|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
|
Cellular Automata
- 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17-21, 2018, Proceedings
(Paperback, 1st ed. 2018)
Giancarlo Mauri, Samira El Yacoubi, Alberto Dennunzio, Katsuhiro Nishinari, Luca Manzoni
|
R1,597
Discovery Miles 15 970
|
Ships in 10 - 15 working days
|
|
This book constitutes the proceedings of the 13th International
Conference on Cellular Automata for Research and Industry, ACRI
2018, held in Como, Italy, in September 2018. The 47 full papers
presented in this volume were carefully reviewed and selected from
64 submissions.This volume contains invited contributions and
accepted papers from the main track and from the three organized
workshops. The volume is organized in the following topics:
biological systems modeling; simulation and other applications of
CA; multi-agent systems; pedestrian and traffic dynamics;
synchronization and control; theory and cryptography; asynchronous
cellular automata; and crowds, traffic and cellular automata.
|
Advances in Cryptology - CRYPTO 2018
- 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I
(Paperback, 1st ed. 2018)
Hovav Shacham, Alexandra Boldyreva
|
R3,057
Discovery Miles 30 570
|
Ships in 10 - 15 working days
|
|
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993,
constitutes the refereed proceedings of the 38th Annual
International Cryptology Conference, CRYPTO 2018, held in Santa
Barbara, CA, USA, in August 2018. The 79 revised full papers
presented were carefully reviewed and selected from 351
submissions. The papers are organized in the following topical
sections: secure messaging; implementations and physical attacks
prevention; authenticated and format-preserving encryption;
cryptoanalysis; searchable encryption and differential privacy;
secret sharing; encryption; symmetric cryptography; proofs of work
and proofs of stake; proof tools; key exchange; symmetric
cryptoanalysis; hashes and random oracles; trapdoor functions;
round optimal MPC; foundations; lattices; lattice-based ZK;
efficient MPC; quantum cryptography; MPC; garbling;
information-theoretic MPC; oblivious transfer; non-malleable codes;
zero knowledge; and obfuscation.
|
Advances in Cryptology - CRYPTO 2018
- 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part III
(Paperback, 1st ed. 2018)
Hovav Shacham, Alexandra Boldyreva
|
R3,040
Discovery Miles 30 400
|
Ships in 10 - 15 working days
|
|
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993,
constitutes the refereed proceedings of the 38th Annual
International Cryptology Conference, CRYPTO 2018, held in Santa
Barbara, CA, USA, in August 2018. The 79 revised full papers
presented were carefully reviewed and selected from 351
submissions. The papers are organized in the following topical
sections: secure messaging; implementations and physical attacks
prevention; authenticated and format-preserving encryption;
cryptoanalysis; searchable encryption and differential privacy;
secret sharing; encryption; symmetric cryptography; proofs of work
and proofs of stake; proof tools; key exchange; symmetric
cryptoanalysis; hashes and random oracles; trapdoor functions;
round optimal MPC; foundations; lattices; lattice-based ZK;
efficient MPC; quantum cryptography; MPC; garbling;
information-theoretic MPC; oblivious transfer; non-malleable codes;
zero knowledge; and obfuscation.
This monograph illustrates important notions in security reductions
and essential techniques in security reductions for group-based
cryptosystems. Using digital signatures and encryption as examples,
the authors explain how to program correct security reductions for
those cryptographic primitives. Various schemes are selected and
re-proven in this book to demonstrate and exemplify correct
security reductions. This book is suitable for researchers and
graduate students engaged with public-key cryptography.
Learn advanced C# concepts and techniques such as building caches,
cryptography, and parallel programming by solving interesting
programming challenges Key Features Gain useful insights on
advanced C# programming topics and APIs Use locking and cached
values to solve parallel problems Take advantage of .NET's
cryptographic tools to encrypt and decrypt strings Book
DescriptionC# is a multi-paradigm programming language. The Modern
C# Challenge covers with aspects of the .NET Framework such as the
Task Parallel Library (TPL) and CryptoAPI. It also encourages you
to explore important programming trade-offs such as time versus
space or simplicity. There may be many ways to solve a problem and
there is often no single right way, but some solutions are
definitely better than others. This book has combined these
solutions to help you solve real-world problems with C#. In
addition to describing programming trade-offs, The Modern C#
Challenge will help you build a useful toolkit of techniques such
as value caching, statistical analysis, and geometric algorithms.
