Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
¿This book constitutes the revised selected papers from the workshops affiliated with the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which took place in Bol, Brä, Croatia, in May 2023. The 7 full papers presented in this book were carefully reviewed and selected from 18 submissions. They stem from the following workshops:CoDecFin 2022: 3rd Workshop on Coordination of Decentralized FinanceDeFi 2022: 2nd Workshop on Decentralized FinanceVoting 2022: 7th Workshop on Advances in Secure Electronic VotingWTSC 2022: 6th Workshop on Trusted Smart Contracts
This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023.The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.Topics and features:* Covers the essential standards in Internet cryptography* Integrates work exercises and problems in each chapter* Focuses especially on IPsec, secure e-mail and TLS* Summarizes real-world cryptography in three introductory chapters* Includes necessary background from computer networks* Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes* Provides additional background on web security in two concluding chaptersOffering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.Professor Dr. Jorg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book's topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.
This book presents Industry 4.0 enabler technologies and tools. It also highlights some of the existing empirical applications in the context of manufacturing. The book elucidates innovative thematic concepts of Industry 4.0 and its perspectives. It establishes routes to empirically utilize Industry 4.0 standards for manufacturing companies. The book can be used as a reference for professionals/engineers, researchers, and students.
This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the individual ecosystems of cryptography and AI to show the omnipresence of each technology in the ecosystem of the other one. Next, they show how these technologies have come together in collaborative or adversarial ways. In the next section, the authors highlight the coevolution being formed between cryptography and AI. Throughout the book, the authors use evidence from state-of-the-art research to look ahead at the future of the crypto-AI dichotomy. The authors explain how they anticipate that quantum computing will join the dichotomy in near future, augmenting it to a trichotomy. They verify this through two case studies highlighting another scenario wherein crypto, AI and quantum converge. The authors study current trends in chaotic image encryption as well as information-theoretic cryptography and show how these trends lean towards quantum-inspired artificial intelligence (QiAI). After concluding the discussions, the authors suggest future research for interested researchers.
This book constitutes the proceedings of the 19th IMA International Conference, IMACC 2023, held in London, UK, during December 12¿14, 2023The 14 full papers included in this volume were carefully reviewed and selected from 36 submissions. This volume presents cutting-edge results in a variety of areas, including coding theory, symmetric cryptography, zeroknowledge protocols, digital signature schemes and extensions, post-quantum cryptography and cryptography in practice.
This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16¿17, 2023.The 18 full papers included in this volume were carefully reviewed and selected from 55 submissions. This volume focuses on a broad range of topics within IT security and privacy.
This handbook aims to serve as a one-stop, reliable source of reference, with curations of survey and expository contributions on the state-of-the-art in Blockchain technology. It covers a comprehensive range of topics, providing the technical and non-technical reader with fundamentals, applications, and deep details on a variety of topics. The readership is expected to span broadly from technologically-minded business professionals and entrepreneurs, to students, instructors, novices and seasoned researchers, in computer science, engineering, software engineering, finance, and data science. Though Blockchain technology is relatively young, its evolution as a field and a practice is booming in growth and its importance to society had never been more important than it is today. Blockchain solutions enable a decentralization of a digital society where people can contribute, collaborate, and transact without having to second-guess the trust and transparency factors with many geographical, financial, and political barriers removed. It is the distributed ledger technology behind the success of Bitcoin, Ethereum, and many emerging applications.The resource is divided into 5 parts. Part 1 (Foundation) walks the reader through a comprehensive set of essential concepts, protocols, and algorithms that lay the foundation for Blockchain. Part 2 (Scalability) focuses on the most pressing challenges of today's blockchain networks in how to keep pace with real-world expectations. Part 3 (Trust and Security) provides detailed coverage on the issues of trust, reputation, and security in Blockchain. Part 4 (Decentralized Finance) is devoted to a high-impact application of Blockchain to finance, the sector that has most benefitted from this technology. Part 5 (Application and Policy) includes several cases where Blockchain applies to the real world.
This book constitutes the refereed proceedings of the 11th International Conference on Code-Based Cryptography, CBCrypto 2023, held in Lyon, France, during April 22¿23, 2023. The 8 full papers included in this book were carefully reviewed and selected from 28 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms.
