Udvidet returret til d. 31. januar 2025
Filter
Filter
Sorter efterSorter Populære
  • af Wolfgang Babel
    315,95 kr.

    Die Ursprünge von IoT gehen von Kevin Ashton zurück bis zu den RFID-Sensoren in den 70er Jahren. Industrie 4.0 basiert ebenfalls auf den Ideen von IoT mit dem wesentlichen Punkt der globalen Internetkommunikation: Wer IoT sagt, meint Industrie 4.0 und umgekehrt. IoT ist von Industrie 4.0 nicht mehr zu trennen. Die Geschichte und die Zusammenhänge von IoT und Industrie 4.0 werden auf anschauliche Weise anhand von Beispielen erklärt, angefangen vom Ethernet TCP/IP, über die generelle Automatisierungsstrategie bis hin zu den grundlegenden vertikalen und horizontalen Kommunikationsprotokollen, bei denen heute OPC UA und Cloud Computing eine tragende Rolle zukommt.Den kostenlosen Zugang zum Online-Kurs finden Sie direkt im Buch.

  • af Zachary Wallace
    453,95 - 663,95 kr.

  • af Anna Brunstrom, Marco Fiore & Marcel Flores
    902,95 kr.

    This book constitutes the proceedings of the 24th International Conference, PAM 2023, held as a virtual event, March 21¿23, 2023.The 18 full papers and 9 short papers presented in this volume were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: VPNs and Infrastructure; TLS; Applications; Measurement Tools; Network Performance; Topology; Security and Privacy; DNS; and Web.

  • af Cliff Wang, Milind Tambe & Tiffany Bao
    1.702,95 kr.

    This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding human¿s cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human¿s behaviorsDesigning deceptive techniques that supports the enforcement of deceptive strategiesThe research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception.Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity.Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

  • af Sheikh Mohammad Idrees & Mariusz Nowostawski
    1.410,95 kr.

  • af Ajit Kumar Nayak, Manoranjan Mohanty, Kuan-Ching Li, mfl.
    1.734,95 - 3.123,95 kr.

  • af José Luís Reis
    2.808,95 - 3.316,95 kr.

    This book includes selected papers presented at the International Conference on Marketing and Technologies (ICMarkTech 2021), held at University of La Laguna, Tenerife, Spain, during December 2-4, 2021. It covers up-to-date cutting-edge research on artificial intelligence applied in marketing, virtual and augmented reality in marketing, business intelligence databases and marketing, data mining and big data, marketing data science, web marketing, e-commerce and v-commerce, social media and networking, geomarketing and IoT, marketing automation and inbound marketing, machine learning applied to marketing, customer data management and CRM, and neuromarketing technologies.

  • af V. Bindhu
    3.033,95 - 3.043,95 kr.

    This book includes high quality research papers presented at the International Conference on Communication, Computing and Electronics Systems 2021, held at the PPG Institute of Technology, Coimbatore, India, on 28-29 October 2021. The volume focuses mainly on the research trends in cloud computing, mobile computing, artificial intelligence and advanced electronics systems. The topics covered are automation, VLSI, embedded systems, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, communication networks, Internet of Things, cyber-physical systems, and healthcare informatics.

  • af Steve Miles
    433,95 kr.

    Gain critical real-world skills to secure your Microsoft Azure infrastructure against cyber attacksPurchase of the print or Kindle book includes a free PDF eBookKey Features:Dive into practical recipes for implementing security solutions for Microsoft Azure resourcesLearn how to implement Microsoft Defender for Cloud and Microsoft SentinelWork with real-world examples of Azure Platform security capabilities to develop skills quicklyBook Description:With evolving threats, securing your cloud workloads and resources is of utmost importance. Azure Security Cookbook is your comprehensive guide to understanding specific problems related to Azure security and finding the solutions to these problems.This book starts by introducing you to recipes on securing and protecting Azure Active Directory (AD) identities. After learning how to secure and protect Azure networks, you'll explore ways of securing Azure remote access and securing Azure virtual machines, Azure databases, and Azure storage. As you advance, you'll also discover how to secure and protect Azure environments using the Azure Advisor recommendations engine and utilize the Microsoft Defender for Cloud and Microsoft Sentinel tools. Finally, you'll be able to implement traffic analytics; visualize traffic; and identify cyber threats as well as suspicious and malicious activity.By the end of this Azure security book, you will have an arsenal of solutions that will help you secure your Azure workload and resources.What You Will Learn:Find out how to implement Azure security features and toolsUnderstand how to provide actionable insights into security incidentsGain confidence in securing Azure resources and operationsShorten your time to value for applying learned skills in real-world casesFollow best practices and choices based on informed decisionsBetter prepare for Microsoft certification with a security elementWho this book is for:This book is for Azure security professionals, Azure cloud professionals, Azure architects, and security professionals looking to implement secure cloud services using Microsoft Defender for Cloud and other Azure security features. A solid understanding of fundamental security concepts and prior exposure to the Azure cloud will help you understand the key concepts covered in the book more effectively. This book is also beneficial for those aiming to take Microsoft certification exams with a security element or focus.

