Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Blockchain Beyond Bitcoin: A deep dive into the emerging technologies and innovations powered by blockchain, such as smart contracts, decentralized applications, digital identity, supply chain, voting, and more. Learn how blockchain works, why it matters, and how to use it for various purposes and industries.
A broad introduction to cryptography—what it is, how it really works, what its future holds, and why every informed citizen should understand its basics.We all keep secrets—from our gym locker codes to our email passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In this fascinating book Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets. Louridas explains just how cryptography works to keep our communications confidential, tracing it back all the way to its ancient roots. Then he follows its long and winding path to where we are today and reads the signs that point to where it may go tomorrow.A few years back, interest in cryptography was restricted to specialists. Today, as we all live our lives attuned to our digital footprint and the privacy issues it entails, it becomes more and more essential to have a basic understanding of cryptography and its applications to everyday life. Starting with classical cryptography, Cryptography takes the reader all the way up to the twenty-first century cryptographic applications that underpin our lives in the digital realm. Along the way, Louridas also explains concepts such as symmetric cryptography, asymmetric cryptography, cryptographic protocols and applications, and finally, quantum and post-Quantum cryptography as well as the links between cryptography and computer security.
This book constitutes revised selected papers from the 4th International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2023, which took place in Bizerte, Tunisia, on May 27, 2023.The 6 full papers included in this book were carefully reviewed and selected from 13 submissions. The book also contains one invited talk. The contributions focus on vehicular networks and emerging technologies and cyber safety and security of intelligent transportation systems.
This project was motivated by the upcoming fiftieth anniversary of the IFIP Human Choice and Computers (HCC) conference, the event that led to IFIP¿s Technical Committee 9 (TC 9). Although IFIP committees are mainly technical, TC 9 is dedicated to research at the intersection of information and communication technology (ICT) with society. In addition to sponsoring HCC, TC 9 supports groups that have specific research interests. In consultation with their members, the leaders of each group offer chapters about their groups¿ history and goals. An additional chapter describes TC 9¿s formation, and an appendix details the national groups that work closely with TC 9. Overall, this volume is a useful guide to the historical development of research on ICT and society, providing readers with important reference works and relevant themes, and also points to likely new trends in these domains.
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication.Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding.
A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionTLS is the most widely used cryptographic protocol today, enabling e-commerce, online banking, and secure online communication. TLS Cryptography in Depth will help you gain a deep understanding of how and why TLS works, how past attacks on TLS were possible, and how vulnerabilities that enabled them were addressed in the latest TLS version 1.3. By exploring the inner workings of TLS, you'll be able to configure it and use it more securely.Starting with the basic concepts, you'll be led step by step through the world of modern cryptography, guided by the TLS protocol. As you advance, you'll be learning about the necessary mathematical concepts from scratch. Even seemingly arcane topics such as public-key cryptography based on elliptic curves will be explained with a view on real-world applications in TLS. With easy-to-understand concepts, you'll find out how secret keys are generated and exchanged in TLS, and how they are used to create a secure channel between a client and a server.By the end of this book, you'll have understood the inner workings of TLS and how to configure TLS servers securely. Moreover, you'll have gained a deep knowledge of the cryptographic primitives that make up TLS and will be able to apply this knowledge in other security-related contexts.What you will learn- Understand TLS principles and protocols for secure internet communication- Find out how cryptographic primitives are used within TLS V1.3- Discover best practices for secure configuration and implementation of TLS- Evaluate and select appropriate cipher suites for optimal security- Get an in-depth understanding of common cryptographic vulnerabilities and ways to mitigate them- Explore forward secrecy and its importance in maintaining confidentiality- Understand TLS extensions and their significance in enhancing TLS functionalityWho this book is forThis book is for IT professionals, cybersecurity professionals, security engineers, cryptographers, software developers, and administrators looking to gain a solid understanding of TLS specifics and their relationship with cryptography. This book can also be used by computer science and computer engineering students to learn about key cryptographic concepts in a clear, yet rigorous way with its applications in TLS. There are no specific prerequisites, but a basic familiarity with programming and mathematics will be helpful.Table of Contents- The Role of Cryptography in the Connected World- Secure Channel and the CIA Triad- A Secret to Share- Encryption and Decryption- Entity Authentication- Transport Layer Security at a Glance- Public-Key Cryptography- Elliptic Curves- Digital Signatures- Digital Certificates and Certification Authorities- Hash Functions and Message Authentication Codes- Secrets and Keys in TLS 1.3- TLS Handshake Protocol Revisited- Block Ciphers and Their Modes of Operation- Authenticated Encryption- The Galois Counter Mode- TLS Record Protocol Revisited- TLS Cipher Suites- Attacks on Cryptography- Attacks on the TLS Handshake Protocol- Attacks on the TLS Record Protocol- Attacks on TLS Implementations
Blockchain is transforming far more than finance through an explosion of decentralized projects aiming to remake entire systems. This book illuminates the expanding universe of DePINs - Decentralized Projects -that leverage blockchain's unique capabilities to drive revolutionary change.Learn how DePINs are pioneering new models of grassroots innovation across crucial realms like energy, connectivity, identity, governance, environmental sustainability and economic inclusion. Early examples hint at how rearchitecting systems around participation and transparency unlocks unprecedented opportunities to rebuild outdated infrastructure and unsafeguarded data monopolies.The book guides readers through the emerging landscape, showcasing use cases and paradigms where decentralized solutions address systemic issues overlooked by legacy centralized systems and profit-driven disruptors. Clear explanations make the technologies accessible for non-experts, while emphasizing real-world challenges and benefits over hype.Ultimately this work reveals how the DePIN revolution promises a future that is not just decentralized but also greener, more equitable, collaborative and empowering. But this requires expanding imagination beyond existing constraints. The book aims to accelerate this critical mindset shift ahead.
