18-21, 2000 (Hardcover, Reprint 2012)
K.T. Arasu, Akos Seress
R5,348 Discovery Miles 53 480 Ships in 12 - 17 working days

Following an initiative of the late Hans Zassenhaus in 1965, the Departments of Mathematics at The Ohio State University and Denison University organize conferences in combinatorics, group theory, and ring theory. Between May 18-21, 2000, the 25th conference of this series was held. Usually, there are twenty to thirty invited 20-minute talks in each of the three main areas. However, at the 2000 meeting, the combinatorics part of the conference was extended, to honor the 65th birthday of Professor Dijen Ray-Chaudhuri. This volulme is the proceedings of this extension. Most of the papers are in coding theory and design theory, reflecting the major interest of Professor Ray-Chaudhuri, but there are articles on association schemes, algebraic graph theory, combinatorial geometry, and network flows as well. There are four surveys and seventeen research articles, and all of these went through a thorough refereeing process. The volume is primarily recommended for researchers and graduate students interested in new developments in coding theory and design theory.

Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New): Atilla Elci, Josef Pieprzyk,... Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New)
Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang, …
R5,184 Discovery Miles 51 840 Ships in 12 - 17 working days

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

The Multimedia Internet (Hardcover, 1st ed. 2005. Corr. 2nd printing 2006): Stephen Weinstein The Multimedia Internet (Hardcover, 1st ed. 2005. Corr. 2nd printing 2006)
Stephen Weinstein
R3,020 Discovery Miles 30 200 Ships in 10 - 15 working days

Here is a thorough, not-overly-complex introduction to the three technical foundations for multimedia applications across the Internet: communications (principles, technologies and networking); compressive encoding of digital media; and Internet protocol and services. All the contributing systems elements are explained through descriptive text and numerous illustrative figures; the result is a book well-suited toward non-specialists, preferably with technical background, who need well-composed tutorial introductions to the three foundation areas. The text discusses the latest advances in digital audio and video encoding, optical and wireless communications technologies, high-speed access networks, and IP-based media streaming, all crucial enablers of the multimedia Internet.

VLSI-SoC: Design Methodologies for SoC and SiP - 16th IFIP WG 10.5/IEEE International Conference on Very Large Scale... VLSI-SoC: Design Methodologies for SoC and SiP - 16th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2008, Rhodes Island, Greece, October 13-15, 2008, Revised Selected Papers (Hardcover, Edition.)
Christian Piguet, Ricardo Reis, Dimitrios Soudris
R1,502 Discovery Miles 15 020 Ships in 10 - 15 working days

This book contains extended and revised versions of the best papers that were p- sented during the 16th edition of the IFIP/IEEE WG10.5 International Conference on Very Large Scale Integration, a global System-on-a-Chip Design & CAD conference. The 16th conference was held at the Grand Hotel of Rhodes Island, Greece (October 13-15, 2008). Previous conferences have taken place in Edinburgh, Trondheim, V- couver, Munich, Grenoble, Tokyo, Gramado, Lisbon, Montpellier, Darmstadt, Perth, Nice and Atlanta. VLSI-SoC 2008 was the 16th in a series of international conferences sponsored by IFIP TC 10 Working Group 10.5 and IEEE CEDA that explores the state of the art and the new developments in the field of VLSI systems and their designs. The purpose of the conference was to provide a forum to exchange ideas and to present industrial and research results in the fields of VLSI/ULSI systems, embedded systems and - croelectronic design and test.

Progress on Cryptography - 25 Years of Cryptography in China (Hardcover, 2004 ed.): Kefei Chen Progress on Cryptography - 25 Years of Cryptography in China (Hardcover, 2004 ed.)
Kefei Chen
R2,939 Discovery Miles 29 390 Ships in 10 - 15 working days

Cryptography in Chinese consists of two characters meaning "secret coded." Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding." China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students.

Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students.

Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.

Technological Innovation for Life Improvement - 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical... Technological Innovation for Life Improvement - 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, Costa de Caparica, Portugal, July 1-3, 2020, Proceedings (Hardcover, 1st ed. 2020)
Luis M. Camarinha-Matos, Nastaran Farhadi, Fabio Lopes, Helena Pereira
R2,878 Discovery Miles 28 780 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, held in Costa de Caparica, Portugal, in July 2020. The 20 full papers and 24 short papers presented were carefully reviewed and selected from 91 submissions. The papers present selected results produced in engineering doctoral programs and focus on technological innovation for industry and service systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: collaborative networks; decisions systems; analysis and synthesis algorithms; communication systems; optimization systems; digital twins and smart manufacturing; power systems; energy control; power transportation; biomedical analysis and diagnosis; and instrumentation in health.

