Data encryption Books

153 products


  • Rethinking the Regulation of Cryptoassets:

    Edward Elgar Publishing Ltd Rethinking the Regulation of Cryptoassets:

    15 in stock

    Book SynopsisThis thought-provoking book challenges the way we think about the regulation of cryptoassets based on cryptographic consensus technology. Bringing a timely new perspective, Syren Johnstone critiques the application of a financial regulation narrative to cryptoassets, questions the assumptions on which it is based, and considers its impact on industry development.Providing new insights into the dynamics of oversight regulation, Johnstone argues that the financial narrative stifles the 'New Prospect' for the formation of novel commercial relationships and institutional arrangements. The book asks whether regulations developed in the 20th century remain appropriate to apply to a technology emerging in the 21st, suggesting it is time to think about how to regulate for ecosystem development. Johnstone concludes with proposals for reform, positing a new framework that facilitates industry aspirations while remaining sustainable and compatible with regulatory objectives.Rethinking the Regulation of Cryptoassets will be an invaluable read for policy makers, regulators and technologists looking for a deeper understanding of the issues surrounding cryptoasset regulation and possible alternative approaches. It will also be of interest to scholars and students researching the intersection of law, technology, regulation and finance.Trade Review‘Prof. Johnstone’s book on the regulation of cryptoassets forces us to think twice about the way we try to regulate the digital economy. He challenges the habit of the regulators to push new disruptive ideas and instruments into old frames and concepts, and invites them to move out of their comfort zone. Rethinking the Regulation of Cryptoassets is a complete account of the challenges we face in developing a crypto-economy and proposes a coherent and sustainable regulatory framework that ensures both market efficiency and technological relevance.’ -- Eva Kaili, Chair of the STOA Committee, Rapporteur of the Blockchain Resolution of the European Parliament, Brussels‘Cryptographic consensus technology presents extraordinary market opportunities but also raises a host of vexing regulatory challenges. Rethinking the Regulation of Cryptoassets maps this complex terrain and charts a way forward, offering a novel approach to the regulatory enterprise to protect against abuses while fostering innovation. Johnstone brings considerable legal, financial, and technological sophistication to the task, and his analysis is at once rigorous and accessible. This book will become essential reading on the future of cryptoassets.’ -- Christopher Bruner, University of Georgia School of Law, US‘The crypto industry moves fast and requires regulatory frameworks that can cater to that pace. Prof. Johnstone brings forward a number of ideas that are worth reflecting on as crypto assets are definitely here to stay.’ -- Henri Arslanian, Global Crypto Leader and Partner, PwC‘Johnstone provides a refreshing way to think about the regulatory limits of applying the standard financial narrative to a technology that is globally programmable but locally valuable. His DBA (Determined-By-Architecture) framework may help align regulation with the borderless possibilities of mathematics.’ -- Pindar Wong, Chairman, VeriFi (Hong Kong) LtdTable of ContentsContents: About the author Foreword Preface Why cryptoasset regulation needs rethinking: an introduction PART I THE INITIAL JOURNEY Acquiring the tradition 2 Cypher fundamentals 3 Responses from the centre PART II THE PRIMARY ISSUES 4 Applying securities laws to cryptoassets 5 Regulatory building blocks and other concerns 6 Complexities in a developing technology PART III THE SECONDARY MARKET 7 An emerging market 8 Cryptoexchange models 9 The concept of an exchange 10 Regulatory concerns PART IV INFLUENCES AND CONSIDERATIONS 11 The ordering of progress 12 Ecosystem development 13 Incrementalism and paradigms PART V FUTURE DIRECTIONS 14 Responding to change 15 Proposals for policy development 16 The origin of cryptocommunity Suggested readings Postscript Index

