Vi bøger
Levering: 1 - 2 hverdage

Datakryptering

Her finder du spændende bøger om Datakryptering. Nedenfor er et flot udvalg af over 912 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Marten van Sinderen
    539,95 - 710,95 kr.

  • af Baruch Schieber
    726,95 kr.

    This book constitutes the proceedings of 25th International Symposium, SSS 2023, in Jersey City, NJ, USA, in October 2023.The 32 full papers presented together with 8 short papers were carefully reviewed and selected from 78 submissions. The conference was organized into five tracks reflecting major trends related to the conference: (i) Track A. Self-stabilizing Systems:Theory and Practice, (ii) Track B. Distributed and Concurrent Computing:Foundations, Fault-Tolerance and Scalability, (iii) Track C. Cryptogrophy and Security, (iv) Track D. Dynamic, Mobile and Nature-Inspired Computing MobileAgents, (v) and Distributed Databases.

  • af Xiaofei Wang
    454,95 kr.

    This book examines whether the integration of edge intelligence (EI) and blockchain (BC) can open up new horizons for providing ubiquitous intelligent services. Accordingly, the authors conduct a summarization of the recent research efforts on the existing works for EI and BC, further painting a comprehensive picture of the limitation of EI and why BC could benefit EI. To examine how to integrate EI and BC, the authors discuss the BC-driven EI and tailoring BC to EI, including an overview, motivations, and integrated frameworks. Finally, some challenges and future directions are explored. The book explores the technologies associated with the integrated system between EI and BC, and further bridges the gap between immature BC and EI-amicable BC.Explores the integration of edge intelligence (EI) and blockchain (BC), including their integrated motivations, frameworks and challenges;Presents how BC-driven EI can realize computing-power management, data administration, and model optimization;Describes how to tailor BC to better support EI, including flexible consensus protocol, effective incentive mechanism, intellectuality smart contract, and scalable BC system tailoring;Presents some key research challenges and future directions for the integrated system.

  • af Mehdi Tibouchi
    590,95 kr.

    This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Symmetric-Key Cryptography; Multi-Party Computation; Isogeny-Based Cryptography; Discrete Logarithm Problem; Cryptographic Protocols; Real-World Cryptography; and Zero-Knowledge Proofs.

  • af Marius Iulian Mihailescu
    1.221,95 kr.

    This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from both theoretical and practical points of view. Homomorphic and searchable encryption are still relatively novel and rapidly evolving areas and face practical constraints in the contexts of large-scale cloud computing and big data.Both encryption methods can be quantum-resistant if they use the right mathematical techniques. In fact, many fully homomorphic encryption schemes already use quantum-resistant techniques, such as lattices or characteristics of polynomials ¿ which is what motivated the authors to present them in detail.On the one hand, the book highlights the characteristics of each type of encryption, including methods, security elements, security requirements, and the main types of attacks that can occur. On the other, it includes practical cases and addresses aspects like performance, limitations, etc. As cloud computing andbig data already represent the future in terms of storing, managing, analyzing, and processing data, these processes need to be made as secure as possible, and homomorphic and searchable encryption hold huge potential to secure both the data involved and the processes through which it passes.This book is intended for graduates, professionals and researchers alike. Homomorphic and searchable encryption involve advanced mathematical techniques; accordingly, readers should have a basic background in number theory, abstract algebra, lattice theory, and polynomial algebra.

  • af Shishir Kumar Shandilya
    1.307,95 kr.

    This book introduces nature-inspired algorithms and their applications to modern cryptography. It helps the readers to get into the field of nature-based approaches to solve complex cryptographic issues. This book provides a comprehensive view of nature-inspired research which could be applied in cryptography to strengthen security. It will also explore the novel research directives such as Clever algorithms and immune-based cyber resilience. New experimented nature-inspired approaches are having enough potential to make a huge impact in the field of cryptanalysis. This book gives a lucid introduction to this exciting new field and will promote further research in this domain. The book discusses the current landscape of cryptography and nature-inspired research and will be helpful to prospective students and professionals to explore further.

  • af Josh Luberisse
    867,95 kr.

