Udvidet returret til d. 31. januar 2025

Kodeteori og kryptologi

Her finder du spændende bøger om Kodeteori og kryptologi. Nedenfor er et flot udvalg af over 380 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Duncan Buell
    477,95 kr.

    Die Kryptographie, wie sie in diesem Jahrhundert betrieben wird, ist stark mathematisch geprägt. Aber sie hat auch ihre Wurzeln in dem, was rechnerisch machbar ist.In diesem einzigartigen Lehrbuch werden die Theoreme der Mathematik gegen die Machbarkeit von Berechnungen abgewogen. Kryptografie ist etwas, das man tatsächlich "macht", kein mathematisches Spiel, über das man Theoreme beweist. Es gibt tiefgründige Mathematik; es gibt einige Theoreme, die bewiesen werden müssen; und es besteht die Notwendigkeit, die brillante Arbeit derjenigen anzuerkennen, die sich auf die Theorie konzentrieren. Auf der Ebene eines Grundstudiums sollte der Schwerpunkt jedoch zunächst darauf liegen, die Algorithmen zu kennen und zu verstehen und zu wissen, wie sie zu implementieren sind, und sich auch bewusst zu machen, dass die Algorithmen sorgfältig implementiert werden müssen, um die "einfachen" Wege zum Brechen der Kryptografie zu vermeiden. Dieser Text deckt die algorithmischen Grundlagen ab und wird durch Kernmathematik und Arithmetik ergänzt.

  • af Elizabeth A. Quaglia
    485,95 kr.

    This book constitutes the proceedings of the 19th IMA International Conference, IMACC 2023, held in London, UK, during December 12¿14, 2023The 14 full papers included in this volume were carefully reviewed and selected from 36 submissions. This volume presents cutting-edge results in a variety of areas, including coding theory, symmetric cryptography, zeroknowledge protocols, digital signature schemes and extensions, post-quantum cryptography and cryptography in practice.

  • af Lothar Fritsch
    1.203,95 kr.

    This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16¿17, 2023.The 18 full papers included in this volume were carefully reviewed and selected from 55 submissions. This volume focuses on a broad range of topics within IT security and privacy.

  • af Paolo Santini
    562,95 kr.

    This book constitutes the refereed proceedings of the 11th International Conference on Code-Based Cryptography, CBCrypto 2023, held in Lyon, France, during April 22¿23, 2023. The 8 full papers included in this book were carefully reviewed and selected from 28 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms.

  • af Diana Kelley
    547,95 kr.

    Plan, design, and build resilient security architectures to secure your organization's hybrid networks, cloud-based workflows, services, and applications Key FeaturesUnderstand the role of the architect in successfully creating complex security structuresLearn methodologies for creating architecture documentation, engaging stakeholders, and implementing designsUnderstand how to refine and improve architecture methodologies to meet business challengesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionCybersecurity architecture is the discipline of systematically ensuring that an organization is resilient against cybersecurity threats. Cybersecurity architects work in tandem with stakeholders to create a vision for security in the organization and create designs that are implementable, goal-based, and aligned with the organization's governance strategy.Within this book, you'll learn the fundamentals of cybersecurity architecture as a practical discipline. These fundamentals are evergreen approaches that, once mastered, can be applied and adapted to new and emerging technologies like artificial intelligence and machine learning. You'll learn how to address and mitigate risks, design secure solutions in a purposeful and repeatable way, communicate with others about security designs, and bring designs to fruition. This new edition outlines strategies to help you work with execution teams to make your vision a reality, along with ways of keeping designs relevant over time. As you progress, you'll also learn about well-known frameworks for building robust designs and strategies that you can adopt to create your own designs.By the end of this book, you'll have the foundational skills required to build infrastructure, cloud, AI, and application solutions for today and well into the future with robust security components for your organization.What you will learnCreate your own architectures and analyze different modelsUnderstand strategies for creating architectures for environments and applicationsDiscover approaches to documentation using repeatable approaches and toolsDiscover different communication techniques for designs, goals, and requirementsFocus on implementation strategies for designs that help reduce riskApply architectural discipline to your organization using best practicesWho this book is forThis book is for new as well as seasoned cybersecurity architects looking to explore and polish their cybersecurity architecture skills. Additionally, anyone involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization can benefit from this book. If you are a security practitioner, systems auditor, and (to a lesser extent) software developer invested in keeping your organization secure, this book will act as a reference guide. Table of ContentsWhat is Cybersecurity Architecture?Architecture - The Core of Solution BuildingBuilding an Architecture - Scope and RequirementsBuilding an Architecture - Your ToolboxBuilding an Architecture - Developing Enterprise BlueprintsBuilding an Architecture - Application BlueprintsExecution - Applying Architecture ModelsExecution - Future-ProofingPutting It All Together

  • af Felix Ryder
    207,95 kr.