    15 in stock

    £109.00

  • The Political Economy and Feasibility of Bitcoin

    Edward Elgar Publishing Ltd The Political Economy and Feasibility of Bitcoin

    15 in stock

    Book SynopsisIn The Political Economy and Feasibility of Bitcoin and Cryptocurrencies Spencer J. Pack brings his authority as a scholar and advisor to this study of bitcoin and cryptocurrencies from the perspective of the history of economic thought. Major theorists analyzed in depth include Aristotle, Smith, Law, Marx, Keynes, Rothbard and Hayek, and the book draws extensively upon the ideas of Schumpeter, Galbraith and Sraffa.The book argues for reconceptualization of the basic microeconomic categories into rental, sale and financial asset prices along with a reconsideration of Keynes’ general theory to his special theory and Rothbard’s relationship to Rousseau. The author posits that intense theoretical and practical struggles will continue over who should control the quantity of money, the cause of the capitalist economy’s instability, and who or what is more dangerous: concentrated centers of private wealth and private enterprises or the contemporary state. He concludes that in terms of the quality of money, the cryptocurrency community is probably correct, with new forms of money potentially being better than sovereign fiat currency.The book’s relevance will appeal to members of the history of economic thought community, economic theorists, and political science and political theory scholars as well as to policy makers and members of the cryptocurrency community.Trade Review‘At a time when the history of economic thought is unfortunately neglected, it is refreshing to see this book in which Spencer Pack deals brilliantly with a critical contemporaneous and practical issue from the perspective of the history of economic thought. The analysis fills a big gap in the literature on bitcoin and cryptocurrencies.’ -- Imad Moosa, RMIT, AustraliaTable of ContentsContents: Preface PART I ESSENTIAL FOUNDATIONS: BEFORE THE FRENCH REVOLUTION 1. Introduction to The Political Economy and Feasibility of Bitcoin and Cryptocurrencies 2. Aristotle’s (384–322 BCE) seminal contributions to the economics tradition 3. Adam Smith (1723–1790) on money 4. John Law (1671–1729): the financial engineer as social engineer PART II SOME ESSENTIAL DEBATES AND DEVELOPMENTS IN THE MODERN ERA 5. Marx’s (1818–1883) monetary theory: mainstream conservative theory; yet radical, revolutionary challenge 6. Keynes (1883–1946): monetary theorist as capitalism’s saviour – the key issues PART III BLOWBACK 7. The surprising rise of libertarianism and the libertarian response: starring Murray Rothbard (1926–1995) – What Has Government Done to Our Money? 8. On the road again: Friedrich A. Hayek’s (1899–1992) Denationalisation of Money PART IV CURRENT ISSUES ON THE POLITICAL ECONOMY OF BITCOINS AND CRYPTOCURRENCIES 9. Issues raised by bitcoins and cryptocurrencies for monetary theory 10. Issues raised by monetary theory concerning bitcoins and cryptocurrencie References Index

    15 in stock

    £94.00

  • Improving your C# Skills: Solve modern challenges

    Packt Publishing Limited Improving your C# Skills: Solve modern challenges

    2 in stock

    Book SynopsisConquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming.Key Features Understand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPI Develop a containerized application based on microservices architecture Gain insights into memory management techniques in .NET Core Book DescriptionThis Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You’ll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products: C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt The Modern C# Challenge by Rod Stephens What you will learn Measure application performance using BenchmarkDotNet Leverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operations Modify a legacy application to make it testable Use LINQ and PLINQ to search directories for files matching patterns Find areas of polygons using geometric operations Randomize arrays and lists with extension methods Use cryptographic techniques to encrypt and decrypt strings and files Who this book is forIf you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.Table of ContentsTable of Contents What's New in .NET Core 2 and C# 7? Understanding .NET Core Internals and Measuring Performance Multithreading and Asynchronous Programming in .NET Core Securing and Implementing Resilience in .NET Core Applications Why TDD is Important Setting Up the .NET Test Environment Setting Up a JavaScript Environment What to Know Before Getting Started Tabula Rasa Testing JavaScript Applications Exploring Integrations Changes in Requirements The Legacy Problem Unraveling a Mess Geometry Randomization Files and Directories Advanced C# and .NET Features Cryptography

    2 in stock

    £37.99

  • Transforming Information Security: Optimizing

    Emerald Publishing Limited Transforming Information Security: Optimizing

    15 in stock

    Book SynopsisThe information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable. In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.Table of ContentsChapter 1. Interconnected TrendsChapter 2. Board Level Program Evaluation and Guidance Chapter 3. Architect a Secure Network with Less Chapter 4. Encryption Chapter 5. Transport Evolution: The Encrypted Stack Chapter 6. Authentication and Authorization Chapter 7. The End Point Chapter 8. Incident Prevention, Detection, and Response Chapter 9. Looking Forward