    Buckle up and prepare to dive into the thrilling world of Zero-Click Exploits. This isn't your average cybersecurity guide - it's a wild ride through the dark underbelly of the digital world, where zero-click exploits reign supreme.Join Josh, a seasoned cybersecurity professional and the mastermind behind Greyhat Intelligence & Investigative Solutions, as he spills the beans on these sneaky attacks that can compromise systems without a single click. From Fortune 500 companies to the most guarded government agencies, no one is safe from the lurking dangers of zero-click exploits.In this witty and engaging book, Josh takes you on a journey that will make your head spin. You'll uncover the secrets behind these stealthy attacks, learning the ins and outs of their mechanics, and unraveling the vulnerabilities they exploit. With real-world examples, he'll keep you on the edge of your seat as you discover the attack vectors, attack surfaces, and the art of social engineering.But fear not! Josh won't leave you defenseless. He arms you with an arsenal of prevention, mitigation, and defense strategies to fortify your systems against these relentless zero-click invaders. You'll learn how to harden your systems, develop incident response protocols, and become a master of patch management.But this book isn't all serious business. Josh infuses it with his signature wit and humor, making the complex world of zero-click exploits accessible to anyone with a curious mind and a passion for cybersecurity. So get ready to laugh, learn, and level up your red teaming skills as you navigate this thrilling rollercoaster of a read.Whether you're a seasoned cybersecurity pro or just starting your journey, "Leave No Trace" is the ultimate guide to understanding, defending against, and maybe even outsmarting the relentless zero-click exploits. It's time to take the fight to the attackers and show them who's boss!So fasten your seatbelt, grab your favorite energy drink, and get ready to unlock the secrets of zero-click exploits. Your mission, should you choose to accept it, starts now!

  • af Oded Goldreich
    795,95 kr.

    This book presents a collection of 36 pieces of scientific work in the areas of complexity theory and foundations of cryptography: 20 research contributions, 13 survey articles, and 3 programmatic and reflective viewpoint statements. These so far formally unpublished pieces were written by Oded Goldreich, some in collaboration with other scientists. The articles included in this book essentially reflect the topical scope of the scientific career of Oded Goldreich now spanning three decades. In particular the topics dealt with include average-case complexity, complexity of approximation, derandomization, expander graphs, hashing functions, locally testable codes, machines that take advice, NP-completeness, one-way functions, probabilistically checkable proofs, proofs of knowledge, property testing, pseudorandomness, randomness extractors, sampling, trapdoor permutations, zero-knowledge, and non-iterative zero-knowledge.All in all, this potpourri of studies in complexity and cryptography constitutes a most valuable contribution to the field of theoretical computer science centered around the personal achievements and views of one of its outstanding representatives.

  • af Pallavi Vijay Chavan
    413,95 kr.

    This book will teach you the core concepts of blockchain technology in a concise manner through straightforward, concrete examples using a range of programming languages, including Python and Solidity. The 50 programs presented in this book are all you need to gain a firm understanding of blockchain and how to implement it.The book begins with an introduction to the fundamentals of blockchain technology, followed by a review of its types, framework, applications and challenges. Moving ahead, you will learn basic blockchain programming with hash functions, authentication code, and Merkle trees. You will then dive into the basics of bitcoin, including wallets, digital keys, transactions, digital signatures, and more. This is followed by a crash course on Ethereum programming, its network, and ecosystem. As you progress through the book, you will also learn about Hyperledger and put your newly-gained knowledge to work through case studies and example applications. After reading this book, you will understand blockchain¿s underlying concepts and its common implementations. What You Will LearnMaster theoretical and practical implementations of various blockchain components using PythonImplement hashing, Merkel trees, and smart contracts using the Solidity programming language for various applicationsGrasp the internal structure of EVM and its implementation in smart contractsUnderstand why blockchain plays an essential role in cryptocurrencies and identify possible applications beyond cryptocurrenciesInvestigate and apply alternative blockchain solutions using Hyperledger, including its integration and deploymentExplore research opportunities through case studies and gain an overview of implementation using various languages Who Is This Book For:Anyone who is new to blockchain and wants to gain anan understanding of how it works and can be implemented.