By the end of this book, you will have walked through challenges in
C# and explored the .NET Framework in order to develop program
logic for real-world applications. What you will learn Perform
statistical calculations such as finding the standard deviation
Find combinations and permutations Search directories for files
matching patterns using LINQ and PLINQ Find areas of polygons using
geometric operations Randomize arrays and lists with extension
methods Explore the filesystem to find duplicate files Simulate
complex systems and implement equality in a class Use cryptographic
techniques to encrypt and decrypt strings and files Who this book
is forThe Modern C# Challenge is for all C# developers of different
abilities wanting to solve real-world problems. There are problems
for everyone at any level of expertise in C#
Learn what the Blockchain is, what the differences between
available blockchain platforms are, how to work with Oracle's
Blockchain Cloud Service, and how Blockchain can change the
direction of your Oracle work and the focus of your customers. Key
Features A professional orientation of the Blockchain for Oracle
developers and customers Learn what the Blockchain is and how it
will affect for you and your customers Learn how blockchain will
disrupt traditional cross-organizational applications Implement
your own Blockchain on Oracle and develop your first smart contract
Industry directions of the Blockchain to help you decide where to
develop your skills Book DescriptionBlockchain across Oracle gives
you the professional orientation to Blockchain that you need as an
Oracle developer in today's changing world. Written and prepared
for you by Oracle Developer Champion Robert van Moelken, this book
gets you up to speed with the details of the Blockchain - core
concepts, how to implement Oracle's Blockchain Cloud Service,
industry implications for the Blockchain, and how the Blockchain
will affect your Oracle customers. Robert van Moelken introduces
you to the history and concepts of the Blockchain. You'll really
get to understand the Blockchain inside and out, as an Oracle
developer or solution architect. You'll understand the Blockchain
flow, and how the hashes and chains create a new decentralised
paradigm for you as an Oracle developer. You'll gain insights into
how the Blockchain affects Oracle developers and customers in this
modern and disruptive era. You'll see how the Blockchain concepts
work in this new world where Assets, Transactions, Security, and
Privacy, can all be sustained across a decentralized system for
your customers. Then you'll find a detailed look at the
cutting-edge Oracle middleware solutions. You'll learn about
Hyperledger Fabric, the opensource Blockchain framework used by
Oracle as its core, and how to set up your own Oracle Blockchain
Network. You'll design and develop a smart contract, and learn how
to run it on the Oracle Blockchain Cloud Service. The final part of
the book looks at how the Blockchain will affect your customers
across various industry sectors. By studying industry trends in the
financial services sector, healthcare industry, and the transport
industry, you'll discover how the options and possibilities for you
and your clients are being transformed by the Blockchain across
Oracle. You'll complete this professional orientation by looking at
Blockchain trends and future directions. What you will learn A full
introduction to the Blockchain How the Blockchain affects Oracle
developers and customers Core concepts including blocks, hashes,
and chains, assets, transactions, and consensus How to work with
Oracle Cloud to implement a Blockchain Network Design, develop, and
run smart contracts on the Oracle Blockchain Cloud Service
Blockchain security and privacy for Oracle developers and clients
Public and private Blockchain decisions for Oracle architects and
developers Industry analysis across finance, governance, and
healthcare sectors Industry trends and the future of the Blockchain
technology Who this book is forThis book is a professional
orientation for all Oracle developers, solution architects, and
decisions makers involved in Oracle system and future development.