Elpanorama financiero ha cambiado recientemente debido a las criptomonedas, que tienen los intereses de los inversores entodo el mundo. El auge de Bitcoin y la aparición de innumerables altcoins han transformado la industria de las criptomonedas en unhervidero de oportunidades lucrativas. Sin embargo, la gestión de este mercado volátil y complejo requiere una comprensión profunda de sus complejidades y un enfoque estratégico de las inversiones.Bienvenido a "Inversión en criptomonedas: navegando por el mercado de criptomonedas - Estrategias y consejos para inversionesrentables". Profundizaremos en el mundo de las criptomonedas en este libro electrónico y le brindaremos información perspicaz,estrategias rentables y consejos para ayudarlo a tomar decisiones acertadas.El capítulo inicial del libro electrónico proporcionará la base para comprender las criptomonedas guiándolo a través de su definiciónfundamental y muchas variedades. Analizaremos sus cualidades distintivas y trazaremos su evolución para comprender mejor surelevancia en el mundo financiero.Invertir en criptomonedas conlleva sus propios riesgos y desafíos, al igual que cualquier otro tipo de inversión. En el siguiente capítulo,abordaremos estos problemas de frente hablando de la volatilidad del mercado, los problemas legales, los riesgos de seguridad y los fraudes frecuentes a los que hay que prestar atención. Con esta información, estarás más preparado para proteger tus inversiones.
This book constitutes the refereed proceedings of the 22nd IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2023, held in Curitiba, Brazil, during November 9¿11, 2023.The 29 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 68 submissions. The contributions were organized in topical sections as follows: Artificial Intelligence and Algorithm; Digital Transformation and New Technologies; and Sustainable Technologies and Smart Cities.
Join Molly on an adventure through time and space to explore inventions that changed the world. See the impact of these inventions and imagine how new inventions like Bitcoin can impact the future through 27 rich illustrations.
This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence.The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity.During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies.Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.
This book takes readers through the sensational history of blockchains and their potential to revolutionize database systems of the future. In order to demystify blockchains, the book capitalizes on decades of research and field testing of existing database and distributed systems and applies these familiar concepts to the novel blockchain system. It then utilizes this framework to explore the essential block platform underpinning blockchains, which is often misunderstood as a specific attribute of cryptocurrencies rather than the core of the decentralized system independent of application. The book explores the nature of these decentralized systems, which have no single owner and build robustness through a multitude of stakeholder contributions. In this way, blockchains can build trust into existing systems and thus present attractive solutions for various domains across both academia and industry. Despite this, high-impact and real-world applications of blockchain have yet to be realized outside of cryptocurrencies like Bitcoin. The book establishes how this new data system, if properly applied, can disrupt the sector in much the same way databases did so many years ago. The book explores the fundamental technical limitations that may be preventing blockchain from realizing this potential and how to overcome or mitigate them. Readers who are completely new to blockchains will find this book to be a comprehensive survey of the state of the art in blockchain technology. Readers with some experience of blockchains, for example through developing cryptocurrencies, will likely find the book's database perspective enlightening. Finally, researchers already working with blockchain will learn to identify existing gaps in the design space and explore potential solutions for creating the next generation of blockchain systems.
¿This book constitutes the revised selected papers from the workshops affiliated with the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which took place in Bol, Brä, Croatia, in May 2023. The 7 full papers presented in this book were carefully reviewed and selected from 18 submissions. They stem from the following workshops:CoDecFin 2022: 3rd Workshop on Coordination of Decentralized FinanceDeFi 2022: 2nd Workshop on Decentralized FinanceVoting 2022: 7th Workshop on Advances in Secure Electronic VotingWTSC 2022: 6th Workshop on Trusted Smart Contracts
This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023.The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.