  • af Perry Lea
    321,95 kr.

    Edge Computing Technology and Applications introduces all aspects of edge computing. Illustrations and graphics help make complex topics easy to understand. If you're a business decision maker, you'll welcome the jargon-free explanations of key concepts. Technical pros will appreciate the big-picture coverage of the central technologies of edge computing. You'll find essential coverage of the edge's systems and architectures, as well as how to prevent embarrassing and crippling cyber attacks. Throughout, the book's real-world use cases cut through the hype and reveal how edge computing is being effectively used in industry. about the reader For technology leaders and managers looking to rapidly get up to speed with edge computing.

  • af Dario Cabianca
    607,95 kr.

    While many guides exist to help software engineers learn cloud networking design and architecture concepts, and even prepare for cloud network certifications on AWS and Azure, far fewer resources are available covering the Google Cloud Platform (GCP) Professional Cloud Network Engineer certification exam. Well, look no further! This self-paced guide book is designed to help engineers learn cloud networking best practices on GCP, and prepare for the GCP Professional Cloud Network Engineer certification exam.You will waste no time when you use this study companion. It lets you dive in and learn how GCP differs from other public cloud providers (AWS and Microsoft Azure). You will understand GCP's unique ability to allow virtual private clouds (VPCs) that span across multiple regions. You will know how to leverage GCP as a competitive advantage in the IT engineering community. Key concepts covered on the exam are called out and applied in each chapter of this book, giving you both practice and reinforcement, a far more effective learning tool than rote learning or similar approaches typically enlisted in exam preparation.Enterprises are looking for developers with Google networking skills. Now is the time to skill up! This book shows you how to leverage GCP¿s developer-focused, user-friendly approach to understand how the networking components enabling the popular 1B-user Google products (e.g., Gmail, Google Search, YouTube, Google Workspace (formerly G-Suite), Google Maps, Google Photos, and many others) work behind the scenes.What You Will LearnIn addition to preparing for the GCP Professional Cloud Network Engineer certification exam, you will learn how to:Architect and design a virtual private cloudImplement a virtual private cloudConfigure network servicesImplement hybrid connectivityImplement network securityManage network operationsOptimize network resourcesWho This Book Is ForSoftware engineers (network, DevOps, SecOps, DataOps, engineers skilled with SDLC), software architects (solution, security, data, infrastructure, cloud, those skilled with TOGAF), and IT professionals. Prerequisites: While this study companion is intended to be self-contained, a basic knowledge of cloud computing along with hands-on experience with a minimum of two modern programming languages (Java, C#) is beneficial in order for readers to fully achieve the objectives of the book.

  • af Unmesh Joshi
    433,95 kr.

    A Patterns Approach to Designing Distributed Systems and Solving Common Implementation Problems More and more enterprises today are dependent on cloud services from providers like AWS, Microsoft Azure, and GCP. They also use products, such as Kafka and Kubernetes, or databases, such as YugabyteDB, Cassandra, MongoDB, and Neo4j, that are distributed by nature. Because these distributed systems are inherently stateful systems, enterprise architects and developers need to be prepared for all the things that can and will go wrong when data is stored on multiple servers--from process crashes to network delays and unsynchronized clocks. Patterns of Distributed Systems describes a set of patterns that have been observed in mainstream open-source distributed systems. Studying the common problems and the solutions that are embodied by the patterns in this guide will give you a better understanding of how these systems work, as well as a solid foundation in distributed system design principles. Featuring real-world code examples from systems like Kafka and Kubernetes, these patterns and solutions will prepare you to confidently traverse open-source codebases and understand implementations you encounter "in the wild." Review the building blocks of consensus algorithms, like Paxos and Raft, for ensuring replica consistency in distributed systems Understand the use of logical timestamps in databases, a fundamental concept for data versioning Explore commonly used partitioning schemes, with an in-depth look at intricacies of two-phase-commit protocol Analyze mechanisms used in implementing cluster coordination tasks, such as group membership, failure detection, and enabling robust cluster coordination Learn techniques for establishing effective network communication between cluster nodes. Along with enterprise architects and data architects, software developers working with cloud services such as Amazon S3, Amazon EKS, and Azure CosmosDB or GCP Cloud Spanner will find this set of patterns to be indispensable. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

  • af Aneesh Sreevallabh Chivukula
    1.999,95 kr.