  • af Melanie Volkamer
    369,95 kr.

    This open access book constitutes the proceedings of the 8th International Joint Conference on Electronic Voting held in Luxemburg in October 2023. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others. The 9 full papers presented were carefully reviewed and selected from 38 submissions. The selected papers cover a wide range of topics connected with electronic voting, including experiences and revisions of the actual uses of E-voting systems and corresponding processes in elections.

  • af Miralem Mehic
    880,95 - 987,95 kr.

    This book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication systems. The authors use their extensive practical academic and industrial experience in network technologies and provide details from international projects in quantum cryptography in which they actively participate. Using a variety of examples, analogies, illustrations, tables, and features from practical quantum network realizations, the authors provide a unique view of quantum technology from an engineering telecommunication standpoint, allowing the reader to identify the advantages and challenges of quantum technology.This book also addresses challenges posed by quantum technology such as network organization, passive and active eavesdropping, and future trends in QKD such as Software Defined Networking (SDN) with QKD and application QKD in 5G networks. It is conceived through eight chapters by treating the following thematic units separately: Fundamentals of Quantum Key Distribution, QoS architecture/mode, QoS MAC layer, QoS signaling techniques for key management and session negotiation purpose and QoS routing protocols that minimize the consumption of key material through the equitable utilization of network resources when finding an optimal path. Through numerous information on practical solutions, simulation examples, illustrations, and analysis, readers can easily distinguish the specificity of quantum technology and understand the challenges and methods of practical implementation of quantum cryptography in common telecommunications standards. Researchers working in quantum technology and applied networking security as well as advanced-level students studying computer science and electrical engineering will benefit from this book. Professionals working within these related fields will also benefit from this book.

  • af Theodoros Dounas
    858,95 - 987,95 kr.

    This book highlights the design, use and structure of blockchain systems and decentralized ledger technologies (B/DLT) for use in the construction industry. Construction remains a fragmented change-resistant industry with chronic problems of underproductivity and a very low digitization factor compared to other fields. In parallel, the convergence, embedding and coordination of digital technologies in the physical world provides a unique opportunity for the construction industry to leap ahead and adopt fourth industrial revolution technologies. Within this context, B/DLT are an excellent fit for the digitization of the construction industry. B/DLT are effective in this as they organize and align digital and physical supply chains, produce stigmergic coordination out of decentralization, enable the governance of complex projects for multiple stakeholders, while enabling the creation of a new class of business models and legal instruments for construction.

  • af Abdelaziz Bouras
    927,95 - 987,95 kr.

    Blockchain Driven Supply Chains and Enterprise Information Systems examines initiatives for blockchain implementation in supply chain management and the integration of blockchain technology with existing enterprise management applications. The authors aim to establish common ground to provide solutions and best practices in the supply chain field, while tackling the challenges faced when integrating blockchain in supply chain policy. Chapters address both design and implementation aspects of supply chain platforms and enterprise information systems, and provide real-world use cases and examples from industry that address the impacts of using blockchain in the modern supply chain. 

  • af David Kreps
    454,95 - 494,95 kr.

    This book constitutes the refereed proceedings of the 15th IFIP TC 9 International Conference on Human Choice and Computers, HCC15 2022, in Tokyo, Japan, in September 2022.The 17 full papers presented were carefully reviewed and selected from 32 submissions. Summaries of 2 keynote presentations are also included. The papers deal with the constantly evolving intimate relationship between humans and technology. 

  • af Bbcd Satoshi
    182,95 kr.