    15 in stock

    £43.69

  • CSS in easy steps

    In Easy Steps Limited CSS in easy steps

    1 in stock

    Book SynopsisCSS in easy steps, 4th edition begins by explaining how Cascading Style Sheets (CSS) can determine the presentation of elements within HTML documents. Examples show how style sheet rules can control content position and appearance, and provide dynamic effects with animation, transformations, and transitions. You will also learn how to design responsive web pages that look great viewed on any device. Each chapter builds your knowledge of style sheets. By the end of this book you will have gained a sound understanding of CSS and be able to create your own exciting interactive web pages.CSS in easy steps, 4th edition contains examples that provide clear syntax-highlighted code showing how to selectively style elements of an HTML document and how to endow elements with interactive functionality, to illustrate each aspect of CSS. CSS in easy steps, 4th edition has an easy-to-follow style that will appeal to anyone who wants to begin creating stylish web pages. It will appeal to programmers who want to quickly learn the latest style sheet techniques, and to the student who is studying website design at school or college, and to those seeking a career in web development who need a thorough understanding of CSS.

    1 in stock

    £11.39

  • Networks, Security and Complexity: The Role of

    Edward Elgar Publishing Ltd Networks, Security and Complexity: The Role of

    15 in stock

    Book SynopsisThe end of the 20th century witnessed an information revolution that introduced a host of new economic efficiencies. This economic change was underpinned by rapidly growing networks of infrastructure that have become increasingly complex. In this new era of global security we are now forced to ask whether our private efficiencies have led to public vulnerabilities, and if so, how do we make ourselves secure without hampering the economy. In order to answer these questions, Sean Gorman provides a framework for how vulnerabilities are identified and cost-effectively mitigated, as well as how resiliency and continuity of infrastructures can be increased. Networks, Security and Complexity goes on to address specific concerns such as determining criticality and interdependency, the most effective means of allocating scarce resources for defense, and whether diversity is a viable strategy. The author provides the economic, policy, and physics background to the issues of infrastructure security, along with tools for taking first steps in tackling these security dilemmas. He includes case studies of infrastructure failures and vulnerabilities, an analysis of threats to US infrastructure, and a review of the economics and geography of agglomeration and efficiency. This critical and controversial book will garner much attention and spark an important dialogue. Policymakers, security professionals, infrastructure operators, academics, and readers following homeland security issues will find this volume of great interest.Trade Review'The world is growing more interconnected every day, spun with fiber optic cable, electric power lines, transportation and water networks. Gorman provides a detailed analysis of the pattern of telecommunications networks and their interrelationships with other infrastructure. The work is truly interdisciplinary in scope, and provides planners, policy makers, security analysts, and infrastructure managers and educators in all of these fields with an invaluable resource in terms of a rich database, a methodology, and process for assembling, analyzing and portraying information on key infrastructure assets. This work emphasizes space and place in understanding interconnectivity of physical infrastructure, integrating policy and geography as well as providing an important complement to engineering approaches to interconnected infrastructure. He presents the readers with a broad set of questions and how they can be addressed about threats, risk and vulnerability and policy options for their reduction. This is a rare book of its kind, and joins a growing literature on how complexity is a key factor in understanding and setting policies for the services upon which our society depends.' -- Rae Zimmerman, New York University, US'The concepts of Critical Infrastructure Protection are radically redefining the relationship between the public and private sectors in terms of both our national and economic security. Networks, Security and Complexity is a worthy contribution in defining and advancing many of these concepts. The author is among the vanguard of rising young scholars who will assist this nation in thinking through the significant security challenges faced in the age of information and asymmetric threat.' -- John A. McCarthy, George Mason University School of Law, US'This volume on complex networks opens surprising perspectives for the interested reader, either a scientist or a policymaker. It describes and analyzes in a convincing way the significance of critical infrastructures, be it internet or transport connections. Due insight into the existence and emergence of such infrastructures is a prerequisite for an effective security policy. This study presents a model-based, operational framework for identifying critical domains in dynamic networks. The various concepts are illustrated by means of empirical case examples.' -- Peter Nijkamp, VU University Amsterdam, The NetherlandsTable of ContentsContents: 1. Setting the Stage 2. Private Efficiencies and Public Vulnerabilities 3. Is There a Threat? 4. Literature Review of Conceptual Framework 5. The Vulnerability of Networks and the Resurrection of Distance 6. Packets and Power: The Interdependency of Infrastructure 7. Allocating Scarce Resources for Network Protection 8. Diversity as Defense 9. Conclusion References Appendix Index

