Coding theory and cryptology Books

221 products


  • Transactions on Large-Scale Data- and Knowledge-Centered Systems XLVIII: Special Issue In Memory of Univ. Prof. Dr. Roland Wagner

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Transactions on Large-Scale Data- and Knowledge-Centered Systems XLVIII: Special Issue In Memory of Univ. Prof. Dr. Roland Wagner

    1 in stock

    Book SynopsisThe LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing (e.g., computing resources, services, metadata, data sources) across different sites connected through networks has led to an evolution of data- and knowledge management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. This, the 48th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains 8 invited papers dedicated to the memory of Prof. Dr. Roland Wagner. The topics covered include distributed database systems, NewSQL, scalable transaction management, strong consistency, caches, data warehouse, ETL, reinforcement learning, stochastic approximation, multi-agent systems, ontology, model-driven development, organisational modelling, digital government, new institutional economics and data governance.Table of ContentsDistributed Database Systems: The Case for NewSQL.- Boosting OLTP Performance using Write-back Client-side Caches.- pygrametl: A Powerful Programming Framework for Easy Creation and Testing of ETL Flows.- A Data Warehouse of Wi-Fi Sessions for Contact Tracing and Outbreak Investigation.- Convergence Proof for Actor-Critic Methods Applied to PPO and RUDDER.- Revival of MAS Technologies in Industry.- From Strategy to Code: Achieving Strategical Alignment in Software Development Projects through Conceptual Modelling.- On State-Level Architecture of Digital Government Ecosystems: From ICT-Driven to Data-Centric.

    1 in stock

    £58.49

  • Encrypt, Sign, Attack: A compact introduction to cryptography

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Encrypt, Sign, Attack: A compact introduction to cryptography

    1 in stock

    Book SynopsisThis book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to "crack" encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults.Table of ContentsBasics and history.- Symmetric ciphers.- Public-key ciphers.- Digital signature.

    1 in stock

    £26.59

  • Understanding Cryptography

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Understanding Cryptography

    5 in stock

    Book SynopsisUnderstanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaitedsecond editionofUnderstanding Cryptographyfollows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basiccryptography concepts, this seminal textbookcovers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithmscurrently in use inapplicationsranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. Topics and features:Opens with a foreword by cryptography pioneer and Turing Award winner, Ron RivestHelps develop a comprehensive understanding of modern applied cryptographyProvides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher familiesIncludes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussionCommunicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimumSupplies up-to-date security parameters for all cryptographic algorithmsIncorporates chapter reviews and discussion on such topics as historical and societal contextThis must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years' experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.

    5 in stock

    £53.99

  • Coding Care: Towards a Technology for Nature

    Hatje Cantz Coding Care: Towards a Technology for Nature

    2 in stock

    Book SynopsisCoding Care: Towards a Technology for Nature brings together contributions from renowned authors and artists who are particularly concerned with nature and our environment. In doing so, they raise the question of how we can use technology to better understand nature and shape coexistence in a sustainable way - especially in regions that are not yet fully technologized. In this sense, coding should be understood as a form of caring, a substitute for what technology can contribute to the future in each specific cultural and regional context.

    2 in stock

    £23.80

  • Übungen zur Nachrichtenübertragung: Übungs- und

    Springer Fachmedien Wiesbaden Übungen zur Nachrichtenübertragung: Übungs- und

    Out of stock

    Book SynopsisDieses Übungsbuch illustriert Methoden der Nachrichtentechnik anhand ausgewählter Problemstellungen. Ein PC wird zur Bearbeitung nicht benötigt. Insgesamt 74 Aufgaben inklusive ausführlicher Lösungen führen den Leser an Themen der Systemtheorie, analoger und digitaler Modulationsverfahren sowie der Mobilfunkübertragung heran. Die Struktur orientiert sich an der sechsten Auflage des Lehrbuchs Nachrichtenübertragung.Table of ContentsSignale und Systeme.- Rauschsignale – Eigenschaften von Übertragungskanälen.- Analoge Modulationsverfahren.- Lineare Verzerrungen und Rauschen.- Systembeispiele.- Grundlagen der Datenübertragung.- Digitale Modulation.- Demodulationsstrukturen.- AGN-Übertragung.- Entzerrung.- Viterbi-Algorithmus.- Kanalschätzung.- Funkkanalübertragung.- OFDM.- CDMA.- Mehrantennensysteme.

    Out of stock

    £28.49

  • Cryptography and Network Security

    River Publishers Cryptography and Network Security

    1 in stock

    Book SynopsisThis book provides a comprehensive introduction to the foundations of cryptography and network security. As well as a thorough presentation of the evolution of the topic the book includes information about basic hacker attacks, alternatives to prevent attacks, ways to increase data protection and how to set up and implement secure protocols.

    1 in stock

    £47.49

  • Cryptography

    River Publishers Cryptography

    1 in stock

    Book SynopsisCryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including:full provision of Web-based material on almost every topic coveredprovision of additional on-line material, such as videos, source code, and labscoverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs)Key areas covered include:Fundamentals of EncryptionPublic Key EncryptionSymmetric Key EncryptionHashing MethodsKey Exchange MethodsDigital Certificates and AuthenticationTunnelingCrypto CrackingLight-weight CryptographyBlockchainZero-knowledge ProofsThis book provides extensive support through the associated website of: http://asecuritysite.com/encryptionTable of Contents1. Ciphers and Fundamentals 2. Secret Key Encryption 3. Hashing 4. Public Key 5. Key Exchange 6. Authentication and Digital Certificates 7. Tunneling 8. Crypto Cracking 9. Light-weight Cryptography 10. Blockchain 11. Zero Knowledge 12. Wifi

    1 in stock

    £61.74

  • Real Life Cryptology: Ciphers and Secrets in

    Amsterdam University Press Real Life Cryptology: Ciphers and Secrets in

    Out of stock

    Book SynopsisA large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of ŸprivateŒ applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.Table of ContentsAbbreviations Note on terminology Note on names 1. Introduction 2. Uncovered fields in the research literature 2.1. Neglected secret writings in secrecy studies 2.2. Secrecy in the history of science 2.3. The need for social history in cryptography studies 2.4. Cryptography in Hungary 3. Secret writings and attitudes - research questions 4. Theory and practice of cryptography in early modern Europe 4.1 Vulnerable ciphers: the monoalphabetic way 4.2. An Arabic contribution: the cryptanalysis 4.3. New methods in the literature: the polyalphabetic cipher 4.4. Practice in diplomacy: the homophonic cipher 5. Ciphers in Hungary: the source material 5.1. Frameworks of data collection 5.2. General description of the sources 5.3. Cipher keys 5.3.1 The structure of the tables 5.3.2. Letters of the alphabet 5.3.3. Nomenclatures 5.3.4. Nullities 5.3.5. Grammatical elements 5.4. Ciphered letters 6. Ciphers in action 6.1. Sharing the key 6.2. Replacing the cipher keys 6.3. The tiresome work of enciphering 6.4. The cryptologist 6.5. Cautious and reckless encryption 6.6. Sand in the machine 6.7. Breaking the code 6.8. Advanced or outdated? 7. Ways of knowledge transfer 7.1. Handbooks of cryptography 7.2. Artificial languages 7.3. Stenography 7.4. The Turkish factor 7.5. Distance from diplomacy 8. Scenes of secrecy 8.1. Dissimulation and the secret 8.2. Communication in politics 8.3. Military operations and espionage 8.4. Love, politics and male bonding 8.5. Family secrets and privacy: ladies and ciphers 8.6. Private sins-public morals: secrets of a diary and shame 8.7. Science, chemistry and alchemy 8.8. Secret characters and magic 8.9. Encrypting in religion 9. Summary 10. Appendix 10.1 List of cipher tables from early modern Hungary 10.2 List of ciphertexts from early modern Hungary Acknowledgements Earlier publications Bibliography INDEX

    Out of stock

    £101.65

  • Cryptology For Engineers: An Application-oriented

    World Scientific Publishing Co Pte Ltd Cryptology For Engineers: An Application-oriented

    Out of stock

    Book SynopsisCryptology is increasingly becoming one of the most essential topics of interest in everyday life. Digital communication happens by transferring data between at least two participants — But do we want to disclose private information while executing a sensitive bank transfer? How about allowing third-party entities to eavesdrop on private calls while performing an important secret business discussion? Do we want to allow ambient communication concerning us to be manipulated while control software is driving our autonomous car along a steep slope? Questions like these make it clear why issues of security are a great concern in our increasingly augmented world.Cryptology for Engineers is a study of digital security in communications systems. The book covers the cryptographical functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' requirements on the other. Numerous examples computable by hand or with a small additional cost in most cases are provided inside.

    Out of stock

    £85.50

  • Codes And Modular Forms: A Dictionary

    World Scientific Publishing Co Pte Ltd Codes And Modular Forms: A Dictionary

    Out of stock

    Book SynopsisThere are connections between invariant theory and modular forms since the times of Felix Klein, in the 19th century, connections between codes and lattices since the 1960's. The aim of the book is to explore the interplay between codes and modular forms. Here modular form is understood in a wide sense (Jacobi forms, Siegel forms, Hilbert forms). Codes comprises not only linear spaces over finite fields but modules over some commutative rings. The connection between codes over finite fields and lattices has been well documented since the 1970s. Due to an avalanche of results on codes over rings since the 1990's there is a need for an update at book level.

    Out of stock

    £76.00

  • Designs From Linear Codes

    World Scientific Publishing Co Pte Ltd Designs From Linear Codes

    Out of stock

    Book SynopsisSince the publication of the first edition of this monograph, a generalisation of the Assmus-Mattson theorem for linear codes over finite fields has been developed, two 70-year breakthroughs and a considerable amount of other progress on t-designs from linear codes have been made. This second edition is a substantial revision and expansion of the first edition. Two new chapters and two new appendices have been added, and most chapters of the first edition have been revised.It provides a well-rounded and detailed account of t-designs from linear codes. Most chapters of this book cover the support designs of linear codes. A few chapters deal with designs obtained from linear codes in other ways. Connections among ovals, hyperovals, maximal arcs, ovoids, special functions, linear codes and designs are also investigated. This book consists of both classical and recent results on designs from linear codes.It is intended to be a reference for postgraduates and researchers who work on combinatorics, or coding theory, or digital communications, or finite geometry. It can also be used as a textbook for postgraduates in these subject areas.Related Link(s)

    Out of stock

    £139.50

  • Analysis, Cryptography And Information Science

    World Scientific Publishing Co Pte Ltd Analysis, Cryptography And Information Science

    Out of stock

    Book SynopsisThis compendium focuses on self-contained presentations of various developments in mathematical analysis, cryptography and information science.The volume features both original research and survey papers contributed by experts from the international community. The book has a strong interdisciplinary flavor and features the most recent developments in the topics treated.This useful reference text benefits professionals, researchers, academics and graduate students.

    Out of stock

    £85.50

  • Security in Computing and Communications: 8th

    Springer Verlag, Singapore Security in Computing and Communications: 8th

    3 in stock

    Book SynopsisThis book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.Table of ContentsPandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools.- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems.- Evading Static and Dynamic Android Malware Detection Mechanisms.- Multilevel Secure Container Deployment Framework in Edge Computing.- Deep Hierarchical APP Recommendation with Dynamic Behaviors.- New Security Architecture of Access Control in 5G MEC.- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments.- A Survey of Security Attacks on Silicon Based Weak PUF Architectures.- On the Feasibility of DoS Attack on Smart Door Lock IoT Network.- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning.- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection.- Thermal Management in Large Data Centres: Security Threats and Mitigation.- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm.- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data.- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm.- SaaS - Microservices-Based Scalable Smart Contract Architecture.- GIDS: Anomaly Detection Using Generative Adversarial Networks.- Audio Steganography Using Multi LSB and IGS Techniques.- A Forensic Analysis on the Availability of MQTT Network Traffic.- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications.- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment.

    3 in stock

    £40.49

  • Quantum Algorithms for Cryptographically

    Springer Verlag, Singapore Quantum Algorithms for Cryptographically

    3 in stock

    Book SynopsisThis book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the area and the hands-on analysis of the spectral properties of Boolean functions from a cryptologic viewpoint. Topics covered in the book include Qubit, Deutsch–Jozsa and Walsh spectrum, Grover’s algorithm, Simon’s algorithm and autocorrelation spectrum. The book aims at encouraging readers to design and implement practical algorithms related to Boolean functions. Apart from combinatorial techniques, this book considers implementing related programs in a quantum computer. Researchers, practitioners and educators will find this book valuable. Table of Contents1. Introduction.- 2. Deutsch-Jozsa and Walsh Spectrum.- 3. Grover’s Algorithm and Walsh Spectrum.- 4. Simon’s Algorithm and Autocorrelation Spectrum.- 5. Conclusion & Research Direction.

    3 in stock

    £52.24

  • Proceedings of International Conference on

    Springer Verlag, Singapore Proceedings of International Conference on

    3 in stock

    Book SynopsisThe book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India—Kolkata Chapter, India, during December 2–4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.Table of ContentsCyber-Defense Mechanism Considering Incomplete Information Using POMDP.- Monitoring, Recognition and Attendance Automation in Online Class: Combination of Image Processing, Cryptography in IoT Security.- Cyber Threat Phylogeny Assessment and vulnerabilities representation at thermal power station.- A novel data encryption technique based on DNA sequence.- Continuous Behavioral Authentication System for IoT Enabled Applications.- A secure 'e-Tendering' application based on secret image sharing.- Video based Graphical password authentication system.- Designing Robust Blind Color Image Watermarking-Based Authentication Scheme for Copyright Protection.- LSB Steganography using Three level Arnold Scrambling and Pseudo-Random Generator.- Part I: Network, Network Security and their Applications.- Performance Analysis of Retrial Queueing System in Wireless Local Area Network.- IBDNA –An Improved BDNA Algorithm Incorporating Huffman Coding Technique.- Obfuscation Techniques for a Secure Endorsement System in Hyperledger Fabric.- Mobile Operating System (Android) Vulnerability Analysis using Machine Learning.- Survey of Predictive Autoscaling and Security of Cloud Resources using Artificial Neural Networks.- Systematic literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkwe.- A Survey on Interoperability Issues at the SaaS Level Influencing the Adoption of Cloud Computing Technology.- Human Recognition based Decision Virtualization for Effecting Safety-as-a-Service using IoT Enabled Automated UV-C Sanitization System.- Part II: Blockchain Technology and its Applications.- Security Optimization of Resource-Constrained Internet of Healthcare Things (IoHT) Devices Using Asymmetric Cryptography for Blockchain Network.- Preserving Privacy using Blockchain Technology in Autonomous Vehicles.- Security Protocols for Blockchain Based Access Control in VANETS.- LIVECHAIN: Lightweight Blockchain for IOT Devices and it's Security.- Secure and scalable Attribute Based Access Control scheme for healthcare data on Blockchain platform.- Adaptive Neuro Fuzzy Inference System for Monitoring Activities in Electric Vehicles through a Hybrid Approach and Blockchain Technology.- Application of BLOCKCHAIN in Agriculture: An Instance of Secure Financial Service in Farming.- Adaptive Electronic Health Records Management And Secure Distribution Using Blockchain.- Non-Content Message Masking Model for Healthcare Data in Edge-IoT Ecosystem using Blockchain.- Voting based Consensus protocol for blockchain to maintain COVID patient records in Consortium Networks.- Blockchain Adaptation in Healthcare: SWOT Analysis.- Blockchain-IoT based Blood Supply Chain Management System.- Blockchain based COVID-19 Detection Framework Using Federated Deep Learning.- Systematic Review of Attribute-Based Access Control for a Smart City using Blockchain.- A methodical study on Blockchain technology.

    3 in stock

    £179.99

  • Modern Cryptography Volume 2: A Classical

    Springer Verlag, Singapore Modern Cryptography Volume 2: A Classical

    1 in stock

    Book SynopsisThis open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography.This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.Table of ContentsChapter 1. Gauss lattice theory.- Chapter 2. Reduction principle of Ajtai.- Chapter 3. Learning with errors.- Chapter 4. LWE cryptosystem.- Chapter 5. Cyclic lattice and Ideal lattice.- Chapter 6. Fully Homomorphic Encryption.- Chapter 7. General NTRU cryptosystem.

    1 in stock

    £40.49

  • Modern Cryptography Volume 2: A Classical

    Springer Verlag, Singapore Modern Cryptography Volume 2: A Classical

    3 in stock

    Book SynopsisThis open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography.This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.Table of ContentsChapter 1. Gauss lattice theory.- Chapter 2. Reduction principle of Ajtai.- Chapter 3. Learning with errors.- Chapter 4. LWE cryptosystem.- Chapter 5. Cyclic lattice and Ideal lattice.- Chapter 6. Fully Homomorphic Encryption.- Chapter 7. General NTRU cryptosystem.

    3 in stock

    £31.49

  • Triangle Mesh Watermarking and Steganography

    Springer Verlag, Singapore Triangle Mesh Watermarking and Steganography

    Out of stock

    Book SynopsisThis book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication. Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding.Table of Contents1. Introduction.- 2. Watermarking, steganography and steganalysis.- 3. 3D mesh watermakring techniques.- 4. 3D mesh steganography and steganalysis techniques.- 5. Conclusion and Future Work.

    Out of stock

    £125.99

  • Blockchain Technology and Application: 5th CCF China Blockchain Conference, CBCC 2022, Wuxi, China, December 23–25, 2022, Proceedings

    Springer Verlag, Singapore Blockchain Technology and Application: 5th CCF China Blockchain Conference, CBCC 2022, Wuxi, China, December 23–25, 2022, Proceedings

    Out of stock

    Book SynopsisThis book constitutes the refereed proceedings of the 5th CCF China Blockchain Conference, CBCC 2022, held in Wuxi, China, in December 2022. The 7 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers deal with research results and development activities in all aspects of blockchain science and technology. Table of ContentsA Proxy Re-encryption Scheme of Medical Data Sharing Based on ConsortiumBlockchain.- A Leadership Transfer Algorithm for Raft.- Blockchain Multi-Signature Wallet System Based on QR Code Communication.- EthMB+: A Tamper-proof Data Query Model based on B+ Tree and Merkle Tree.- Overview of Zero-knowledge Proof and Its Applications in Blockchain.- PCT: a Relay-based Privacy-preserving Cross-chain Transaction Scheme.- An Illegal Data Supervision Scheme for the Consortium Blockchain.

    Out of stock

    £49.49

  • Selected Topics In Information And Coding Theory

    World Scientific Publishing Co Pte Ltd Selected Topics In Information And Coding Theory

    Out of stock

    Book SynopsisThe last few years have witnessed rapid advancements in information and coding theory research and applications. This book provides a comprehensive guide to selected topics, both ongoing and emerging, in information and coding theory. Consisting of contributions from well-known and high-profile researchers in their respective specialties, topics that are covered include source coding; channel capacity; linear complexity; code construction, existence and analysis; bounds on codes and designs; space-time coding; LDPC codes; and codes and cryptography.All of the chapters are integrated in a manner that renders the book as a supplementary reference volume or textbook for use in both undergraduate and graduate courses on information and coding theory. As such, it will be a valuable text for students at both undergraduate and graduate levels as well as instructors, researchers, engineers, and practitioners in these fields.Supporting Powerpoint Slides are available upon request for all instructors who adopt this book as a course text.Table of ContentsLinear Complexity and Related Complexity Measures; Asymptotic Theory of Algebraic Geometry Codes; Some Algebraic and Combinatorial Methods of Code Constructions; Variable Length Codes and Finite Automata; Applications of Universal Source Coding to Statistical Analysis of Time Series; Decoding and Finding the Minimum Distance with Grobner Bases: History and New Insights; Coding Theory and Algebraic Combinatorics; Cooperative Diversity Systems for Wireless Communication; Introduction to Network Coding for Acyclic and Cyclic Networks; Distributed Space-Time Codes with Low ML Decoding Complexity; Construction of High Coding Gain Lattices with Low Decoding Complexity; Distributed Joint Source-Channel Coding on a Multiple Access Channel; Algebraic Coding from Matrix and Group Rings: Block Codes; LDPC and Convolutional Codes from Matrix and Group Rings; Public Key Cryptography and Coding Theory; Low-Density Parity-Check Codes.

    Out of stock

    £207.00

  • Design and Cryptanalysis of ZUC: A Stream Cipher

    Springer Verlag, Singapore Design and Cryptanalysis of ZUC: A Stream Cipher

    1 in stock

    Book SynopsisThis book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how stream ciphers are deployed in the mobile telephony architecture, one of the most well-known topics for more than five decades in the domain of computer and communication sciences, is presented in this book. The book provides an in-depth study on design and cryptanalysis of ZUC as well as relevant research results in this field with directions towards future analysis of this cipher.Table of Contents1. Introduction and Preliminaries.- 2. Introduction and Preliminaries.- 3. Introduction and Preliminaries.- 4. Introduction and Preliminaries.- 5. Introduction and Preliminaries.- 6. Test Vectors for ZUC.

    1 in stock

    £40.49

  • Algebraic Geometry Modeling In Information Theory

    World Scientific Publishing Co Pte Ltd Algebraic Geometry Modeling In Information Theory

    Out of stock

    Book SynopsisAlgebraic & geometry methods have constituted a basic background and tool for people working on classic block coding theory and cryptography. Nowadays, new paradigms on coding theory and cryptography have arisen such as: Network coding, S-Boxes, APN Functions, Steganography and decoding by linear programming. Again understanding the underlying procedure and symmetry of these topics needs a whole bunch of non trivial knowledge of algebra and geometry that will be used to both, evaluate those methods and search for new codes and cryptographic applications. This book shows those methods in a self-contained form.Table of ContentsSage: A Basic Overview for Coding Theory and Cryptography (D Joyner); Aspects of Random Network Coding (O Geil and C Thomsen); Steganography from a Coding Theory Point of View (C Munuera); An Introduction to LDPC Codes (I Marquez-Corbella & E Martinez-Moro); Numerical Semigroups and Codes (M Bras-Amoros); Codes, Arrangements and Matroids (R Jurrius & R Pellikaan).

    Out of stock

    £94.50

  • Advances in Cryptology  ASIACRYPT 2024

    Springer Advances in Cryptology ASIACRYPT 2024

    1 in stock

    Book Synopsis

    1 in stock

    £58.49

  • Point Cloud Compression

    Springer Point Cloud Compression

    1 in stock

    Book Synopsis.- Chapter1. Introduction..- Chapter 2. Background Knowledge..- Chapter 3. Predictive Coding..- Chapter 4. Transform Coding..- Chapter 5. Quantization Techniques..- Chapter 6. Entropy Coding..- Chapter 7. MPEG Geometry-based Point Cloud Compression (G-PCC) Standard..- Chapter 8. AVS Point Cloud Compression Standard..- Chapter 9. MPEG Video-based Point Cloud Compression (V-PCC) Standard..- Chapter 10. MPEG AI-based 3D Graphics Coding Standard..- Chapter 11. Future Work..- Index.