    Discover the intriguing world of Bitcoin, with "Everything You Want To Know About Bitcoin (But Are Afraid To Ask). Questions and Answers About Bitcoin". As we traverse an era of economic unpredictability, there's a financial game-changer breaking boundaries - Bitcoin. Despite its transformative power, understanding its intricacies can often feel like decrypting an enigma due to the dispersed and scattered information available. This comprehensive guide is your reliable navigator through the labyrinth of Bitcoin, perfect for eager novices and seasoned investors alike. It unravels the complex layers of cryptocurrency, takes you through the pivotal infrastructure of blockchain, unveils the mechanics of Bitcoin mining, and much more. "Everything You Want To Know About Bitcoin (But Are Afraid To Ask). Questions and Answers About Bitcoin" rises above the fray to address over 100 of the most probing questions about Bitcoin, offering both digestible and in-depth responses that cater to beginners and advanced enthusiasts. Your quest for answers ends here, within the groundbreaking chapters of this book.What is the process of 'Halvening' and why is it significant?Could the elusive Satoshi Nakamoto be more than one person?What role could Bitcoin play in your investment portfolio?How does it intersect with global economics and regulations?What challenges could impede its future?This enlightening guide promises to equip you with:A profound comprehension of Bitcoin's mechanics and the underlying blockchain technology.An objective perspective on Bitcoin's legal ramifications, potential rewards, and inherent risks.Proficiency in buying, selling, and securely storing Bitcoin.An insightful exploration into Bitcoin's influence on the global financial terrain and its prospects for future expansion.Embark on your digital revolution today. Don't allow fear or confusion to cloud your understanding of Bitcoin.Let "Everything You Want To Know About Bitcoin (But Are Afraid To Ask). Questions and Answers About Bitcoin" be your launchpad into the future of finance.

  • af Nessa O'Brein
    1.592,95 kr.

    Cryptography is a technique of communication and information security that allows only the sender and the intended recipient of a message to view its contents. The key features of cryptography include confidentiality, integrity, non-repudiation, and authentication. The techniques used to safeguard information are derived from mathematical or rule-based concepts known as algorithms to convert messages in a manner that makes it difficult to decode it. These algorithms are applied for cryptographic key generation, digital signing, verification to protecting data privacy and web browsing on the Internet. They are also used to protect confidential transactions such as credit card and debit card transactions. Cryptography can be broadly categorized into three types, namely, symmetric key cryptography, hash functions, and asymmetric key cryptography. The most popular symmetric key cryptography system is data encryption system (DES). This book is a valuable compilation of topics, ranging from the basic to the most complex advancements in cryptography and computer security. It will serve as a valuable source of reference for graduate and post graduate students.

  • af Shenghui Cheng
    1.357,95 kr.

    As technology continues to advance, the Internet is evolving into what is often referred to as Web 3.0. This book aims to achieve three main objectives, first, it introduces Web 3.0 systematically and comprehensively, providing readers with a foundational understanding of its concepts and characteristics. Second, it analyzes the inevitability and development necessity of Web 3.0, as well as its potential future possibilities and transformative effects. Finally, it explores Web 3.0 through comparative analysis, discussing its relationship with the metaverse as well as how individuals and organizations can seize the opportunities presented by Web 3.0. Various topics related to Web 3.0, including its infrastructure, development facilities, scenario applications, technology stacks, and industry applications such as decentralized applications (DApps) and Software-as-a-Service (SaaS) platforms are presented in the book. It delves into the ecosystem of Web 3.0, discussing decentralized autonomous organizations (DAOs), open finance (DeFi), cryptocurrencies, token economy, digital identity, creator economy, attention economy, and cyber-physical and human systems. Additionally, it addresses governance issues, security challenges, development challenges, and legal and regulatory aspects associated with Web 3.0. Overall, Web 3.0: Concept, Content and Context provides readers with a comprehensive understanding of Web 3.0, its potential implications, and the opportunities for new industry models and business opportunities in the evolving Internet era.

  • af Qian Yao
    880,95 - 987,95 kr.