Cyberspace Security and Defense: Research Issues - Proceedings of the NATO Advanced Research Workshop on Cyberspace Security... Cyberspace Security and Defense: Research Issues - Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, Gdansk, Poland, from 6 to 9 September 2004. (Hardcover, 2005 ed.)
Janusz S. Kowalik, Janusz G orski, Anatoly Sachenko
R3,016 Discovery Miles 30 160 Ships in 10 - 15 working days

Cyberspace security is a critical subject of our times.

On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security.

Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not "Should we do something for enhancing our digital assets security," the question is "How to do it."

Complexity of Lattice Problems - A Cryptographic Perspective (Hardcover, 2002 ed.): Daniele Micciancio, Shafi Goldwasser Complexity of Lattice Problems - A Cryptographic Perspective (Hardcover, 2002 ed.)
Daniele Micciancio, Shafi Goldwasser
R6,280 Discovery Miles 62 800 Ships in 10 - 15 working days

Lattices are geometric objects that can be pictorially described as the set of intersection points of an infinite, regular n-dimensional grid. De spite their apparent simplicity, lattices hide a rich combinatorial struc ture, which has attracted the attention of great mathematicians over the last two centuries. Not surprisingly, lattices have found numerous ap plications in mathematics and computer science, ranging from number theory and Diophantine approximation, to combinatorial optimization and cryptography. The study of lattices, specifically from a computational point of view, was marked by two major breakthroughs: the development of the LLL lattice reduction algorithm by Lenstra, Lenstra and Lovasz in the early 80's, and Ajtai's discovery of a connection between the worst-case and average-case hardness of certain lattice problems in the late 90's. The LLL algorithm, despite the relatively poor quality of the solution it gives in the worst case, allowed to devise polynomial time solutions to many classical problems in computer science. These include, solving integer programs in a fixed number of variables, factoring polynomials over the rationals, breaking knapsack based cryptosystems, and finding solutions to many other Diophantine and cryptanalysis problems."

Collaborative Networks for a Sustainable World - 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St.... Collaborative Networks for a Sustainable World - 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010, Proceedings (Hardcover, Edition.)
Luis M. Camarinha-Matos, Xavier Boucher, Hamideh Afsarmanesh
R2,967 Discovery Miles 29 670 Ships in 10 - 15 working days

Collaborative Networks for a Sustainable World Aiming to reach a sustainable world calls for a wider collaboration among multiple stakeholders from different origins, as the changes needed for sustainability exceed the capacity and capability of any individual actor. In recent years there has been a growing awareness both in the political sphere and in civil society including the bu- ness sectors, on the importance of sustainability. Therefore, this is an important and timely research issue, not only in terms of systems design but also as an effort to b- row and integrate contributions from different disciplines when designing and/or g- erning those systems. The discipline of collaborative networks especially, which has already emerged in many application sectors, shall play a key role in the implemen- tion of effective sustainability strategies. PRO-VE 2010 focused on sharing knowledge and experiences as well as identi- ing directions for further research and development in this area. The conference - dressed models, infrastructures, support tools, and governance principles developed for collaborative networks, as important resources to support multi-stakeholder s- tainable developments. Furthermore, the challenges of this theme open new research directions for CNs. PRO-VE 2010 held in St.

System-on-Chip Architectures and Implementations for Private-Key Data Encryption (Hardcover, 2003 ed.): Maire McLoone, John V.... System-on-Chip Architectures and Implementations for Private-Key Data Encryption (Hardcover, 2003 ed.)
Maire McLoone, John V. McCanny
R2,888 Discovery Miles 28 880 Ships in 10 - 15 working days

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA-1, SHA-2 and HMAC hash algorithm architectures are described. A single-chip Internet Protocol Security (IPSec) architecture is also presented that comprises a generic Rijndael design and a highly efficient HMAC-SHA-1 implementation.

In the opinion of the authors, highly efficient hardware implementations of cryptographic algorithms are provided in this book. However, these are not hard-fast solutions. The aim of the book is to provide an excellent guide to the design and development process involved in the translation from encryption algorithm to silicon chip implementation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Economics of Blockchain and…
James L. Caton Hardcover R2,745 Discovery Miles 27 450
Blockchain - An Essential Beginner's…
Herbert Jones Hardcover R712 R590 Discovery Miles 5 900
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030
Introduction to Bitcoin
David Ricardo Hardcover R733 Discovery Miles 7 330
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,473 Discovery Miles 24 730
Blockchain - Novice to Expert - 2…
Keizer Soeze Hardcover R1,081 R875 Discovery Miles 8 750
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R798 Discovery Miles 7 980
Bitcoin - Guide Book for Beginners
Keizer Soeze Hardcover R1,151 R928 Discovery Miles 9 280
Technical Articles about the Voynich…
National Security Agency Hardcover R568 Discovery Miles 5 680

 

Partners