This book constitutes the refereed proceedings of the 16th
International Conference on on Applied Cryptography and Network
Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36
revised full papers presented were carefully reviewed and selected
from 173 submissions. The papers were organized in topical sections
named: Cryptographic Protocols; Side Channel Attacks and Tamper
Resistance; Digital Signatures; Privacy Preserving Computation;
Multi-party Computation; Symmetric Key Primitives; Symmetric Key
Primitives; Symmetric Key Cryptanalysis; Public Key Encryption;
Authentication and Biometrics; Cloud and Peer-to-peer Security.
This book presents methods to improve information security for
protected communication. It combines and applies interdisciplinary
scientific engineering concepts, including cryptography, chaos
theory, nonlinear and singular optics, radio-electronics and
self-changing artificial systems. It also introduces additional
ways to improve information security using optical vortices as
information carriers and self-controlled nonlinearity, with
nonlinearity playing a key "evolving" role. The proposed solutions
allow the universal phenomenon of deterministic chaos to be
discussed in the context of information security problems on the
basis of examples of both electronic and optical systems. Further,
the book presents the vortex detector and communication systems and
describes mathematical models of the chaos oscillator as a coder in
the synchronous chaotic communication and appropriate decoders,
demonstrating their efficiency both analytically and
experimentally. Lastly it discusses the cryptologic features of
analyzed systems and suggests a series of new structures for
confident communication.
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage
security vulnerabilities of Ethereum Key Features Build end-to-end
decentralized Ethereum apps using Truffle, Web3, and Solidity
Explore various solution-based recipes to build smart contracts and
foolproof decentralized applications Develop decentralized
marketplaces from scratch, build wallets, and manage transactions
Book DescriptionEthereum and Blockchain will change the way
software is built for business transactions. Most industries have
been looking to leverage these new technologies to gain
efficiencies and create new business models and opportunities. The
Ethereum Cookbook covers various solutions such as setting up
Ethereum, writing smart contracts, and creating tokens, among
others. You'll learn about the security vulnerabilities, along with
other protocols of Ethereum. Once you have understood the basics,
you'll move on to exploring various design decisions and tips to
make your application scalable and secure. In addition to this,
you'll work with various Ethereum packages such as Truffle, Web3,
and Ganache. By the end of this book, you'll have comprehensively
grasped the Ethereum principles and ecosystem. What you will learn
Efficiently write smart contracts in Ethereum Build scalable
distributed applications and deploy them Use tools and frameworks
to develop, deploy, and test your application Use block explorers
such as Etherscan to find a specific transaction Create your own
tokens, initial coin offerings (ICOs), and games Understand various
security flaws in smart contracts in order to avoid them Who this
book is forThe Ethereum Cookbook is for you if you are a software
engineer, Blockchain developer, or research scientist who wants to
build smart contracts, develop decentralized applications, and
facilitate peer-to-peer transaction. It is assumed that you are
familiar with Blockchain concepts and have sound knowledge of
JavaScript.
This book uses motivating examples and real-life attack scenarios
to introduce readers to the general concept of fault attacks in
cryptography. It offers insights into how the fault tolerance
theories developed in the book can actually be implemented, with a
particular focus on a wide spectrum of fault models and practical
fault injection techniques, ranging from simple, low-cost
techniques to high-end equipment-based methods. It then
individually examines fault attack vulnerabilities in symmetric,
asymmetric and authenticated encryption systems. This is followed
by extensive coverage of countermeasure techniques and fault
tolerant architectures that attempt to thwart such vulnerabilities.
Lastly, it presents a case study of a comprehensive FPGA-based
fault tolerant architecture for AES-128, which brings together of a
number of the fault tolerance techniques presented. It concludes
with a discussion on how fault tolerance can be combined with side
channel security to achieve protection against implementation-based
attacks. The text is supported by illustrative diagrams,
algorithms, tables and diagrams presenting real-world experimental
results.