    This book focuses on development of blockchain-based new-generation financial infrastructures, in which a systematic, complete theoretical framework is proposed to explore blockchain-based securities trading platform, central securities depository (CSD), securities settlement system (SSS), central counterparty (CCP), payment system (PS) and trade repository (TR). The blockchain-based new FMI has attracted much attention in the securities industry. At present, the cross-border depository receipt (DR) business faces a dilemma between efficiency and security. In this book, the author proposes a blockchain-based new DR solution, manifesting the potential for using blockchain technology in the FMI field. In addition, using Hashed Timelock Contract (HTLC) as the underlying technology in the DR scenario, specific process and operations are proposed for delivery versus payment (DvP), delivery versus delivery (DvD) or payment versus payment (PvP) and other exchange-of-value methods. This book further studies how to carry out opening positions, end-of-day settlement of margin, forced liquidation and settlement at maturity, for exchange-traded derivatives, such as futures and options, under the blockchain-based technological framework. Blockchain technology not only naturally fits into the decentralized or non-centralized characteristic of the OTC market but also can effectively address the pain points and difficulties of the OTC market. This book provides an in-depth analysis of existing specific issues in China's bond market, regional equity markets and asset management market, among other OTC markets, and proposes relevant blockchain-based solutions. Blockchain technology does not change the public policy objectives for FMI. Theblockchain-based new FMIs are still subject to compliance, safety and efficiency requirements. This book provides a comprehensive assessment of the applicability of the Principles for Financial MarketInfrastructures (PFMI) to them, in particular, analyzes their legal basis, off-chain governance and system security.

  • af Lian Yuming
    880,95 - 987,95 kr.

    This book is a continuation and deepening of Sovereign Blockchain 1.0. It mainly includes three views: 1) Blockchain is a super public product based on digital civilization. 2) The Internet is an advanced level of industrial civilization, the core of which is connection; blockchain is an important symbol of digital civilization, the essence of which is reconstruction. 3) Digital currency will trigger a comprehensive change in the economic field, and digital identity will reconstruct the governance model in the social field, thereby changing the order of civilization.This book is not only a popular science book based on blockchain thinking, theory and application research, but also a scholarly work on the technical and philosophical issues of governance and the future. By reading Sovereign Blockchain 2.0, policymakers can quickly understand the basic knowledge and frontier dynamics of science and technology; science and technology workers can grasp the general trend, seize opportunities, face problems and difficulties, aim at the world's science and technology frontier and lead the direction of science and technology development; experts and scholars in law and legal fields can see new ideas, concepts and models of data governance; social science researchers can discover data sociology and data philosophy issues.   

  • af Dominik Merli
    542,95 kr.

    This practical guide to building embedded and IoT devices securely is an essential resource for current and future developers tasked with protecting users from the potential threats of these ubiquitous devices.As an engineer, you know that countless devices—from industrial components to smart household appliances—rely on embedded computer systems. But how do you balance the need for robust security with performance and innovative product design?Engineering Secure Devices will guide you through crafting secure devices—from protecting crucial assets to the nature of attackers and the risks they pose. You’ll explore the technical intricacies and pros and cons of symmetric and asymmetric cryptography and learn how to use and analyze random number generators and cryptographic algorithms. You’ll learn how to ensure confidential data storage and secure memory, and devise secure device identity solutions and communication protocols to reinforce system architecture against potential threats. And finally, you’ll learn how to properly design secure boot and secure update processes, manage access control, and perform system monitoring to secure IoT devices.Real-world case studies throughout highlight practical applications, solutions, and obstacles, such as firmware updates with SWUpdate, secure communication with MQTT, and advanced access control with AppArmor.You’ll also dig into topics like: Analyzing the performance of cryptographic implementations in both hardware and softwareConsiderations for secure boot and software update processes to ensure ongoing firmware integrityDesigning robust device architectures that withstand attacks while maintaining critical operationsDeveloping strategies to detect and respond to anomalies or security breaches in embedded systemsWhether you’re an IoT developer or an embedded system architect, Engineering Secure Devices equips you with the indispensable knowledge to design, secure, and support the next generation of smart devices—from webcams to four-legged robots.

  • af Punam Raj
    292,95 kr.

