Udvidet returret til d. 31. januar 2025

Kodeteori og kryptologi

Her finder du spændende bøger om Kodeteori og kryptologi. Nedenfor er et flot udvalg af over 380 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Melanie Volkamer, Robert Krimmer, Micha Germann, mfl.
    514,95 kr.

  • af Alexandre Dolgui, David Romero, Alain Bernard, mfl.
    1.712,95 - 2.011,95 kr.

  • af Christian Baun
    429,95 kr.

  •  
    1.466,95 kr.

    The text presents in depth coverage of theoretical concepts, and applications and advances in the field of blockchain technology. It will serve as an ideal reference text for graduate students and academic researchers in diverse engineering fields such as electrical, electronics and communication, computer, and information technology.

  • af Tsau-Young Lin
    3.851,95 kr.

    The first edition of the Encyclopedia of Complexity and Systems Science (ECSS, 2009) presented a comprehensive overview of granular computing (GrC) broadly divided into several categories: Granular computing from rough set theory, Granular Computing in Database Theory, Granular Computing in Social Networks, Granular Computing and Fuzzy Set Theory, Grid/Cloud Computing, as well as general issues in granular computing. In 2011, the formal theory of GrC was established, providing an adequate infrastructure to support revolutionary new approaches to computer/data science, including the challenges presented by so-called big data. For this volume of ECSS, Second Edition, many entries have been updated to capture these new developments, together with new chapters on such topics as data clustering, outliers in data mining, qualitative fuzzy sets, and information flow analysis for security applications. Granulations can be seen as a natural and ancient methodology deeply rooted in the human mind. Many daily "things" are routinely granulated into sub "things": The topography of earth is granulated into hills, plateaus, etc., space and time are granulated into infinitesimal granules, and a circle is granulated into polygons of infinitesimal sides. Such granules led to the invention of calculus, topology and non-standard analysis. Formalization of general granulation was difficult but, as shown in this volume, great progress has been made in combing discrete and continuous mathematics under one roof for a broad range of applications in data science.

  • af Ruslan Mitkov & Gloria Corpas Pastor
    712,95 kr.

  • af Cristina Alcaraz
    1.132,95 kr.

    This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissionsThe papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.

  • af Clemente Galdi & Stanislaw Jarecki
    1.240,95 kr.

  • af Daniel Reilly
    473,95 kr.

    "A math-based guide for information security practitioners. Teaches how to use concepts from various fields of mathematics, such as graph theory, computational geometry, and statistics, to create and implement ready-to-use security tools. Features code examples in Python and hands-on proof-of-concept projects for solving real-world problems"--

  • af Dmitrii Rodionov, Mohammed Ali Berawi, Angi Skhvediani & mfl.
    1.010,95 kr.

  • af Christoph Sorge, Ronald Petrlic & Wolfgang Ziebarth
    431,95 kr.

  • af Nguyen Gia Nhu, Tanupriya Choudhury, Ravi Tomar, mfl.
    1.979,95 kr.

  • af Clarice Dias de Albuquerque
    604,95 kr.

    This book offers a structured algebraic and geometric approach to the classification and construction of quantum codes for topological quantum computation. It combines key concepts in linear algebra, algebraic topology, hyperbolic geometry, group theory, quantum mechanics, and classical and quantum coding theory to help readers understand and develop quantum codes for topological quantum computation.One possible approach to building a quantum computer is based on surface codes, operated as stabilizer codes. The surface codes evolved from Kitaev's toric codes, as a means to developing models for topological order by using qubits distributed on the surface of a toroid. A significant advantage of surface codes is their relative tolerance to local errors. A second approach is based on color codes, which are topological stabilizer codes defined on a tessellation with geometrically local stabilizer generators. This book provides basic geometric concepts, like surface geometry, hyperbolic geometry and tessellation, as well as basic algebraic concepts, like stabilizer formalism, for the construction of the most promising classes of quantum error-correcting codes such as surfaces codes and color codes.The book is intended for senior undergraduate and graduate students in Electrical Engineering and Mathematics with an understanding of the basic concepts of linear algebra and quantum mechanics.

  • af Maamar Ouladj & Sylvain Guilley
    560,95 kr.