    A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unintended ways. In this book, we review the latest developments in adversarial attack technologies in computer vision; natural language processing; and cybersecurity with regard to multidimensional, textual and image data, sequence data, and temporal data. In turn, we assess the robustness properties of deep learning networks to produce a taxonomy of adversarial examples that characterises the security of learning systems using game theoretical adversarial deep learning algorithms. The state-of-the-art in adversarial perturbation-based privacy protection mechanisms is also reviewed. We propose new adversary types for game theoretical objectives in non-stationary computational learning environments. Proper quantificationof the hypothesis set in the decision problems of our research leads to various functional problems, oracular problems, sampling tasks, and optimization problems. We also address the defence mechanisms currently available for deep learning models deployed in real-world environments. The learning theories used in these defence mechanisms concern data representations, feature manipulations, misclassifications costs, sensitivity landscapes, distributional robustness, and complexity classes of the adversarial deep learning algorithms and their applications. In closing, we propose future research directions in adversarial deep learning applications for resilient learning system design and review formalized learning assumptions concerning the attack surfaces and robustness characteristics of artificial intelligence applications so as to deconstruct the contemporary adversarial deep learning designs. Given its scope, the book will be of interest to Adversarial Machine Learning practitioners and Adversarial Artificial Intelligence researchers whose work involves the design and application of Adversarial Deep Learning.

  • af M. Güne¿ Gençy¿lmaz
    3.801,95 kr.

    This book contains selected papers from International Symposium for Production Research 2022, held on October 6¿9, 2022, Turkey. The book reports recent advances in production engineering and operations. It explores topics including:production research;production management; operations management;industry 4.0;industrial engineering;mechanical engineering;engineering management; andoperational research.Presenting real-life applications, case studies, and mathematical models, this book is of interest to researchers, academics, and practitioners in the field of production and operation engineering. It provides both the results of recent research and practical solutions to real-world problems.

  • af Mohd Abdul Ahad
    2.007,95 kr.

    With the rapid penetration of technology in varied application domains, the existing cities are getting connected more seamlessly. Cities becomes smart by inducing ICT in the classical city infrastructure for its management. According to McKenzie Report, about 68% of the world population will migrate towards urban settlements in near future. This migration is largely because of the improved Quality of Life (QoL) and livelihood in urban settlements. In the light of urbanization, climate change, democratic flaws, and rising urban welfare expenditures, smart cities have emerged as an important approach for society¿s future development. Smart cities have achieved enhanced QoL by giving smart information to people regarding healthcare, transportation, smart parking, smart traffic structure, smart home, smart agronomy, community security etc. Typically, in smart cities data is sensed by the sensor devices and provided to end users for further use. The sensitive data is transferredwith the help of internet creating higher chances for the adversaries to breach the data. Considering the privacy and security as the area of prime focus, this book covers the most prominent security vulnerabilities associated with varied application areas like healthcare, manufacturing, transportation, education and agriculture etc. Furthermore, the massive amount of data being generated through ubiquitous sensors placed across the smart cities needs to be handled in an effective, efficient, secured and privacy preserved manner. Since a typical smart city ecosystem is data driven, it is imperative to manage this data in an optimal manner. Enabling technologies like Internet of Things (IoT), Natural Language Processing (NLP), Blockchain Technology, Deep Learning, Machine Learning, Computer vision, Big Data Analytics, Next Generation Networks and Software Defined Networks (SDN) provide exemplary benefits if they are integrated in the classical city ecosystem in an effective manner. The application of Artificial Intelligence (AI) is expanding across many domains in the smart city, such as infrastructure, transportation, environmental protection, power and energy, privacy and security, governance, data management, healthcare, and more. AI has the potential to improve human health, prosperity, and happiness by reducing our reliance on manual labor and accelerating our progress in the sciences and technologies. NLP is an extensive domain of AI and is used in collaboration with machine learning and deep learning algorithms for clinical informatics and data processing. In modern smart cities, blockchain provides a complete framework that controls the city operations and ensures that they are managed as effectively as possible. Besides having an impact on our daily lives, it also facilitates many areas of city management.

  • af Muhammad Shahbaz
    1.791,95 kr.

