0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Restricted Congruences in Computing (Hardcover): Khodakhast Bibak Restricted Congruences in Computing (Hardcover)
Khodakhast Bibak
R1,666 Discovery Miles 16 660 Ships in 10 - 15 working days

Congruences are ubiquitous in computer science, engineering, mathematics, and related areas. Developing techniques for finding (the number of) solutions of congruences is an important problem. But there are many scenarios in which we are interested in only a subset of the solutions; in other words, there are some restrictions. What do we know about these restricted congruences, their solutions, and applications? This book introduces the tools that are needed when working on restricted congruences and then systematically studies a variety of restricted congruences. Restricted Congruences in Computing defines several types of restricted congruence, obtains explicit formulae for the number of their solutions using a wide range of tools and techniques, and discusses their applications in cryptography, information security, information theory, coding theory, string theory, quantum field theory, parallel computing, artificial intelligence, computational biology, discrete mathematics, number theory, and more. This is the first book devoted to restricted congruences and their applications. It will be of interest to graduate students and researchers across computer science, electrical engineering, and mathematics.

Perfect Secrecy in IoT - A Hybrid Combinatorial-Boolean Approach (Hardcover, 1st ed. 2022): Behrouz Zolfaghari, Khodakhast Bibak Perfect Secrecy in IoT - A Hybrid Combinatorial-Boolean Approach (Hardcover, 1st ed. 2022)
Behrouz Zolfaghari, Khodakhast Bibak
R2,638 Discovery Miles 26 380 Ships in 18 - 22 working days

Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step towards this goal via presenting a hybrid combinatorial-Boolean model for perfectly-secure cryptography in IoT. In this book, we first present an introduction to information-theoretic cryptography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergence point for existing trends in research on cryptography in IoT. Then we investigate combinatorial and Boolean cryptography and show how they are seen almost everywhere in the ecosystem and the life cycle of information-theoretic IoT cryptography. We finally model perfect secrecy in IoT using Boolean functions, and map the Boolean functions to simple, well-studied combinatorial designs like Latin squares. This book is organized in two parts. The first part studie s information-theoretic cryptography and the promise it holds for cryptography in IoT. The second part separately discusses combinatorial and Boolean cryptography, and then presents the hybrid combinatorial-Boolean model for perfect secrecy in IoT.

Restricted Congruences in Computing (Paperback): Khodakhast Bibak Restricted Congruences in Computing (Paperback)
Khodakhast Bibak
R717 Discovery Miles 7 170 Ships in 10 - 15 working days

Congruences are ubiquitous in computer science, engineering, mathematics, and related areas. Developing techniques for finding (the number of) solutions of congruences is an important problem. But there are many scenarios in which we are interested in only a subset of the solutions; in other words, there are some restrictions. What do we know about these restricted congruences, their solutions, and applications? This book introduces the tools that are needed when working on restricted congruences and then systematically studies a variety of restricted congruences. Restricted Congruences in Computing defines several types of restricted congruence, obtains explicit formulae for the number of their solutions using a wide range of tools and techniques, and discusses their applications in cryptography, information security, information theory, coding theory, string theory, quantum field theory, parallel computing, artificial intelligence, computational biology, discrete mathematics, number theory, and more. This is the first book devoted to restricted congruences and their applications. It will be of interest to graduate students and researchers across computer science, electrical engineering, and mathematics.

Statistical Trend Analysis of Physically Unclonable Functions - An Approach via Text Mining (Hardcover): Behrouz Zolfaghari,... Statistical Trend Analysis of Physically Unclonable Functions - An Approach via Text Mining (Hardcover)
Behrouz Zolfaghari, Khodakhast Bibak, Takeshi Koshiba, Hamid R. Nemati, Pinaki Mitra
R1,513 Discovery Miles 15 130 Ships in 10 - 15 working days

Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGA industry, several other areas in communications and related technologies, and many commercial products. Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. The review highlights PUF as a mega trend in research on cryptographic hardware design. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. As part of the survey aspect, a state-of-the-art analysis is presented as well as a taxonomy on PUFs, a life cycle, and an established ecosystem for the technology. In another part of the survey, the evolutionary history of PUFs is examined, and strategies for further research in this area are suggested. In the research side, this book presents a novel approach for trend analysis that can be applied to any technology or research area. In this method, a text mining tool is used which extracts 1020 keywords from the titles of the sample papers. Then, a classifying tool classifies the keywords into 295 meaningful research topics. The popularity of each topic is then numerically measured and analyzed over the course of time through a statistical analysis on the number of research papers related to the topic as well as the number of their citations. The authors identify the most popular topics in four different domains; over the history of PUFs, during the recent years, in top conferences, and in top journals. The results are used to present an evolution study as well as a trend analysis and develop a roadmap for future research in this area. This method gives an automatic popularity-based statistical trend analysis which eliminates the need for passing personal judgments about the direction of trends, and provides concrete evidence to the future direction of research on PUFs. Another advantage of this method is the possibility of studying a whole lot of existing research works (more than 700 in this book). This book will appeal to researchers in text mining, cryptography, hardware security, and IoT.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
In Loving Memory Funeral Guest Book…
Lollys Publishing Hardcover R577 Discovery Miles 5 770
Speculate - A Collection of Microlit
Eugen Bacon, Dominique Hecq Hardcover R493 Discovery Miles 4 930
Dearest MaRiky - A Mother’s Journey…
Louisa Zondo Paperback  (1)
R280 R259 Discovery Miles 2 590
Hadeda la land: A new Madam and Eve…
Stephen Francis Paperback R220 R203 Discovery Miles 2 030
A History of the Labour Party from 1914
G.D.H. Cole Hardcover R4,679 Discovery Miles 46 790
Madam & Eve: Family Meeting
Stephen Francis Paperback R220 R203 Discovery Miles 2 030
The Socialist Ideal in the Labour Party…
Martin R. Beveridge Paperback R467 Discovery Miles 4 670
The Thabo Mbeki I Know
Sifiso Ndlovu, Miranda Strydom Paperback  (3)
R399 R362 Discovery Miles 3 620
Six Scorched Roses
Carissa Broadbent Paperback  (1)
R385 R349 Discovery Miles 3 490
Elon Musk - How The Billionaire CEO Of…
Ashlee Vance Paperback  (5)
R345 R318 Discovery Miles 3 180

 

Partners