    15 in stock

    £90.00

  • Criptomoneda: La guía definitiva para el comercio

    1 in stock

    £17.06

  • The Genesis of Digital Gold: A Comprehensive Look

    1 in stock

    £10.44

  • Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I

    Springer Nature Switzerland AG Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I

    1 in stock

    Book SynopsisThe two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.​Table of ContentsCryptographic Protocols.- Digital Signatures.- Zero-Knowledge.- Identity-Based Encryption.- Fundamental Primitives.- Public Key Encryptions.- Functional Encryption.-Obfuscation Based Cryptography.- Re- Encryption Schemes.- Post Quantum Cryptography.

    1 in stock

    £62.99

  • Sequential and Parallel Algorithms and Data

    Springer Nature Switzerland AG Sequential and Parallel Algorithms and Data

    15 in stock

    Book SynopsisThis textbook is a concise introduction to the basic toolbox of structures that allow efficient organization and retrieval of data, key algorithms for problems on graphs, and generic techniques for modeling, understanding, and solving algorithmic problems. The authors aim for a balance between simplicity and efficiency, between theory and practice, and between classical results and the forefront of research. Individual chapters cover arrays and linked lists, hash tables and associative arrays, sorting and selection, priority queues, sorted sequences, graph representation, graph traversal, shortest paths, minimum spanning trees, optimization, collective communication and computation, and load balancing. The authors also discuss important issues such as algorithm engineering, memory hierarchies, algorithm libraries, and certifying algorithms. Moving beyond the sequential algorithms and data structures of the earlier related title, this book takes into account the paradigm shift towards the parallel processing required to solve modern performance-critical applications and how this impacts on the teaching of algorithms. The book is suitable for undergraduate and graduate students and professionals familiar with programming and basic mathematical language. Most chapters have the same basic structure: the authors discuss a problem as it occurs in a real-life situation, they illustrate the most important applications, and then they introduce simple solutions as informally as possible and as formally as necessary so the reader really understands the issues at hand. As they move to more advanced and optional issues, their approach gradually leads to a more mathematical treatment, including theorems and proofs. The book includes many examples, pictures, informal explanations, and exercises, and the implementation notes introduce clean, efficient implementations in languages such as C++ and Java.Trade Review“The style of the book is accessible and is suitable for a wide range of audiences, from mathematicians and computer scientists to researchers from other fields who would like to use parallelised approaches in their research.” (Irina Ioana Mohorianu, zbMATH 1445.68003, 2020)Table of ContentsAppetizer: Integer Arithmetic.- Introduction.- Representing Sequences by Arrays and Linked Lists.- Hash Tables and Associative Arrays.- Sorting and Selection.- Priority Queues.- Sorted Sequences.- Graph Representation.- Graph Traversal.- Shortest Paths.- Minimum Spanning Trees.- Generic Approaches to Optimization.- Collective Communication and Computation.- Load Balancing.- App. A, Mathematical Background.- App. B, Computer Architecture Aspects.- App. C, Support for Parallelism in C++.- App. D, The Message Passing Interface (MPI).- App. E, List of Commercial Products, Trademarks and Licenses.

    15 in stock

    £39.99

  • Quantum Key Distribution: An Introduction with

    Springer Nature Switzerland AG Quantum Key Distribution: An Introduction with

    1 in stock

    Book SynopsisThis textbook introduces the non-specialist reader to the concepts of quantum key distribution and presents an overview of state-of-the-art quantum communication protocols and applications. The field of quantum cryptography has advanced rapidly in the previous years, not least because with the age of quantum computing drawing closer, traditional encryption methods are at risk.The textbook presents the necessary mathematical tools without assuming much background, making it accessible to readers without experience in quantum information theory. In particular, the topic of classical and quantum entropies is presented in great detail. Furthermore, the author discusses the different types of quantum key distribution protocols and explains several tools for proving the security of these protocols. In addition, a number of applications of quantum key distribution are discussed, demonstrating its value to state-of-the-art cryptography and communication. This book leads the reader through the mathematical background with a variety of worked-out examples and exercises. It is primarily targeted at graduate students and advanced undergraduates in theoretical physics. The presented material is largely self-contained and only basic knowledge in quantum mechanics and linear algebra is required.Table of Contents