Explore the differences between ICOs, cryptocurrencies, and tokens
(offerings), enabling the reader to understand the ICO landscape,
how millions were raised in minutes, and where the future of the
tokenized economy is heading. Take a real-time journey, cutting
through the myths, understanding token choices available to
everyone. Key Features Interviews with key figures in Tokenomics
Unbiased evaluation and comparison of the different offerings
Conceptual analysis of the market's reaction League table showing
current exposure An account of the theoretical and current legal
foundations of alt coins and tokens A complete introduction to the
phases of an initial coin offering Book DescriptionTokenomics is
the economy of this new world. This is a no-holds-barred, in-depth
exploration of the way in which we can participate in the
blockchain economy. The reader will learn the basics of bitcoin,
blockchains, and tokenomics; what the very first ICO was; and how
over a period of 5 years, various projects managed to raise the
enormous sums of money they did. The book then provides insights
from ICO experts and looks at what the future holds. By comparing
the past, current, and future of this technology, the book will
inform anyone, whatever motivates their interest. The crypto shift
of blockchains, ICOs, and tokens is much more than just buying
bitcoins, creating tokens, or raising millions in a minute in an
ICO. It is a new paradigm shift from centralized to decentralized,
from closed to open, and from opaqueness to transparency. ICOs and
the creation of tokens during the craze of 2017 needed a lot of
preparation, an understanding of cryptocurrencies and of emerging
legal frameworks, but this has spurred a new movement to tokenize
the world. The author gives an unbiased, authoritative picture of
the current playing field, exploring the token opportunities and
provides a unique insight into the developing world of this
tokenized economy. This book will nourish hungry minds wanting to
grow their knowledge in this fascinating area. What you will learn
The background of ICOs and how they came to be The difference
between a coin and a token, a utility and a security, and all the
other acronyms you're likely to ever encounter How these ICOs
raised enormous sums of money Tokenomics: structuring the token
with creativity Why it's important to play nicely with the
regulators A sneak peak into the future of ICOs from leaders in the
industry Who this book is forWith the media hype about bitcoin,
this book appeals to anyone, from those with a general interest in
anything crypto, or those with some knowledge of the nuances
between cryptocurrency, ICOs, IPOs and the Token economy.
This book constitutes revised selected papers from the 20th
International Conference on Information Security and Cryptology,
ICISC 2017, held in Seoul, South Korea, in November/December 2017.
The total of 20 papers presented in this volume were carefully
reviewed and selected from 70 submissions. The papers were
organized in topical sections named: symmetric key encryption;
homomorphic encryption, side channel analysis and implementation;
broadcast encryption; elliptic curve; signature and protocol; and
network and system security.
Learn to evaluate and compare data encryption methods and attack
cryptographic systems Key Features Explore popular and important
cryptographic methods Compare cryptographic modes and understand
their limitations Learn to perform attacks on cryptographic systems
Book DescriptionCryptography is essential for protecting sensitive
information, but it is often performed inadequately or incorrectly.
Hands-On Cryptography with Python starts by showing you how to
encrypt and evaluate your data. The book will then walk you through
various data encryption methods,such as obfuscation, hashing, and
strong encryption, and will show how you can attack cryptographic
systems. You will learn how to create hashes, crack them, and will
understand why they are so different from each other. In the
concluding chapters, you will use three NIST-recommended systems:
the Advanced Encryption Standard (AES), the Secure Hash Algorithm
(SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this
book, you will be able to deal with common errors in encryption.
What you will learn Protect data with encryption and hashing
Explore and compare various encryption methods Encrypt data using
the Caesar Cipher technique Make hashes and crack them Learn how to
use three NIST-recommended systems: AES, SHA, and RSA Understand
common errors in encryption and exploit them Who this book is
forHands-On Cryptography with Python is for security professionals
who want to learn to encrypt and evaluate data, and compare
different encryption methods.