Plan, design, and build resilient security architectures to secure your organization's hybrid networks, cloud-based workflows, services, and applications Key FeaturesUnderstand the role of the architect in successfully creating complex security structuresLearn methodologies for creating architecture documentation, engaging stakeholders, and implementing designsUnderstand how to refine and improve architecture methodologies to meet business challengesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionCybersecurity architecture is the discipline of systematically ensuring that an organization is resilient against cybersecurity threats. Cybersecurity architects work in tandem with stakeholders to create a vision for security in the organization and create designs that are implementable, goal-based, and aligned with the organization's governance strategy.Within this book, you'll learn the fundamentals of cybersecurity architecture as a practical discipline. These fundamentals are evergreen approaches that, once mastered, can be applied and adapted to new and emerging technologies like artificial intelligence and machine learning. You'll learn how to address and mitigate risks, design secure solutions in a purposeful and repeatable way, communicate with others about security designs, and bring designs to fruition. This new edition outlines strategies to help you work with execution teams to make your vision a reality, along with ways of keeping designs relevant over time. As you progress, you'll also learn about well-known frameworks for building robust designs and strategies that you can adopt to create your own designs.By the end of this book, you'll have the foundational skills required to build infrastructure, cloud, AI, and application solutions for today and well into the future with robust security components for your organization.What you will learnCreate your own architectures and analyze different modelsUnderstand strategies for creating architectures for environments and applicationsDiscover approaches to documentation using repeatable approaches and toolsDiscover different communication techniques for designs, goals, and requirementsFocus on implementation strategies for designs that help reduce riskApply architectural discipline to your organization using best practicesWho this book is forThis book is for new as well as seasoned cybersecurity architects looking to explore and polish their cybersecurity architecture skills. Additionally, anyone involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization can benefit from this book. If you are a security practitioner, systems auditor, and (to a lesser extent) software developer invested in keeping your organization secure, this book will act as a reference guide. Table of ContentsWhat is Cybersecurity Architecture?Architecture - The Core of Solution BuildingBuilding an Architecture - Scope and RequirementsBuilding an Architecture - Your ToolboxBuilding an Architecture - Developing Enterprise BlueprintsBuilding an Architecture - Application BlueprintsExecution - Applying Architecture ModelsExecution - Future-ProofingPutting It All Together
Auf Grund des langanhaltenden Niedrigzinsniveaus sowie der zusätzlichen Herausforderungen der Corona-Pandemie, stehen Anbieter von Finanzdienstleistungsberatungen (z. B. Banken, Vermögensverwalter) sowie Privatanleger vor finanziellen Problemen. Auf der einen Seite erleiden Banken signifikante Ertragseinbrüche in Geschäftsbereichen, die jahrelang als stabil galten (z. B. Fristentransformation). Auf der anderen Seite stehen Privatanleger der Inflationsgefahr gegenüber, die mit konservativen und niedrig verzinsten Anlagen nicht zu beseitigen ist. Ein möglicher Ausweg, um für beide Seiten finanzielle Linderung zu schaffen, stellen digitale Anlageberatungsservices, die im Fachjargon unter den Begriff Robo-Advice und Robo-Advisory bekannt sind. Dieses Konzept wird aktuell um die Einbindung sog. Krypto- Assets erweitert. Die Arbeit untersucht daher die entscheidungsbestimmenden Faktoren aus Sicht der Privatanleger hinsichtlich der Nutzung eines Krypto-Robo-Advisor.
Welcome to "Bitcoin: Mastering the World of Cryptocurrency - Your Ultimate Handbook on Bitcoin". This e-book is your in-depth guide to the intriguing world of Bitcoin and the larger cryptocurrency landscape. This guide is created to meet your needs, whether you're a curious beginner trying to grasp what all the fuss is about, a casual trader looking to expand your knowledge, or an experienced investor looking to stay on the cutting edge of the crypto world.The financial industry is evolving from what we once knew. There are now other ways to carry out transactions, make investments, and store value besides using traditional fiat currencies. A new type of decentralized digital currency built on the blockchain technology was made possible by the 2009 invention of Bitcoin. In addition to being well-known today, Bitcoin also sparked a technological revolution and gave rise to dozens of alternative cryptocurrencies.