    Welcome to "Bitcoin: Mastering the World of Cryptocurrency - Your Ultimate Handbook on Bitcoin". This e-book is your in-depth guide to the intriguing world of Bitcoin and the larger cryptocurrency landscape. This guide is created to meet your needs, whether you're a curious beginner trying to grasp what all the fuss is about, a casual trader looking to expand your knowledge, or an experienced investor looking to stay on the cutting edge of the crypto world.The financial industry is evolving from what we once knew. There are now other ways to carry out transactions, make investments, and store value besides using traditional fiat currencies. A new type of decentralized digital currency built on the blockchain technology was made possible by the 2009 invention of Bitcoin. In addition to being well-known today, Bitcoin also sparked a technological revolution and gave rise to dozens of alternative cryptocurrencies.

  • af Mingwu Zhang
    826,95 kr.

    This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.

  • af Susan M. Kim
    1.104,95 kr.

    This edited collection of essays brings together scholars across disciplines who consider the collaborative work of John Matthews Manly and Edith Rickert, philologists, medievalists and early modernists, cryptologists, and education reformers. These pioneers crafted interdisciplinary partnerships as they modeled and advocated for cooperative alliances at every level of their work and in all their academic relationships. Their extensive network of intellectual partnerships made possible groundbreaking projects, from the eight-volume Text of the Canterbury Tales (1940) to the deciphering of the Waberski Cipher, yet, except for their Chaucer work, their many other accomplishments have received little attention. Collaborative Humanities Research and Pedagogy not only surveys the rich range of their work but also emphasizes the transformative intellectual and pedagogical benefits of collaboration.

  • af Ashish Choudhury
    485,95 - 617,95 kr.

    This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.

  • af Jing Deng
    935,95 kr.

    This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.

  • af Marten van Sinderen
    658,95 - 919,95 kr.

  • af Baruch Schieber
    936,95 kr.

    This book constitutes the proceedings of 25th International Symposium, SSS 2023, in Jersey City, NJ, USA, in October 2023.The 32 full papers presented together with 8 short papers were carefully reviewed and selected from 78 submissions. The conference was organized into five tracks reflecting major trends related to the conference: (i) Track A. Self-stabilizing Systems:Theory and Practice, (ii) Track B. Distributed and Concurrent Computing:Foundations, Fault-Tolerance and Scalability, (iii) Track C. Cryptogrophy and Security, (iv) Track D. Dynamic, Mobile and Nature-Inspired Computing MobileAgents, (v) and Distributed Databases.

  • af Amany Elbanna
    1.108,95 - 1.117,95 kr.

    This volume, IFIP AICT 660, constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "e;Co-creating for Context in Prospective Transfer and Diffusion of IT"e; on Transfer and Diffusion of IT, TDIT 2022, held in Maynooth, Ireland, during June 15-16, 2022.The 19  full papers and 10 short papers presented were carefully reviewed and selected from 60 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts:

  • af Robert Nowak
    1.118,95 - 1.127,95 kr.

    This book constitutes the refereed proceedings of the 22nd International TRIZ Future Conference on Automated Invention for Smart Industries, TFC 2022, which took place in Warsaw, Poland, in September 2022; the event was sponsored by IFIP WG 5.4.The 39 full papers presented were carefully reviewed and selected from 43 submissions. They are organized in the following thematic sections: New perspectives of TRIZ; AI in systematic innovation; systematic innovations supporting IT and AI; TRIZ applications; TRIZ education and ecosystem.

  • af Mehdi Tibouchi
    773,95 kr.

    This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Symmetric-Key Cryptography; Multi-Party Computation; Isogeny-Based Cryptography; Discrete Logarithm Problem; Cryptographic Protocols; Real-World Cryptography; and Zero-Knowledge Proofs.

  • af Omar Alonso
    722,95 kr.

    This book constitutes the refereed proceedings of the 27th International Conference on Linking Theory and Practice of Digital Libraries, TPDL 2023, held in Zadar, Croatia, during September 26¿29, 2023.The 13 full papers and 17 short papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: Applications and digital library systems; data citation and citation analysis; discovering science, monitoring and publishing science; knowledge creation; Human-Computer Interaction; digital humanities; and digital cultural heritage.

  • af Josh Luberisse
    832,95 kr.