The textbook presents basic concepts of signals and systems in a clear manner, based on the author's 15+ years of teaching the undergraduate course for engineering students. To attain full benefit from the content, readers should have a strong knowledge of calculus and be familiar with integration, differentiation, and summation operations. The book starts with an introduction to signals and systems and continues with coverage of basic signal functions and their manipulations; energy, power, convolution, and systems; Fourier analysis of continuous time signals and digital signals; Laplace transform; and Z transforms. Practical applications are included throughout. The book is also packed with solved examples, self-study exercises, and end of chapter problems.
This book introduces readers to the fundamentals of and recent advances in federated learning, focusing on reducing communication costs, improving computational efficiency, and enhancing the security level. Federated learning is a distributed machine learning paradigm which enables model training on a large body of decentralized data. Its goal is to make full use of data across organizations or devices while meeting regulatory, privacy, and security requirements. The book starts with a self-contained introduction to artificial neural networks, deep learning models, supervised learning algorithms, evolutionary algorithms, and evolutionary learning. Concise information is then presented on multi-party secure computation, differential privacy, and homomorphic encryption, followed by a detailed description of federated learning. In turn, the book addresses the latest advances in federate learning research, especially from the perspectives of communication efficiency, evolutionary learning, and privacy preservation.The book is particularly well suited for graduate students, academic researchers, and industrial practitioners in the field of machine learning and artificial intelligence. It can also be used as a self-learning resource for readers with a science or engineering background, or as a reference text for graduate courses.
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.Topics and features:* Covers the essential standards in Internet cryptography* Integrates work exercises and problems in each chapter* Focuses especially on IPsec, secure e-mail and TLS* Summarizes real-world cryptography in three introductory chapters* Includes necessary background from computer networks* Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes* Provides additional background on web security in two concluding chaptersOffering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.Professor Dr. Jorg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book's topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.
This wide-ranging book introduces information as a key concept not only in physics, from quantum mechanics to thermodynamics, but also in the neighboring sciences and in the humanities. The central part analyzes dynamical processes as manifestations of information flows between microscopic and macroscopic scales and between systems and their environment. Quantum mechanics is interpreted as a reconstruction of mechanics based on fundamental limitations of information processing on the smallest scales. These become particularly manifest in quantum chaos and in quantum computing. Covering subjects such as causality, prediction, undecidability, chaos, and quantum randomness, the book also provides an information-theoretical view of predictability. More than 180 illustrations visualize the concepts and arguments. The book takes inspiration from the author's graduate-level topical lecture but is also well suited for undergraduate studies and is a valuable resource for researchers and professionals.
This book constitutes the refereed proceedings of the 17th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2022, which was supposed to be held in Lima, Peru, in May 2021, but was held virtually instead due to the COVID-19 pandemic.The 40 revised full papers presented were carefully reviewed and selected from 58 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: digital platforms and gig economy; education and health; inclusion and participation; and business innovation and data privacy.
Fifty years after the first experiments in computational art, international interest in the history of this subject remains strong and at the same time almost uncovered. This book began with the exhibition Algorithmic Signs, which was conceived, researched and curated by Francesca Franco in Venice in 2017. The origins of the exhibition included a series of meetings that gathered together the most celebrated international pioneers in the world of digital arts and the rare opportunity to interview them in their studios.Francesca Franco explores the history of computer art and its contribution to the broader field of contemporary art from the 1960s to the present. It is illustrated by the creative work of five of the most influential pioneers of computer art - Ernest Edmonds, Manfred Mohr, Vera Molnár, Frieder Nake, and Roman Verostko and includes the full visual documentation of the exhibition.The Algorithmic Dimension - Five Artists in Conversation offersmore than a theoretical perspective; it offers readers the rare opportunity to hear the histories and developments of the fascinating art, created through the algorithm, in an accessible and stimulating narrative. The personal achievements of each artist are followed, including their original inspirations, and how they develop in parallel with technological advances. It also brings together for the first time the artists' common ideas and differences, and tales about how their paths have crossed over the years.
This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the individual ecosystems of cryptography and AI to show the omnipresence of each technology in the ecosystem of the other one. Next, they show how these technologies have come together in collaborative or adversarial ways. In the next section, the authors highlight the coevolution being formed between cryptography and AI. Throughout the book, the authors use evidence from state-of-the-art research to look ahead at the future of the crypto-AI dichotomy. The authors explain how they anticipate that quantum computing will join the dichotomy in near future, augmenting it to a trichotomy. They verify this through two case studies highlighting another scenario wherein crypto, AI and quantum converge. The authors study current trends in chaotic image encryption as well as information-theoretic cryptography and show how these trends lean towards quantum-inspired artificial intelligence (QiAI). After concluding the discussions, the authors suggest future research for interested researchers.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.