Udsalget slutter om
Udvidet returret til d. 31. januar 2025

Kodeteori og kryptologi

Her finder du spændende bøger om Kodeteori og kryptologi. Nedenfor er et flot udvalg af over 380 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Erol Gelenbe, Marija Jankovic, Andras Vilmos, mfl.
    516,95 kr.

  • af Mukaddim Pathan & Surya Nepal
    1.137,95 kr.

  • af Raghuram Yeluri
    426,95 kr.

    For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-criticalapplications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations."e;A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!"e; —Vince Lubsey, Vice President, Product Development, Virtustream Inc."e; Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles."e; —John Skinner, Vice President, HyTrust Inc."e;Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud."e; —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation

  • - 11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers
    af Sven Dietrich
    569,95 - 586,95 kr.

    The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http://fc07. ifca. ai), organized by the International Financial Crypt- raphy Association (IFCA, http://www. ifca. ai/), was held in Tobago, February 12-15, 2007. The conference is a well-established and premier international - rum for research, advanced development, education, exploration, and debate - garding security in the context of ?nance and commerce. We continue to cover all aspects of securing transactions and systems, which this year included a range of technical areas such as cryptography, payment systems, anonymity, privacy, - thentication, and commercial and ?nancial transactions. For the ?rst time, there was an adjacent workshop on Usable Security, held after FC 2007 in the same - cation. The papers are included in the last part of this volume. The conference goal was to bring together top cryptographers, data-security specialists, and c- puter scientists with economists, bankers, implementers, and policy makers. The goal was met this year: there were 85 submissions, out of which 17 research papers and 1 system presentation paper were accepted. In addition, the conference featured two distinguished speakers, Mike Bond and Dawn Jutla, and two panel sessions, one on RFID and one on virtual economies. As always, there was the rump session on Tuesday evening, colorful as usual.

  • af Milan Petkovic & Willem Jonker
    713,95 kr.

  • af Vijay Atluri & Claudia Diaz
    611,95 kr.

  • - Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009, Proceedings
    af Józef Wozniak
    1.120,95 - 1.129,95 kr.

    Recent spectacular achievements in wireless, mobile, and sensor networks have dramatically changed our lives in many ways. However, the rapid evolution of wireless systems not only promises increased functionality, reliability, availability, and security, as well as putting a wide variety of new services at the users' disposal ? it also creates a number of design challenges that our research community is now facing. Scientists and engineers need to come up with, and promptly implement, novel wireless network architectures, while system operators and planners rethink their business models and attend to the growing expectations of their customer base. To provide a suitable forum for discussion between researchers, practitioners, and industry representatives interested in new developments in the respective research area, IFIP WG 6. 8 launched three separate series of conferences: MWCN (Mobile and Wireless Communications Networks), PWC (Personal Wireless Communications), and WSAN (Wireless Sensor and Actors Networks). In 2008, MWCN and PWC were merged into the IFIP Wireless and Mobile Networking Conference (WMNC 2008), held in Toulouse, France, from September 30 to October 2, 2008. MWNC 2008 and PWC 2008 topics were subsequently revised with a view to covering the whole spectrum of hot issues in wireless and mobile networking. As a result, IFIP WG 6. 8 decided to add WSAN as another WMNC track.

  • af Michael Portnoy & Seymour Goodman
    1.102,95 - 1.111,95 kr.

  • af Germano Resconi
    1.706,95 - 1.715,95 kr.

  • af Steve Furnell, Bhavani Thuraisingham & X. Sean Wang
    1.120,95 kr.

  • af Henning Stichtenoth & Arnaldo Garcia
    570,95 kr.

  • af Debra Cook
    1.100,95 kr.

    Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs for general purpose computing has arisen. This work extends such research by considering the use of a GPU as a parallel processor for encrypting data. The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. A detailed description for a GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. Unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system.

  • af Cliff Wang, Dawn Song, Somesh Jha, mfl.
    3.254,95 kr.

  • af Jaideep Vaidya, Yu Michael Zhu & Christopher W. Clifton
    1.098,95 kr.

  • af Godfried B. Williams
    572,95 kr.

  • af Sushil Jajodia & Michael Gertz
    1.234,95 kr.

  • af Ulrich Flegel
    1.591,95 kr.

  • af David Avison, Isabel Ramos, Barbara Pernici, mfl.
    1.107,95 kr.

  • af R. Green, Sung Hyon Myaeng & C. A. Bean
    484,95 - 572,95 kr.

  • af Ethan Cerami
    632,95 kr.

  • af Mirjana Ivanovic
    916,95 kr.

    This book constitutes the refereed proceedings of the 15th International Baltic Conference on Digital Business and Intelligent Systems, Baltic DB&IS 2022, held in Riga, Latvia, in July 2022. The 16 revised full papers and 1 short paper presented were carefully reviewed and selected from 42 submissions. The papers are centered around topics like architectures and quality of information systems, artificial intelligence in information systems, data and knowledge engineering, enterprise and information systems engineering, security of information systems.

  • af Giuseppe Ateniese
    1.458,95 kr.

    The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.

  • af Audun Jøsang, Lynn Futcher & Janne Hagen
    1.613,95 kr.

    This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management.*The conference was held virtually.

  • af Quoc-Tuan Vien, Nguyen-Son Vo & Dac-Binh Ha
    869,95 kr.

  • af Elisa Bertino, Xingming Sun, Zhihua Xia & mfl.
    1.344,95 - 1.443,95 kr.

  • af Albrecht Beutelspacher, Jörg Schwenk & Klaus-Dieter Wolfenstetter
    328,95 kr.