  • af Upinder Dhar
    909,95 kr.

    This book constitutes the refereed proceedings of the 52nd International Simulation and Gaming Association Conference, ISAGA 2021, held in Indore, India, during September 6-10, 2021.  The 24 full papers included in this book were carefully reviewed and selected from 58 submissions. They were organized in topical sections as follows: game design and facilitation; gaming in education; player experience in simulations; and policy formulation and serious games.

  • af Shimon Brathwaite
    514,95 - 842,95 kr.

  • af Vincent Rivasseau & Bertrand Duplantier
    1.384,95 kr.

  • af Uday Kiran Rage
    1.018,95 kr.

    This volume constitutes the papers of several workshops which were held in conjunction with the 27th International Conference on Database Systems for Advanced Applications, DASFAA 2022, held as virtual event in April 2022.The 30 revised full papers presented in this book were carefully reviewed and selected from 65 submissions. DASFAA 2022 presents the following five workshops:nbsp;        First  workshop on Pattern mining and Machine learning in Big complex Databases (PMBD 2021)nbsp;        6th International Workshop on Graph Data Management and Analysis (GDMA 2022)nbsp;        First International Workshop on Blockchain Technologies (IWBT2022)nbsp;        8th International Workshop on Big Data Management and Service (BDMS 2022)nbsp;        First workshop on Managing Air Quality Through Data Sciencenbsp;        7th International Workshop on Big Data Quality Management (BDQM 2022).

  • af Satyanarayana Vollala, N. Ramasubramanian & Utkarsh Tiwari
    1.967,95 kr.

  • af Simon Parkin
    805,95 kr.

    This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021.The 10 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: web and apps; context and modelling; and from the present to the future.

  • af John Gustafson
    654,95 kr.

    This book constitutes the refereed proceedings of the Third International Conference on Next Generation Arithmetic, CoNGA 2022, which was held in Singapore, during March 1-3, 2022.  The 8 full papers included in this book were carefully reviewed and selected from 12 submissions. They deal with emerging technologies for computer arithmetic focusing on the demands of both AI and high-performance computing. 

  • af Robert G. Underwood
    439,95 kr.

    This text is intended for a one-semester course in cryptography at the advanced undergraduate/Master's degree level.  It is suitable for students from various STEM backgrounds, including engineering, mathematics, and computer science, and may also be attractive for researchers and professionals who want to learn the basics of cryptography. Advanced knowledge of computer science or mathematics (other than elementary programming skills) is not assumed. The book includes more material than can be covered in a single semester. The Preface provides a suggested outline for a single semester course, though instructors are encouraged to select their own topics to reflect their specific requirements and interests. Each chapter contains a set of carefully written exercises which prompts review of the material in the chapter and expands on the concepts.  Throughout the book, problems are stated mathematically, then algorithms are devised to solve the problems. Students are tasked to write computer programs (in C++ or GAP) to implement the algorithms.   The use of programming skills to solve practical problems adds extra value to the use of this text.This book combines mathematical theory with practical applications to computer information systems. The fundamental concepts of classical and modern cryptography are discussed in relation to probability theory, complexity theory, modern algebra, and number theory.  An overarching theme is cyber security:  security of the cryptosystems and the key generation and distribution protocols, and methods of cryptanalysis (i.e., code breaking). It contains chapters on probability theory, information theory and entropy, complexity theory, and the algebraic and number theoretic foundations of cryptography.  The book then reviews symmetric key cryptosystems, and discusses one-way trap door functions and public key cryptosystems including RSA and  ElGamal.  It contains a chapter on digital signature schemes, including material on message authentication and forgeries, and chapters on key generation and distribution. It contains a chapter on elliptic curve cryptography, including new material on the relationship between singular curves, algebraic groups and Hopf algebras.  

  • af National Security Agency
    237,95 kr.

  • af B. Balamurugan
    1.196,95 kr.

    This book discusses the convergence of three powerful technologies that play into the digital revolution and blur the lines between biological, digital, and physical objects. This book covers novel algorithms, solutions for addressing issues in applications, security, authentication, and privacy.

  • af Nathan Clarke & Steven Furnell
    1.096,95 - 1.307,95 kr.

  • af Alan Shepherd
    1.591,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.