This book presents applications of blockchain technologies to foster sustainable development in the textile and clothing supply chain. The concept of Textiles and Fashion Sustainability has grown to a wider extent today. Among the list of items to achieve Sustainability in Textiles and Fashion, the key element is the traceability of supply chains in terms of mapping and tracing the entire supply chain to ensure sustainable supply chain management. Reliable and transparent, efficient data is one of the crucial requirements for Textiles and Fashion Sustainability in today's advanced industrial context and this is possible in this advanced era by various technological advancements such as Block chain technologies. These days one can see a widespread application of blockchain technology in the Textiles and Clothing sector. The core competencies of blockchain technology namely transparency, data auditability, privacy, value transfer, and process efficiency and automation are very much essential for achieving the multifold objectives under the theme Textiles and Fashion Sustainability.
This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.
This edited collection of essays brings together scholars across disciplines who consider the collaborative work of John Matthews Manly and Edith Rickert, philologists, medievalists and early modernists, cryptologists, and education reformers. These pioneers crafted interdisciplinary partnerships as they modeled and advocated for cooperative alliances at every level of their work and in all their academic relationships. Their extensive network of intellectual partnerships made possible groundbreaking projects, from the eight-volume Text of the Canterbury Tales (1940) to the deciphering of the Waberski Cipher, yet, except for their Chaucer work, their many other accomplishments have received little attention. Collaborative Humanities Research and Pedagogy not only surveys the rich range of their work but also emphasizes the transformative intellectual and pedagogical benefits of collaboration.
Explore the role ChatGPT can play in business, including operations, marketing, sales, and delivery. This concise book illustrates how ChatGPT is changing the way individuals interact with machines and how you can take advantage of its capabilities for business.The book starts with an overview of ChatGPT and its impact in the realm of of conversational AI. You will then dive into the technical aspects of ChatGPT and gain an understanding of how machine learning algorithms and natural language processing work in the background. Various business applications of ChatGPT are then discussed, followed by how it can get integrated into your business operations. To wrap things up, you will gain insight into the data and privacy elements that need to be considered while using ChatGPT, and how to maintain its integrity.After completing this book, you will understand the ChatGPT framework and how to integrate it into your own ventures. What You Will LearnUnderstand the various technologies and techniques utilized in ChatGPTGain insight into the future of human-machine interactionAnalyze the advantages and disadvantages of ChatGPT for your industryExplore the ethical implications of using AI Who This Book Is ForTech enthusiasts who are passionate about artificial intelligence (AI), machine learning, and human-machine interaction.
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.
This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on Information and Communications Security, ICICS 2023, held in Tianjin, China, during November 18¿20, 2023. The 38 full papers presented together with 6 short papers were carefully reviewed and selected from 181 submissions. The conference focuses on: Symmetric-Key Cryptography; Public-Key Cryptography; Applied Cryptography; Authentication and Authorization; Privacy and Anonymity; Security and Privacy of AI; Blockchain and Cryptocurrencies; and System and Network Security.
This book constitutes the proceedings of 25th International Symposium, SSS 2023, in Jersey City, NJ, USA, in October 2023.The 32 full papers presented together with 8 short papers were carefully reviewed and selected from 78 submissions. The conference was organized into five tracks reflecting major trends related to the conference: (i) Track A. Self-stabilizing Systems:Theory and Practice, (ii) Track B. Distributed and Concurrent Computing:Foundations, Fault-Tolerance and Scalability, (iii) Track C. Cryptogrophy and Security, (iv) Track D. Dynamic, Mobile and Nature-Inspired Computing MobileAgents, (v) and Distributed Databases.
This book examines whether the integration of edge intelligence (EI) and blockchain (BC) can open up new horizons for providing ubiquitous intelligent services. Accordingly, the authors conduct a summarization of the recent research efforts on the existing works for EI and BC, further painting a comprehensive picture of the limitation of EI and why BC could benefit EI. To examine how to integrate EI and BC, the authors discuss the BC-driven EI and tailoring BC to EI, including an overview, motivations, and integrated frameworks. Finally, some challenges and future directions are explored. The book explores the technologies associated with the integrated system between EI and BC, and further bridges the gap between immature BC and EI-amicable BC.Explores the integration of edge intelligence (EI) and blockchain (BC), including their integrated motivations, frameworks and challenges;Presents how BC-driven EI can realize computing-power management, data administration, and model optimization;Describes how to tailor BC to better support EI, including flexible consensus protocol, effective incentive mechanism, intellectuality smart contract, and scalable BC system tailoring;Presents some key research challenges and future directions for the integrated system.
This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Symmetric-Key Cryptography; Multi-Party Computation; Isogeny-Based Cryptography; Discrete Logarithm Problem; Cryptographic Protocols; Real-World Cryptography; and Zero-Knowledge Proofs.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.