    1 in stock

    £31.34

  • Blockchain, Artificial Intelligence, and the

    Springer Nature Switzerland AG Blockchain, Artificial Intelligence, and the

    1 in stock

    Book SynopsisThis book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries. Table of Contents1) A comprehensive Survey on Blockchain and Cryptocurrency Technologies: Approaches, Challenges and Opportunities2) Intelligent Traffic Management with Prioritized Scheduling System3) Data Mining based Metrics for the Systematic Evaluation of Software Project Management Methodologies4) Blockchain Technology Applications for Next Generation5) An Automated System to Ensure High-Availability Deployment of IoT Devices6) Blockchain based IoT Architecture for Software Defined Networking7) Blockchain Technology use cases in Health Care Management: State of Art Framework and Performance Evaluation8) Secure Vehicular Communication using Blockchain Technology9) BLOCK CHAINS TECHNOLOGY IN HEALTH CARE10) Blockchain utilization in Crowdsensing, Cyber Physical Systems, Cloud Computing, Edge Computing & Social Network11) Blockchain for the Industrial IoT Applications12) Blockchain-Based IOT Architecture

    1 in stock

    £37.49

  • Blockchain Technology for Managers

    Springer Nature Switzerland AG Blockchain Technology for Managers

    3 in stock

    Book SynopsisBlockchain is a technology that tends to be misunderstood by managers that need to make technology acquisition decisions. This book will provide readers with a basic understanding of blockchain and distributed ledger technology (DLT), the technologies that underpin it, and the technologies DLT is built upon. The book is purposefully not a book on how to code or explore other technical aspects of blockchain (other than the fundamentals). Rather, it provides managers with the basic understanding of the architectures and consensus algorithms, how they work, the design trade-offs of each architecture type, and what problems and use cases the core characteristics of DLT are best suited to solve ─ providing business managers with the core information they need to ask the right questions of vendors when making business value assessments and acquisition decisions. Table of ContentsDLT Types and Design Trade-offs.- Learning Objectives.- Proof-of-work.- Proof-of-stake.- Proof-of-storage.- Proof-of-authority.- Directed Acyclic Graph (DAG): AKA “The Tangle”.- Hash and Merkle Trees.- Byzantine Fault Tolerance.- Mining and Making Money.- Power Consumption.- Understanding the Fuss.- Bitcoin Demand History.- Stablecoins.- Use Cases and Applications.- Global Activity – Investment and Projects.- Which Use Cases Are Getting the Attention?.- Standards: IEEE 2418 and ISO/TC 307.- Securing IoT.- Questions for Managers to Ask.- Examples: Appliance Service Plan; Emobility; Utility Metering.

    3 in stock

    £49.49

  • Blockchain Technology for Managers

    Springer Nature Switzerland AG Blockchain Technology for Managers

    1 in stock

    Book SynopsisBlockchain is a technology that tends to be misunderstood by managers that need to make technology acquisition decisions. This book will provide readers with a basic understanding of blockchain and distributed ledger technology (DLT), the technologies that underpin it, and the technologies DLT is built upon. The book is purposefully not a book on how to code or explore other technical aspects of blockchain (other than the fundamentals). Rather, it provides managers with the basic understanding of the architectures and consensus algorithms, how they work, the design trade-offs of each architecture type, and what problems and use cases the core characteristics of DLT are best suited to solve ─ providing business managers with the core information they need to ask the right questions of vendors when making business value assessments and acquisition decisions. Table of ContentsDLT Types and Design Trade-offs.- Learning Objectives.- Proof-of-work.- Proof-of-stake.- Proof-of-storage.- Proof-of-authority.- Directed Acyclic Graph (DAG): AKA “The Tangle”.- Hash and Merkle Trees.- Byzantine Fault Tolerance.- Mining and Making Money.- Power Consumption.- Understanding the Fuss.- Bitcoin Demand History.- Stablecoins.- Use Cases and Applications.- Global Activity – Investment and Projects.- Which Use Cases Are Getting the Attention?.- Standards: IEEE 2418 and ISO/TC 307.- Securing IoT.- Questions for Managers to Ask.- Examples: Appliance Service Plan; Emobility; Utility Metering.

