Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.Ved tilmelding accepterer du vores persondatapolitik.
Du kan altid afmelde dig igen.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India-Kolkata Chapter, India, during December 2-4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.
Blockchain is an emerging technology platform for developing decentralized applications and data storage, over and beyond its role as the technology underlying the cryptocurrencies. The basic tenet of this platform is that it allows one to create a distributed and replicated ledger of events, transactions, and data generated through various IT processes with strong cryptographic guarantees of tamper resistance, immutability, and verifiability. Public blockchain platforms allow us to guarantee these properties with overwhelming probabilities even when untrusted users are participants of distributed applications with the ability to transact on the platform. Even though, blockchain technology has become popularly known because of its use in the implementation of cryptocurrencies such as BitCoin, Ethereum, etc.; the technology itself holds much more promise in various areas such as time stamping, logging of critical events in a system, recording of transactions, trustworthy e-governance, etc. It introduces theoretical and practical aspects of blockchain technology. The book includes an in-depth insight into the need for decentralization, smart contracts, consensus both permissioned and permissionless, and various blockchain development frameworks, tools, and platforms. It can be used as a learning resource for various examinations and certifications related to cryptocurrency and blockchain technology. This book explained the nuts and bolts of blockchain technology in lucid language to make students more familiar with the implementation perspective of this much-needed technology.
This book is a collection of chapters from the IFIP working groups 13.8 and 9.4. The 10 papers included present experiences and research on the topic of digital transformation and innovation practices in the global south. The topics span from digital transformation initiatives to novel innovative technological developments, practices and applications of marginalised people in the global south.
This volume constitutes the papers of several workshops which were held in conjunction with the 27th International Conference on Database Systems for Advanced Applications, DASFAA 2022, held as virtual event in April 2022.The 30 revised full papers presented in this book were carefully reviewed and selected from 65 submissions. DASFAA 2022 presents the following five workshops:nbsp; First workshop on Pattern mining and Machine learning in Big complex Databases (PMBD 2021)nbsp; 6th International Workshop on Graph Data Management and Analysis (GDMA 2022)nbsp; First International Workshop on Blockchain Technologies (IWBT2022)nbsp; 8th International Workshop on Big Data Management and Service (BDMS 2022)nbsp; First workshop on Managing Air Quality Through Data Sciencenbsp; 7th International Workshop on Big Data Quality Management (BDQM 2022).
This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021.The 10 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: web and apps; context and modelling; and from the present to the future.
This book constitutes the refereed proceedings of the 52nd International Simulation and Gaming Association Conference, ISAGA 2021, held in Indore, India, during September 6-10, 2021. The 24 full papers included in this book were carefully reviewed and selected from 58 submissions. They were organized in topical sections as follows: game design and facilitation; gaming in education; player experience in simulations; and policy formulation and serious games.
This book constitutes the refereed proceedings of the 15th International Baltic Conference on Digital Business and Intelligent Systems, Baltic DB&IS 2022, held in Riga, Latvia, in July 2022. The 16 revised full papers and 1 short paper presented were carefully reviewed and selected from 42 submissions. The papers are centered around topics like architectures and quality of information systems, artificial intelligence in information systems, data and knowledge engineering, enterprise and information systems engineering, security of information systems.
This book constitutes the refereed proceedings of the Third International Conference on Next Generation Arithmetic, CoNGA 2022, which was held in Singapore, during March 1-3, 2022. The 8 full papers included in this book were carefully reviewed and selected from 12 submissions. They deal with emerging technologies for computer arithmetic focusing on the demands of both AI and high-performance computing.
The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.
This book constitutes the refereed proceedings of the 6th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2022, held in Be'er Sheva, Israel, in June - July 2022.The 24 full and 11 short papers presented together with a keynote paper in this volume were carefully reviewed and selected from 53 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.
This book offers a structured algebraic and geometric approach to the classification and construction of quantum codes for topological quantum computation. It combines key concepts in linear algebra, algebraic topology, hyperbolic geometry, group theory, quantum mechanics, and classical and quantum coding theory to help readers understand and develop quantum codes for topological quantum computation.One possible approach to building a quantum computer is based on surface codes, operated as stabilizer codes. The surface codes evolved from Kitaev's toric codes, as a means to developing models for topological order by using qubits distributed on the surface of a toroid. A significant advantage of surface codes is their relative tolerance to local errors. A second approach is based on color codes, which are topological stabilizer codes defined on a tessellation with geometrically local stabilizer generators. This book provides basic geometric concepts, like surface geometry, hyperbolic geometry and tessellation, as well as basic algebraic concepts, like stabilizer formalism, for the construction of the most promising classes of quantum error-correcting codes such as surfaces codes and color codes.The book is intended for senior undergraduate and graduate students in Electrical Engineering and Mathematics with an understanding of the basic concepts of linear algebra and quantum mechanics.
This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissionsThe papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.
This book constitutes the refereed proceedings of the 15th IFIP TC 9 International Conference on Human Choice and Computers, HCC15 2022, in Tokyo, Japan, in September 2022.The 17 full papers presented were carefully reviewed and selected from 32 submissions. Summaries of 2 keynote presentations are also included. The papers deal with the constantly evolving intimate relationship between humans and technology.
This book constitutes the refereed proceedings of the 19th International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022. The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The EPCE 2022 proceedings covers subjects such as advances in applied cognitive psychology that underpin the theory, measurement and methodologies behind the development of human-machine systems. Cognitive Ergonomics describes advances in the design and development of user interfaces.