    Buckle up and prepare to dive into the thrilling world of Zero-Click Exploits. This isn't your average cybersecurity guide - it's a wild ride through the dark underbelly of the digital world, where zero-click exploits reign supreme.Join Josh, a seasoned cybersecurity professional and the mastermind behind Greyhat Intelligence & Investigative Solutions, as he spills the beans on these sneaky attacks that can compromise systems without a single click. From Fortune 500 companies to the most guarded government agencies, no one is safe from the lurking dangers of zero-click exploits.In this witty and engaging book, Josh takes you on a journey that will make your head spin. You'll uncover the secrets behind these stealthy attacks, learning the ins and outs of their mechanics, and unraveling the vulnerabilities they exploit. With real-world examples, he'll keep you on the edge of your seat as you discover the attack vectors, attack surfaces, and the art of social engineering.But fear not! Josh won't leave you defenseless. He arms you with an arsenal of prevention, mitigation, and defense strategies to fortify your systems against these relentless zero-click invaders. You'll learn how to harden your systems, develop incident response protocols, and become a master of patch management.But this book isn't all serious business. Josh infuses it with his signature wit and humor, making the complex world of zero-click exploits accessible to anyone with a curious mind and a passion for cybersecurity. So get ready to laugh, learn, and level up your red teaming skills as you navigate this thrilling rollercoaster of a read.Whether you're a seasoned cybersecurity pro or just starting your journey, "Leave No Trace" is the ultimate guide to understanding, defending against, and maybe even outsmarting the relentless zero-click exploits. It's time to take the fight to the attackers and show them who's boss!So fasten your seatbelt, grab your favorite energy drink, and get ready to unlock the secrets of zero-click exploits. Your mission, should you choose to accept it, starts now!

  • af Dalibor Klusá¿ek
    563,95 - 713,95 kr.

  • af Miralem Mehic
    1.096,95 - 1.106,95 kr.

    This book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication systems. The authors use their extensive practical academic and industrial experience in network technologies and provide details from international projects in quantum cryptography in which they actively participate. Using a variety of examples, analogies, illustrations, tables, and features from practical quantum network realizations, the authors provide a unique view of quantum technology from an engineering telecommunication standpoint, allowing the reader to identify the advantages and challenges of quantum technology.This book also addresses challenges posed by quantum technology such as network organization, passive and active eavesdropping, and future trends in QKD such as Software Defined Networking (SDN) with QKD and application QKD in 5G networks. It is conceived through eight chapters by treating the following thematic units separately: Fundamentals of Quantum Key Distribution, QoS architecture/mode, QoS MAC layer, QoS signaling techniques for key management and session negotiation purpose and QoS routing protocols that minimize the consumption of key material through the equitable utilization of network resources when finding an optimal path. Through numerous information on practical solutions, simulation examples, illustrations, and analysis, readers can easily distinguish the specificity of quantum technology and understand the challenges and methods of practical implementation of quantum cryptography in common telecommunications standards. Researchers working in quantum technology and applied networking security as well as advanced-level students studying computer science and electrical engineering will benefit from this book. Professionals working within these related fields will also benefit from this book.

  • af Aniello Murano
    932,95 kr.

    This volume LNCS 14282 constitutes the refereed proceedings of the 20th European Conference EUMAS 2023, held in Naples, Italy, during September 2023.This volume includes 24 full papers and 5 short papers, carefully selected from 47 submissions. Additionally, the volume features 16 short papers, rigorously reviewed from 20 submissions for the PhD day. The conference focused on the theory and practice of autonomous agents and multi-agent systems, covering a wide range of topics.

  • af David Kreps
    566,95 - 575,95 kr.

    This book constitutes the refereed proceedings of the 15th IFIP TC 9 International Conference on Human Choice and Computers, HCC15 2022, in Tokyo, Japan, in September 2022.The 17 full papers presented were carefully reviewed and selected from 32 submissions. Summaries of 2 keynote presentations are also included. The papers deal with the constantly evolving intimate relationship between humans and technology. 

  • af Dominik Merli
    527,95 kr.

    "A practical guide to designing secure embedded computer systems. Covers key embedded security components like random number generators, cryptographic algorithms, and secure data storage. Later chapters explore advanced concepts such as secure boot and firmware updates, access control, and system monitoring. Features case studies and implementation examples throughout"--

  • af Denis Cavallucci
    1.327,95 kr.

    This book constitutes the proceedings of the 23rd International TRIZ Future Conference on Towards AI-Aided Invention and Innovation, TFC 2023, which was held in Offenburg, Germany, during September 12¿14, 2023. The event was sponsored by IFIP WG 5.4.The 43 full papers presented in this book were carefully reviewed and selected from 80 submissions. The papers are divided into the following topical sections: AI and TRIZ; sustainable development; general vision of TRIZ; TRIZ impact in society; and TRIZ case studies.

