Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 8 of 8 matches in All Departments
Coding theory and cryptography allow secure and reliable data transmission, which is at the heart of modern communication. Nowadays, it is hard to find an electronic device without some code inside. Grobner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in theoretical contexts and in practical situations. This book is the first book ever giving a comprehensive overview on the application of commutative algebra to coding theory and cryptography. For example, all important properties of algebraic/geometric coding systems (including encoding, construction, decoding, list decoding) are individually analysed, reporting all significant approaches appeared in the literature. Also, stream ciphers, PK cryptography, symmetric cryptography and Polly Cracker systems deserve each a separate chapter, where all the relevant literature is reported and compared. While many short notes hint at new exciting directions, the reader will find that all chapters fit nicely within a unified notation."
Coding theory and cryptography allow secure and reliable data transmission, which is at the heart of modern communication. Nowadays, it is hard to find an electronic device without some code inside. Grobner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in theoretical contexts and in practical situations. This book is the first book ever giving a comprehensive overview on the application of commutative algebra to coding theory and cryptography. For example, all important properties of algebraic/geometric coding systems (including encoding, construction, decoding, list decoding) are individually analysed, reporting all significant approaches appeared in the literature. Also, stream ciphers, PK cryptography, symmetric cryptography and Polly Cracker systems deserve each a separate chapter, where all the relevant literature is reported and compared. While many short notes hint at new exciting directions, the reader will find that all chapters fit nicely within a unified notation."
This book constitutes revised selected papers from the workshops that were affiliated with the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. FC 2022 presents the following four workshops: CoDecFin 2022: 3rd Workshop on Coordination of Decentralized Finance DeFi 2022: 2nd Workshop on Decentralized FinanceVoting 2022: 7th Workshop on Advances in Secure Electronic VotingWTSC 2022: 6th Workshop on Trusted Smart Contracts
This book constitutes the refereed proceedings of four workshops held at the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held virtually, in March 2021.The workshops are as follows: CoDecFin: The Second Workshop on Coordination of Decentralized Finance DeFi 2021 : First Workshop on Decentralized Finance VOTING 2021: Sixth Workshop on Advances in Secure Electronic Voting WTSC 2021: Fifth Workshop on Trusted Smart Contracts
This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020, in Kota Kinabalu, Malaysia, in February 2020. The 39 full papers and 3 short papers presented in this book were carefully reviewed and selected from 73 submissions. The papers feature four Workshops: The 1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020. The AsiaUSEC Workshop contributes an increase of the scientific quality of research in human factors in security and privacy. In terms of improving efficacy of secure systems, the research included an extension of graphical password authentication. Further a comparative study of SpotBugs, SonarQube, Cryptoguard and CogniCrypt identified strengths in each and refined the need for improvements in security testing tools. The CoDeFi Workshop discuss multi-disciplinary issues regarding technologies and operations of decentralized finance based on permissionless blockchain. The workshop consists of two parts; presentations by all stakeholders, and unconference style discussions. The VOTING Workshop cover topics like new methods for risk-limited audits, new ethods to increase the efficiency of mixnets, verification of security of voting schemes election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems, and new way of preventing voteselling by de-incentivising this via smart contracts. The WTSC Workshop focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of specialized blockchains.
This book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St. Kitts, St. Kitts and Nevis, in February 2019.The 20 full papers and 4 short papers presented in this book were carefully reviewed and selected from 34 submissions.The papers feature the outcome of the 4th Workshop on Advances in Secure Electronic Voting, VOTING 2019 and the Third Workshop on Trusted Smart Contracts, WTSC 2019. VOTING covered topics like election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems.WTSC focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of (specialized) blockchains.
This book constitutes the refereed proceedings of 3 workshops held at the 22nd International Conference on Financial Cryptography and Data Security, FC 2018, in Nieuwport, Curacao, in March 2018. The 23 full papers presented together with 2 short papers were carefully reviewed and selected from 52 submissions. They feature the outcome of the 5th Workshop on Bitcoin and Blockchain Research, BITCOIN 2018, the Third Workshop onSecure Voting Systems, VOTING 2018,and the Second Workshop on Trusted Smart Contracts, WTSC 2018. The papers are grouped in topical sections named: Blockchain, Distributed Ledgers, Cryptography, Bitcoin, Voting, and Smart Contracts.
This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017.The 39 full papers presented were carefully reviewed and selected from 96 submissions. They feature the outcome of the 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, the 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, the Second Workshop on Secure Voting Systems, VOTING 2017, the First Workshop on Trusted Smart Contracts, WTSC 2017, and the First Workshop on Targeted Attacks, TA 2017.The papers are grouped in topical sections named: encrypted computing and applied homomorphic cryptography; bitcoin and blockchain research; advances in secure electronic voting schemes; trusted smart contracts; targeted attacks.
|
You may like...
Wild About You - A 60-Day Devotional For…
John Eldredge, Stasi Eldredge
Hardcover
R309
Discovery Miles 3 090
|