Simplified Python programming for Bitcoin and blockchain Key
Features Build Bitcoin applications in Python with the help of
simple examples Mine Bitcoins, program Bitcoin-enabled APIs and
transaction graphs, and build trading bots Analyze Bitcoin
transactions and produce visualizations using Python data analysis
tools Book DescriptionBitcoin is a cryptocurrency that's changing
the face of online payments. Hands-On Bitcoin Programming with
Python teaches you to build software applications for mining and
creating Bitcoins using Python. This book starts with the basics of
both Bitcoin and blockchain and gives you an overview of these
inherent concepts by showing you how to build Bitcoin-driven
applications with Python. Packed with clear instructions and
practical examples, you will learn to understand simple Python
coding examples that work with this cryptocurrency. By the end of
the book, you'll be able to mine Bitcoins, accept Bitcoin payments
on the app, and work with the basics of blockchain technology to
create simply distributed ledgers. What you will learn Master the
Bitcoin APIs in Python to manipulate Bitcoin from your Python apps
Build your own Bitcoin trading bots to buy Bitcoins at a lower
price and sell them at a higher price Write scripts to process
Bitcoin payments through a website or app Develop software for
Bitcoin mining to create Bitcoin currency on your own computer
hardware Create your own keys, addresses, and wallets in Python
code Write software to analyze Bitcoin transactions and produce
reports, graphs, and other visualizations Who this book is
forHands-On Bitcoin Programming with Python consists of examples
that will teach you to build your own Bitcoin application. You will
learn to write scripts, build software for mining, and create
Bitcoins using Python. Anyone with prior Python experience, who
wants to explore Python Bitcoin programming and start building
Bitcoin-driven Python apps, will find this book useful.
Leverage the power of Hyperledger Fabric to develop
Blockchain-based distributed ledgers with ease Key Features Write
your own chaincode/smart contracts using Golang on hyperledger
network Build and deploy decentralized applications (DApps) Dive
into real world blockchain challenges such as integration and
scalability Book DescriptionBBlockchain and Hyperledger
technologiesare hot topics today. Hyperledger Fabric and
Hyperledger Composer are open source projects that help
organizations create private, permissioned blockchain networks.
These find application in finance, banking, supply chain, and IoT
among several other sectors. This book will be an easy reference to
explore and build blockchain networks using Hyperledger
technologies. The book starts by outlining the evolution of
blockchain, including an overview of relevant blockchain
technologies. You will learn how to configure Hyperledger Fabric
and become familiar with its architectural components. Using these
components, you will learn to build private blockchain networks,
along with the applications that connect to them. Starting from
principles first, you'll learn to design and launch a network,
implement smart contracts in chaincode and much more. By the end of
this book, you will be able to build and deploy your own
decentralized applications, handling the key pain points
encountered in the blockchain life cycle. What you will learn
Discover why blockchain is a game changer in the technology
landscape Set up blockchain networks using basic Hyperledger Fabric
deployment Understand the considerations for creating decentralized
applications Learn to integrate business networks with existing
systems Write Smart Contracts quickly with Hyperledger Composer
Design transaction model and chaincode with Golang Deploy Composer
REST Gateway to access the Composer transactions Maintain, monitor,
and govern your blockchain solutions Who this book is forThe book
benefits business leaders as it provides a comprehensive view on
blockchain business models, governance structure, and business
design considerations of blockchain solutions. Technology leaders
stand to gain a lot from the detailed discussion around the
technology landscape, technology design, and architecture
considerations in the book. With model-driven application
development, this guide will speed up understanding and concept
development for blockchain application developers. The simple and
well organized content will put novices at ease with blockchain
concepts and constructs.
|
Cyber Security Cryptography and Machine Learning
- Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings
(Paperback, 1st ed. 2018)
Itai Dinur, Shlomi Dolev, Sachin Lodha
|
R1,474
R905
Discovery Miles 9 050
Save R569 (39%)
|
Ships in 9 - 15 working days
|
|
This book constitutes the refereed proceedings of the Second
International Symposium on Cyber Security Cryptography and Machine
Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The
16 full and 6 short papers presented in this volume were carefully
reviewed and selected from 44 submissions. They deal with the
theory, design, analysis, implementation, or application of cyber
security, cryptography and machine learning systems and networks,
and conceptually innovative topics in the scope.
|
You may like...
Database Security
Melissa Zgola, Alfred Basta
Paperback
R1,158
R1,038
Discovery Miles 10 380
|