This book constitutes the refereed proceedings of the 11th International Conference on Design, User Experience, and Usability, DUXU 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022.The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions.The DUXU 2022 proceedings comprise three volumes; they were organized in the following topical sections: Part I: Processes, Methods, and Tools for UX Design and Evaluation; User Requirements, Preferences, and UX Influential Factors; Usability, Acceptance, and User Experience Assessment.Part II: Emotion, Motivation, and Persuasion Design; Design for Well-being and Health.- Learning Experience Design; Globalization, Localization, and Culture Issues.Part III: Design Thinking and Philosophy; DUXU Case Studies; Design and User Experience in Emerging Technologies.
This two-volume set constitutes the refereed proceedings of the 8th International Conference on Human Aspects of IT for the Aged Population, ITAP 2022, held as part of the 24th International Conference, HCI International 2022, held as a virtual event, during June-July 2022.ITAP 2022 includes a total of 75 papers, which focus on topics related to designing for and with older users, technology acceptance and user experience of older users, use of social media and games by the aging population, as well as applications supporting health, wellbeing, communication, social participation and everyday activities. The papers are divided into the following topical sub-headings.Part I: Aging, Design and Gamification; Mobile, Wearable and Multimodal Interaction for Aging; Aging, Social Media and Digital Literacy; and Technology Acceptance and Adoption: Barriers and Facilitators for Older AdultsPart II: Intelligent Environment for Daily Activities Support; Health and Wellbeing Technologies for the Elderly; and Aging, Communication and Social Interaction.
This book constitutes the refereed proceedings of the 4th International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022. The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The HCI-CPT 2022 proceedings focuses on to user privacy and data protection, trustworthiness and User Experience in cybersecurity, multi-faceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments, as well as the impact of the Covid-19 pandemic on cybersecurity
The theory developed for 4-additive codes is the starting point for much generalization about codes over mixed alphabets. They have opened a new, emergent area of research. The techniques used for 4-linear codes are being generalized and applied to more general codes. By example, these codes have contributed to the classification of many nonlinear codes. Moreover, they can be considered as the starting point of many different generalizations given over mixed alphabets, thereby representing a useful area of research. Since 2010, more than 30 papers have been published about the codes considered in the book, which includes important classes of binary codes (1-perfect, Hadamard, etc.) that are not linear in general. For example, much recent research has shown the application of the techniques described for the family of cyclic 4-linear codes. Topics and Features:Examines everything from the basic definitions to very advanced results Provides numerous examples, succinctly and comprehensively gathering and using the relevant information Includes examples using commands from a new Magma package, developed mostly by the same authors Proposes algorithms, for instance to describe coding and decoding strategiesThis unique volume will be eminently suitable for researchers working on coding theory over rings, especially over mixed alphabets. Experts will find commands and algorithms that will be useful in the generalization to codes over mixed alphabets. Additionally, by outlining the basic theory of codes over mixed alphabets and providing numerous examples, the book will be useful to researchers wanting to be introduced to the topic.The authors are all affiliated with the Dept. of Information and Communications Engineering at the Universitat Autonoma de Barcelona, Spain. Joaquim Borges and Cristina Fernandez-Cordoba are Associate Professors, Jaume Pujol is a now retired Associate Professor, Josep Rifa is Professor Emeritus, and Merce Villanueva is Associate Professor.
The three-volume set LNCS 13302, 13303 and 13304 constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 24th International Conference on Human-Computer Interaction, HCII 2022, which took place virtually in June-July 2022.The 132 papers included in this HCI 2022 proceedings were organized in topical sections as follows:Part I: Theoretical and Multidisciplinary Approaches in HCI; Design and Evaluation Methods, Techniques and Tools; Emotions and Design; and Children-Computer Interaction,Part II: Novel Interaction Devices, Methods and Techniques; Text, Speech and Image Processing in HCI; Emotion and Physiological Reactions Recognition; and Human-Robot Interaction,Part III: Design and User Experience Case Studies, Persuasive Design and Behavioral Change; and Interacting with Chatbots and Virtual Agents.
This book constitutes the refereed proceedings of the Third International Conference on Design, Operation and Evaluation of Mobile Communications, MOBILE 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022. The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions.The MOBILE 2022 proceedings were organized in the following topical sections: Designing Mobile Interactions and Systems; User Experience and Adoption of Mobile Communications; Mobile Commerce and Advertising; Mobile Interactions with Agents; Emerging Mobile Technologies.
This book constitutes the proceedings of the 4th International Conference on 6G for Future Wireless Networks, 6GN 2021, held in Huizhou, China, in October 2021. The 63 full papers were selected from 136 submissions and present the state of the art and practical applications of 6G technologies. The papers are arranged thematically in tracks as follows: Advanced Communication and Networking Technologies for 5G/6G Networks; Advanced Signal Processing Technologies for 5G/6G Networks; and Educational Changes in The Age of 5G/6G.
Near-infrared astronomy has become one of the most rapidly developing branches in modern astrophysics. Innovative observing techniques, near-infrared detectors with quantum efficiencies in excess of 90%, highly specialised instruments as well as advanced data reduction techniques have allowed major breakthroughs in various areas like exoplanets, star-forming regions, the supermassive black hole in the Galactic center, and the high-redshift Universe.In this book, the reader will be introduced to the basic concepts of how to prepare near-infrared observations with maximized scientific return. Equal weight is given to all aspects of the data reduction for both - imaging and spectroscopy. Information is also provided on the state of the art instrumentation available and planned, on detector technology or the physics of the atmosphere, all of which influence the preparation and execution of observations and data reduction techniques. The beginner but also the expert will find a lot of information in compact form which is otherwise widely dispersed across the internet or other sources.
Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear. The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book. The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided.