Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
Applications of solar energy have been expanding in recent years across the world. This monograph details such far-reaching and important applications which have the potential for large impact on various segments of the society. It focuses solar energy technologies for various applications such as generation of electric power, heating, energy storage, etc. This volume will be a useful guide for researchers, academics and scientists.
This book offers a mathematical foundation for modern cryptography. It is primarily intended as an introduction for graduate students. Readers should have basic knowledge of probability theory, but familiarity with computational complexity is not required. Starting from Shannon's classic result on secret key cryptography, fundamental topics of cryptography, such as secret key agreement, authentication, secret sharing, and secure computation, are covered. Particular attention is drawn to how correlated randomness can be used to construct cryptographic primitives. To evaluate the efficiency of such constructions, information-theoretic tools, such as smooth min/max entropies and information spectrum, are developed. The broad coverage means the book will also be useful to experts as well as students in cryptography as a reference for information-theoretic concepts and tools.
Applications of solar energy have been expanding in recent years across the world. This monograph details such far-reaching and important applications which have the potential for large impact on various segments of the society. It focuses solar energy technologies for various applications such as generation of electric power, heating, energy storage, etc. This volume will be a useful guide for researchers, academics and scientists.
This monograph describes the principles of information theoretic secrecy generation by legitimate parties with public discussion in the presence of an eavesdropper. The parties are guaranteed secrecy in the form of independence from the eavesdropper's observation of the communication. The focus is on secrecy generation in two settings: a multiterminal source model and a multiterminal channel model, in both of which the legitimate parties are given privileged access to correlated data of which the eavesdropper has only partial knowledge. Part I is concerned with basic technical tools for secrecy generation, many of which are potentially of independent interest beyond secrecy settings. Part II applies the methods of Part I to secrecy generation for the multiterminal source and channel models. Based largely on known recent results, this self-contained tutorial also includes new formulations with associated new proofs.
|
You may like...
|