    This book looks at how digital economy can help energy businesses to meet their sustainability goals. It will further generates a new debate among policymakers about encouraging green technologies to reduce global carbon emissions.Our modern society requires a long-term, sustainable, and secure energy supply that not only generates and preserves renewable energy. It is also creating universal intelligent machines for power systems, and vital infrastructure is considered in terms of digital economy requirements. The idea of sharing information is an essential principle of sustainable thinking. In such instances, open internet and data access are required to enable any human being to acquire knowledge. Furthermore, the energy industry is changing worldwide, necessitating the consideration of potential implications and modifications. Thus, its most distinguishing feature is moving from a centrally organized system to one with many market players. Consequently, information and communication technologies and human growth have significant main and interactive effects on environmental sustainability. Simultaneously, energy industry is a major player in resolving the digital economy¿s development issues.

  • af Guillaume Pitron
    196,95 kr.

    A gripping new investigation into the underbelly of digital technology, which reveals not only how costly the virtual world is, but how damaging it is to the environment.If digital technology were a country, it would be the third-highest consumer of electricity behind China and the United States.Every year, streaming technology generates as much greenhouse gas as Spain - close to 1 per cent of global emissions.One Google search uses as much electricity as a lightbulb left on for up to two minutes.It turns out that the 'dematerialised' digital world, essential for communicating, working, and consuming, is much more tangible than we would like to believe. Today, it absorbs 10 per cent of the world's electricity and represents nearly 4 per cent of the planet's carbon dioxide emissions. We are struggling to understand these impacts, as they are obscured to us in the mirage of 'the cloud'.The result of an investigation carried out over two years on four continents, The Dark Cloud reveals the anatomy of a technology that is virtual only in name. Under the guise of limiting the impact of humans on the planet, it is already asserting itself as one of the major environmental challenges of the twenty-first century.

  • af Udo Kebschull
    435,95 kr.

    Technische Maßnahmen, die es Cyberangreifern schwer machen, dienen zur Abschreckung, weil Hacker immer nur so hoch springen, wie sie müssen. Bei komplexen und vor allem sicherheitsrelevanten IT-Infrastrukturen reichen diese technischen Maßnahmen allein jedoch oft nicht aus.Dieses Lehrbuch betrachtet alle Aspekte der IT-Sicherheit und effektive Maßnahmen, um Angriffe zu detektieren und sich erfolgreich dagegen zu wehren. Es behandelt allgemeine Angriffsmechanismen und Angriffsszenarien, die von Angreifern angewendet werden. Dabei soll klar werden, dass es nicht ausreichend ist, Firewall-Regeln sauber zu konfigurieren oder die aktuellsten Patches einzuspielen. Vielmehr muss ein ganzheitlicher Ansatz gewählt werden, der Nutzende einschließt (Awareness) und funktionierende Prozesse für den Fall eines konkreten Angriffs etabliert. Das Buch zeigt, wo die Schwachstellen liegen, wie man sie schließt, wie man Angriffe erkennt und wie man sie erfolgreich abwehrt.

  • af Jianwei Liu
    2.203,95 kr.

    This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Today, SAGINs have been widely developed for a range of applications in navigation, environmental monitoring, traffic management, counter-terrorism, etc. However, security becomes a major concern, since the satellites, spacecrafts, and aircrafts are susceptible to a variety of traditional/specific network-based attacks, including eavesdropping, session hijacking, and illegal access.In this book, we review the theoretical foundations of SAGIN security. We also address a range of related security threats and provide cutting-edge solutions in the aspect of ground network security, airborne network security, space network security, and provide future trends in SAGIN security. The book goes from an introduction to the topic¿s background, to a description of the basic theory, and then to cutting-edge technologies, making it suitable for readers at all levels including professional researchers and beginners. To gain the most from the book, readers should have taken prior courses in information theory, cryptography, network security, etc.

  • af Suaib Mohammad
    328,95 kr.

    The internet has become an integral component of our daily life. It has led billions of individuals all around the world to participate and collaborate in accessing and sharing information across the world. It is possible only internet that people today can access practically any type of information at any time, from anywhere by just making a search on their internet-devices (such as smartphones, tablets Laptop etc.). They are just a click away from any information which is globally available around them on internet. "Searching is an Art" to make it true "Search Engines" come in a big picture. Search engine plays a vital role particularly exploring information within large and voluminous websites such as E-commerce websites, corporate sites, and social networking sites etc.

  • af Mario Franz
    1.163,95 kr.