  • af Syed Mohsin Abbas
    1.221,95 kr.

    This book gives a detailed overview of a universal Maximum Likelihood (ML) decoding technique, known as Guessing Random Additive Noise Decoding (GRAND), has been introduced for short-length and high-rate linear block codes. The interest in short channel codes and the corresponding ML decoding algorithms has recently been reignited in both industry and academia due to emergence of applications with strict reliability and ultra-low latency requirements . A few of these applications include Machine-to-Machine (M2M) communication, augmented and virtual Reality, Intelligent Transportation Systems (ITS), the Internet of Things (IoTs), and Ultra-Reliable and Low Latency Communications (URLLC), which is an important use case for the 5G-NR standard.GRAND features both soft-input and hard-input variants. Moreover, there are traditional GRAND variants that can be used with any communication channel, and specialized GRAND variants that are developed for a specific communication channel. This book presents a detailed overview of these GRAND variants and their hardware architectures.The book is structured into four parts. Part 1 introduces linear block codes and the GRAND algorithm. Part 2 discusses the hardware architecture for traditional GRAND variants that can be applied to any underlying communication channel. Part 3 describes the hardware architectures for specialized GRAND variants developed for specific communication channels. Lastly, Part 4 provides an overview of recently proposed GRAND variants and their unique applications.This book is ideal for researchers or engineers looking to implement high-throughput and energy-efficient hardware for GRAND, as well as seasoned academics and graduate students interested in the topic of VLSI hardware architectures. Additionally, it can serve as reading material in graduate courses covering modern error correcting codes and Maximum Likelihood decoding for short codes.

  • af Ethan J. Monroe
    152,95 - 167,95 kr.

  • af Thomas Johansson & Daniel Smith-Tone
    1.137,95 kr.

    This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography, PQCrypto 2022, held in College Park, MD, USA, in August 14¿18, 2023.The 25 full papers presented in this book were carefully reviewed and selected from 51 submissions. They are categorized in the following topical sections: code-based cryptography; group-action-based cryptography; isogenye-based cryptography; lattice-based cryptography; multivariate cryptography; quantum algorithms, cryptanalysis and models; post-quantum protocols; side channel cryptanalysis and countermeasures.

  • af Jacob Benesty
    1.587,95 kr.

    This book explains the motivation for using microphone arrays as opposed to using a single sensor for sound acquisition. The book then goes on to summarize the most useful ideas, concepts, results, and new algorithms therein. The material presented in this work includes analysis of the advantages of using microphone arrays, including dimensionality reduction to remove the redundancy while preserving the variability of the array signals using the principal component analysis (PCA). The authors also discuss benefits such as beamforming with low-rank approximations, fixed, adaptive, and robust distortionless beamforming, differential beamforming, and a new form of binaural beamforming that takes advantage of both beamforming and human binaural hearing properties to improve speech intelligibility. The book makes the microphone array signal processing theory and applications available in a complete and self-contained text. The authors attempt to explain the main ideas in a clear and rigorous way so that the reader can easily capture the potentials, opportunities, challenges, and limitations of microphone array signal processing. This book is written for those who work on the topics of microphone arrays, noise reduction, speech enhancement, speech communication, and human-machine speech interfaces.

  • af Mariya Ouaissa, Rajesh Kumar Dhanaraj, V. Seethalakshmi & mfl.
    1.405,95 kr.

  • af Valentin Mulder, Bernhard Tellenbach, Vincent Lenders & mfl.
    522,95 - 627,95 kr.

  • af Helena Albuquerque
    1.980,95 kr.

    This proceedings volume presents a selection of peer-reviewed contributions from the Second Non-Associative Algebras and Related Topics (NAART II) conference, which was held at the University of Coimbra, Portugal, from July 18¿22, 2022. The conference was held in honor of mathematician Alberto Elduque, who has made significant contributions to the study of non-associative structures such as Lie, Jordan, and Leibniz algebras. The papers in this volume are organized into four parts: Lie algebras, superalgebras, and groups; Leibniz algebras; associative and Jordan algebras; and other non-associative structures. They cover a variety of topics, including classification problems, special maps (automorphisms, derivations, etc.), constructions that relate different structures, and representation theory.One of the unique features of NAART is that it is open to all topics related to non-associative algebras, including octonion algebras, composite algebras, Banach algebras, connections with geometry, applications in coding theory, combinatorial problems, and more. This diversity allows researchers from a range of fields to find the conference subjects interesting and discover connections with their own areas, even if they are not traditionally considered non-associative algebraists. Since its inception in 2011, NAART has been committed to fostering cross-disciplinary connections in the study of non-associative structures.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.