    1 in stock

    £95.99

  • Cryptology and Network Security: 22nd

    Springer Verlag, Singapore Cryptology and Network Security: 22nd

    3 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.Table of ContentsSchemes I.- Forward Security under Leakage Resilience, Revisited.- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE.- Signatures with Delegation.- Basic Primitives.- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium.- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks.- Hardness of Learning AES with Gradient-based Methods.- Security.- Privacy-Preserving Digital Vaccine Passport .- Exploiting Android Browser.- Are Current CCPA Compliant Banners Conveying User’s Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners.- MPC with Cards.- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols.- Free-XOR in Card-based Garbled Circuits.- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal.- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives.- Key Filtering in Cube Attacks from the Implementation Aspect.- New Techniques for Modeling SBoxes: An MILP Approach.- Blockchain.- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness.- Improving Privacy of Anonymous Proof-of-Stake Protocols.- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys.- CTA: Confidetial Transactions Protocol with State Accumulator.- MPC and Secret Sharing.- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets.- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.- Schemes II.- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding.- A Practical Forward-Secure DualRing.- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption.- A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators.

    3 in stock

    £66.49

  • Metaverse

    Niklaus Gottfried Metaverse

    Out of stock

    Book Synopsis

    Out of stock

    £17.20

  • Taming Your Dragon

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Taming Your Dragon

    1 in stock

    Book SynopsisTechnical debt is an often-overlooked problem that the software industry needs to take more seriously. All organizations are impacted by it, most wish that they had less of it, but need help in understanding the nature of the beast. This book aims to clear up any misconceptions and show you how to implement a sound technical debt management program to suit your company's needs. You'll learn the greatest challenge in solving the technical debt dilemma is not to find solutions to it, but rather to find solutions to the human and organizational issues that lead to that debt. For example, convincing senior stakeholders of the importance of addressing technical debt, getting stakeholders to acknowledge how their actions lead to unintentional debt, and enabling teams to prioritize technical debt over short-term goals. Therefore, this book is divided into three parts: defining technical debt, understanding technical debt, and tackling technical debt. It begins by explaining why technical debt should not be considered a technical problem, but rather a problem of how trade-off decisions are made. You'll then examine how making decisions using the affect heuristic, more commonly known as a gut feeling, can lead to unnecessary technical debt, followed by some techniques for combating your vulnerability to this trap. Reducing your organization's level of technical debt is not easy. Taming Your Dragon will show you how to implement a technical debt management program. What You Will LearnReview a new paradigm based on technical debt being a combination of trade-off problems and system problemsUnderstand the many ways that technical debt adversely affects an organization's ability to deliver IT changeCreate an effective process for addressing technical debtSee why analogies are importantWho This Book Is ForSoftware teams supporting DevOps, managers, and other business stakeholders looking to implement a technical debt management program.

    1 in stock

    £49.49

  • Cryptography and Cryptanalysis in Java

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Cryptography and Cryptanalysis in Java

    10 in stock

    Book SynopsisHere is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 21 and Jakarta EE 11. It provides a robust introduction to Java 21's new features and updates, a roadmap for Jakarta EE 11 security mechanisms, a unique presentation of the hot points (advantages and disadvantages) from the Java Cryptography Architecture (JCA), a new chapter on Quantum cryptography, and more.The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter.New to This Edition:The modernized Second Edition is updated to reflect the latest language features in Java 21 and Jakarta 11, along with the introduction of a new chapter on Quantum Cryptography (Chapter 6).What You Will LearnDevelop programming skills for writing cryptography algorithms in JavaDive into security schemes and modules using JavaExplore good vs bad cryptography based on processing execution times and reliabilityPlay with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and moreWho This Book Is ForThose who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.

    10 in stock

    £41.24

  • Applied Cryptography for Researchers and

    Nova Science Publishers Inc Applied Cryptography for Researchers and

    Out of stock

    Book Synopsis

    Out of stock

    £58.39

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account