    Managing projects across an organization is complex. This book guides you through each twist and turn in the project lifecycle using Project System in SAP S/4HANA. Start by setting up the master data that project management depends on. Then configure and run planning functions for project logistics and financials. Finally, execute your projects and manage all period-end allocation and close tasks. Details on project analysis reports and integration scenarios make this the only guide you need!In this book, you'll learn about:a. Project Setup Set up your Project System master data in SAP S/4HANA. Customize data elements like work breakdown structures and networks. Make the most of versions, editing functions, project processing capabilities, and more. b. Project Planning, Execution, and CloseConfigure and run the core phases of project management, step by step. Plan your project costs and logistics, perform project execution activities across the SAP S/4HANA system, and manage period-end close for plan and actual data. c. Reporting and IntegrationAnalyze your project data with Project System reports for project structures, financials, and logistics. Explore integration scenarios for Project System such as SAP S/4HANA Cloud for projects.Highlights include:1) Master data 2) Scheduling3) Resource planning4) Material planning5) Revenue planning6) Budgeting 7) Project execution8) Invoicing 9) Period-end close 10) Integration 11) Reporting

  • af Nicholas Oles
    272,95 kr.

    Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change.Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely.This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity.You Will Learn How to: Safely save email messages as attachments for analysisIdentify what information is in an email headerReview header information and extract key indicators or patterns used for detectionIdentify signs of a suspicious or malicious email messageDetect the tactics that attackers use in phishing emailsSafely examine email links and attachmentsUse a variety of free and simple tools to analyze email messagesWho This Book Is ForCybersecurity professionals and interested computer security enthusiasts currently holding or aspiring to obtain positions such as IT Security Analyst, Network Defender, Security Operations Center Analyst, or Help Desk Technician. Readers should have a general understanding of how email works and some ways that attackers use this platform for initial access.

  • af ERIK DAHLMAN
    884,95 kr.

    5G Advanced: The Next Generation Wireless Access Technology, Third Edition follows the authors' highly celebrated books on 3G and 4G by providing a new level of insight into 5G NR. After an initial discussion of the background to 5G, including requirements, spectrum aspects and the standardization timeline, all technology features of the first phase of NR are described in detail. Included is a detailed description of the NR physical-layer structure and higher-layer protocols, RF and spectrum aspects and co-existence and interworking with LTE. This book provides a good understanding of NR and the different NR technology components, giving insight into why a certain solution was selected.

  • af P. Vadivelmurugan
    358,95 kr.

    A thorough manual that addresses buffer overflow assaults is "Managing the Buffer Overflow Attack in Network and Operating System Detection and Prevention Methods" by P. Vadivelmurugan. For academics, researchers, and professionals who want to learn more about buffer overflow attacks and the precautions needed to avoid them, the book is an invaluable resource.The buffer overflow attack is thoroughly explained in the book, as well as how it affects the network and operating system. The principles of buffer overflow attacks, typical methods for spotting them, and available preventive measures are only a few of the subjects it addresses. The book also offers comprehensive details on the methods and tools used for buffer overflow attack detection and prevention.The book is understandable to readers with varied degrees of subject experience because it is written in a straightforward and succinct manner. The book shows the author's thorough research and knowledge of network security. Everyone who is interested in learning about the security ramifications of buffer overflow attacks should read the book.In conclusion, the great resource "Managing the Buffer Overflow Attack in Network and Operating System Detection and Prevention Methods" offers a thorough analysis of the buffer overflow assault and its ramifications. It is an important tool for academics, researchers, and professionals who want to comprehend the nuances of buffer overflow attacks and the precautions needed to avoid them.

  • af Dmitry Vostokov & Software Diagnostics Services
    278,95 kr.

  • af Rama Chellappa, Lei Wang, Tat-Jun Chin, mfl.
    1.144,95 - 2.030,95 kr.

  • af Nadia Nedjah
    2.458,95 kr.

    This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2022), organized during September 09¿11, 2022, in Thailand in online mode. The objective of ICSPN 2022 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community and to provide opportunities to develop creative solutions to various security, privacy and networking problems.

  • af Joaquin Garcia-Alfaro
    873,95 kr.

    This book constitutes the refereed proceedings and revised selected papers from the 16th International Workshop on Data Privacy Management, DPM 2021, and the 5th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2021, which were held online on October 8, 2021, in conjunction with ESORICS 2021. The workshops were initially planned to take place in Darmstadt, Germany, and changed to an online event due to the COVID-19 pandemic.The DPM 2021 workshop received 25 submissions and accepted 7 full and 3 short papers for publication. These papers were organized in topical sections as follows: Risks and privacy preservation; policies and regulation; privacy and learning.For CBT 2021 6 full papers and 6 short papers were accepted out of 31 submissions. They were organized in topical sections as follows: Mining, consensus and market manipulation; smart contracts and anonymity.

  • af Moti Yung
    936,95 kr.

    This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11¿13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.