    Crypto FSM Recursion" takes readers on an enlightening journey into the intricate world of cryptocurrency through the perceptive lens of author Punam Raj. With a unique blend of technical insight and engaging prose, Raj explores the fascinating concept of Finite State Machines (FSMs) within the realm of cryptocurrencies.Raj's expertise shines as she navigates the complexities of FSMs, demonstrating their role in creating the structural framework that underpins various digital currencies. Through her clear and concise explanations, readers gain a deeper understanding of how FSMs operate within the crypto landscape, influencing transactions, security protocols, and consensus mechanisms.As the author delves into the concept of recursion, Raj skillfully unveils the recursive nature of both FSMs and cryptocurrency systems themselves. This recursive relationship becomes a central theme, showcasing the interconnectedness of various crypto elements and highlighting their self-referential properties."Crypto FSM Recursion" is more than a technical exploration; it's a thought-provoking voyage that invites readers to contemplate the intricate design of cryptocurrencies. Punam Raj's work not only sheds light on the subject but also inspires curiosity about the underlying principles that shape the future of digital finance.

  • af Wendy Charles
    570,95 - 579,95 kr.

    This book highlights the latest advances on the implementation and adaptation of blockchain technologies in real-world scientific, biomedical, and data applications. It presents rapid advancements in life sciences research and development by applying the unique capabilities inherent in distributed ledger technologies. The book unveils the current uses of blockchain in drug discovery, drug and device tracking, real-world data collection, and increased patient engagement used to unlock opportunities to advance life sciences research. This paradigm shift is explored from the perspectives of pharmaceutical professionals, biotechnology start-ups, regulatory agencies, ethical review boards, and blockchain developers. This book enlightens readers about the opportunities to empower and enable data in life sciences.

  • af Keshav Kaushik, Omprakash Kaiwartya & Sachin Kumar Gupta
    858,95 - 1.081,95 kr.

  • af Ethan J. Monroe
    152,95 - 167,95 kr.

  • af Thomas Johansson & Daniel Smith-Tone
    863,95 kr.

    This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography, PQCrypto 2022, held in College Park, MD, USA, in August 14¿18, 2023.The 25 full papers presented in this book were carefully reviewed and selected from 51 submissions. They are categorized in the following topical sections: code-based cryptography; group-action-based cryptography; isogenye-based cryptography; lattice-based cryptography; multivariate cryptography; quantum algorithms, cryptanalysis and models; post-quantum protocols; side channel cryptanalysis and countermeasures.

  • af Fatih Sinan Esen
    2.347,95 kr.

    This book has a multidisciplinary approach to Metaverse studies and the relevance of Metaverse with the current and popular topics that concern society and how it will change them in the future. In addition, academic texts are included since not much scientific content is available in this field. In short, there are sections in the book that everyone will find useful. Most importantly, the topics are grouped under four main parts. The first is the Introduction, where the main issues are explained. In the second section¿Technical Topics, the technological infrastructure of the subject is explained, followed by section three where the social and human dimensions of Metaverse are explained. The fourth and final section is on Industrial Applications.

  • af Mariya Ouaissa, Rajesh Kumar Dhanaraj, V. Seethalakshmi & mfl.
    1.477,95 kr.

  • af Valentin Mulder, Bernhard Tellenbach, Vincent Lenders & mfl.
    360,95 - 443,95 kr.

  • af Helena Albuquerque
    1.563,95 kr.

    This proceedings volume presents a selection of peer-reviewed contributions from the Second Non-Associative Algebras and Related Topics (NAART II) conference, which was held at the University of Coimbra, Portugal, from July 18¿22, 2022. The conference was held in honor of mathematician Alberto Elduque, who has made significant contributions to the study of non-associative structures such as Lie, Jordan, and Leibniz algebras. The papers in this volume are organized into four parts: Lie algebras, superalgebras, and groups; Leibniz algebras; associative and Jordan algebras; and other non-associative structures. They cover a variety of topics, including classification problems, special maps (automorphisms, derivations, etc.), constructions that relate different structures, and representation theory.One of the unique features of NAART is that it is open to all topics related to non-associative algebras, including octonion algebras, composite algebras, Banach algebras, connections with geometry, applications in coding theory, combinatorial problems, and more. This diversity allows researchers from a range of fields to find the conference subjects interesting and discover connections with their own areas, even if they are not traditionally considered non-associative algebraists. Since its inception in 2011, NAART has been committed to fostering cross-disciplinary connections in the study of non-associative structures.

  • af Helena Handschuh & Anna Lysyanskaya
    842,95 - 977,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.