    Die Entwicklung und Analyse von Protokollen wird ein immer wichtigerer Zweig der modernen Kryptologie. Große Berühmtheit erlangt haben die so genannten "Zero-Knowledge-Protokolle", mit denen es gelingt, einen anderen von der Existenz eines Geheimnisses zu überzeugen, ohne ihm das Geringste zu verraten.

  • af Javi Fons
    247,95 kr.

    Bienvenido a esta época, al nacimiento de una tecnología que, más allá de transformar el dinero que tenemos hoy en día. Estamos frente a una Revolución y estoy seguro que quieres ser parte de ella. Bitcoin nos propone nuevas formas de libertad financiera, tener el control de tu dinero por sobre entidades gubernamentales y bancarias. Nos ofrece un control sobre nuestros activos que no existía antes de su creación en 2009. Bitcoin es sinónimo de libertad. Le devuelve el control a las personas comunes y corrientes como tu y yo.Bitcoin es al mismo tiempo una moneda y un sistema monetario cuyo buen funcionamiento no depende de la benevolencia de una autoridad sino de las inmutables leyes de la matemática. Bitcoin es una criptomoneda, eso quiere decir que es digital, descentralizado, abierto, universal, de uso voluntario, no tiene problemas contra la inflación, libre de intermediarios no deseados como por ejemplo el banco.Bitcoin permite efectuar transacciones de manera extremadamente segura y privada. Sus ventajas respecto al sistema que hemos heredado son tantas, y tan obvias, que cada vez son más los que deciden adoptarlo. En este libro aprenderás: Los fundamentos básicos para entender Bitcoin y el Blockchain.Como empezar con Bitcoin, Ethereum, XRP, Ripple, Bitcoin Cash y otras criptomonedas mas, por nombrar algunas.La mejor manera de evitar estafas y SCAMS dentro del mundo de las criptomonedas.Las altcoins que te podrán hacer rico en este 2021 si inviertes en ellas.Como comenzar a hacer tu primera compra y venta y empezar a hacer trading de criptomonedas desde lo mas básico a lo mas avanzado.¡y mucho mucho mas!

  • af Aljosha Judmayer
    400,95 kr.

    The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities. These communities are very diverse and amongst others include: technical enthusiasts, activist groups, researchers from various disciplines, start ups, large enterprises, public authorities, banks, financial regulators, business men, investors, and also criminals. The scientific community adapted relatively slowly to this emerging and fast-moving field of cryptographic currencies and consensus ledgers. This was one reason that, for quite a while, the only resources available have been the Bitcoin source code, blog and forum posts, mailing lists, and other online publications. Also the original Bitcoin paper which initiated the hype was published online without any prior peer review. Following the original publication spirit of the Bitcoin paper, a lot of innovation in this field has repeatedly come from the community itself in the form of online publications and online conversations instead of established peer-reviewed scientific publishing. On the one side, this spirit of fast free software development, combined with the business aspects of cryptographic currencies, as well as the interests of today's time-to-market focused industry, produced a flood of publications, whitepapers, and prototypes. On the other side, this has led to deficits in systematization and a gap between practice and the theoretical understanding of this new field. This book aims to further close this gap and presents a well-structured overview of this broad field from a technical viewpoint. The archetype for modern cryptographic currencies and consensus ledgers is Bitcoin and its underlying Nakamoto consensus. Therefore we describe the inner workings of this protocol in great detail and discuss its relations to other derived systems.

  • af Othon Michail
    403,95 kr.

    Wireless sensor networks are about to be part of everyday life. Homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels, sleepless forests ready to detect and react in case of a fire, vehicles able to avoid sudden obstacles or possibly able to self-organize routes to avoid congestion, and so on, will probably be commonplace in the very near future. Mobility plays a central role in such systems and so does passive mobility, that is, mobility of the network stemming from the environment itself. The population protocol model was an intellectual invention aiming to describe such systems in a minimalistic and analysis-friendly way. Having as a starting-point the inherent limitations but also the fundamental establishments of the population protocol model, we try in this monograph to present some realistic and practical enhancements that give birth to some new and surprisingly powerful (for these kind of systems) computational models. Table of Contents: Population Protocols / The Computational Power of Population Protocols / Enhancing the model / Mediated Population Protocols and Symmetry / Passively Mobile Machines that Use Restricted Space / Conclusions and Open Research Directions / Acronyms / Authors' Biographies

  • af Michel Raynal
    581,95 kr.

    Understanding distributed computing is not an easy task. This is due to the many facets of uncertainty one has to cope with and master in order to produce correct distributed software. Considering the uncertainty created by asynchrony and process crash failures in the context of message-passing systems, the book focuses on the main abstractions that one has to understand and master in order to be able to produce software with guaranteed properties. These fundamental abstractions are communication abstractions that allow the processes to communicate consistently (namely the register abstraction and the reliable broadcast abstraction), and the consensus agreement abstractions that allows them to cooperate despite failures. As they give a precise meaning to the words "e;communicate"e; and "e;agree"e; despite asynchrony and failures, these abstractions allow distributed programs to be designed with properties that can be stated and proved. Impossibility results are associated with these abstractions. Hence, in order to circumvent these impossibilities, the book relies on the failure detector approach, and, consequently, that approach to fault-tolerance is central to the book. Table of Contents: List of Figures / The Atomic Register Abstraction / Implementing an Atomic Register in a Crash-Prone Asynchronous System / The Uniform Reliable Broadcast Abstraction / Uniform Reliable Broadcast Abstraction Despite Unreliable Channels / The Consensus Abstraction / Consensus Algorithms for Asynchronous Systems Enriched with Various Failure Detectors / Constructing Failure Detectors

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.