    1 in stock

    £35.99

  • Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings

    Springer Nature Switzerland AG Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings

    15 in stock

    Book SynopsisThis book constitutes the proceedings of the 7th International Conference on Cryptology and Information Security in Latin America, LATIN 2021, which was held in October 2021. The conference was originally planned to take place in Bogota, Colombia, but changed to a virtual event due to the COVID-19 pandemic. The 22 full papers included in this volume were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: quantum cryptography; post-quantum cryptography; asymmetric cryptanalysis; cryptanalysis and side-channel analysis; distributed cryptographic protocols; and multiparty computation.Table of ContentsQuantum Cryptography.- Tight Bounds for Simon's Algorithm.- Constructions for Quantum Indistinguishability Obfuscation.- On Forging SPHINCS+-Haraka Signatures on a Fault-tolerant Quantum Computer.- Post-Quantum Cryptography.- Post-Quantum Key-Blinding for Authentication in Anonymity Networks.- Implementing and measuring KEMTLS.- A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates.- Attribute-Based Access Control for Inner Product Functional Encryption from LWE.- Asymmetric Cryptanalysis.- Classical Attacks on a Variant of the RSA Cryptosystem.- Improved attacks against key reuse in learning with errors key exchange.- Cryptanalysis and Side-Channel Analysis.- Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis.- Train or Adapt a Deeply Learned Profile.- Autocorrelations of vectorial Boolean functions.- Automatic Search for Bit-based Division Property.- TEDT2 - Highly Secure Leakage-resilient TBC-based Authenticated Encryption.- Distributed Cryptographic Protocols.- Weight-Based Nakamoto-Style Blockchains.- LOVE a Pairing.- Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoToo.- Stronger Notions and a More E cient Construction of Threshold Ring Signatures.- Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms.- Multiparty Computation.- Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling.- The Cost of IEEE Arithmetic in Secure Computation.- Honest Majority MPC with Abort with Minimal Online Communication.

    15 in stock

    £66.49

  • Smart Card Research and Advanced Applications: 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11–12, 2021, Revised Selected Papers

    Springer Nature Switzerland AG Smart Card Research and Advanced Applications: 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11–12, 2021, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 20th International Conference on Smart Card Research and Advanced Applications, CARDIS 2021, which took place in November 2021. The conference took place in Lübeck, Germany, and changed to a hybrid format due to the COVID-19 pandemic.The 16 full papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named Side-Channel Attacks, Fault Attacks, Public Key and Secure Implementations. Table of ContentsSide-Channel Attacks.- Fault Attacks.- Public Key.- Secure Implementations.

    1 in stock

    £49.49

  • Advances in Cryptology – CRYPTO 2022: 42nd Annual

    Springer International Publishing AG Advances in Cryptology – CRYPTO 2022: 42nd Annual

    1 in stock

    Book SynopsisThe 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures. Table of ContentsCryptanalysis I.- Randomness.- Quantum Cryptography I.- Secure Multiparty Computation I.- Proof Systems.- Advanced Encryption Systems.- Secure Multiparty Computation II.- Secure Messaging.

    1 in stock

    £42.74

  • Electronic Voting: 7th International Joint

    Springer International Publishing AG Electronic Voting: 7th International Joint

    1 in stock

    Book SynopsisThis open access book LNCS 13353 constitutes the proceedings of the 7th International Conference on Electronic Voting, E-Vote-ID 2022, held in Bregenz, Austria, in October 2022. The 10 full papers presented were carefully reviewed and selected from 39 submissions. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others.Table of ContentsAn analysis of the security and privacy issues of the Neovote online voting system.- Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol.- Review Your Choices: When Confirmation Pages Break Ballot Secrecy in Online Elections.- Running the Race: a Swiss Voting Story.- The Effect of Exogenous Shocks on the Administration of Online Voting: Evidence from Ontario, Canada.- The Council of Europe's CM/Rec(2017)5 on e-voting and secret suffrage: time for yet another update?.- Sweeter than SUITE: Supermartingale Stratified Union-Intersection Tests of Elections.- They may look and look, yet not see: BMDs cannot be tested adequately.- Individual Verifiability with Return Codes: Manipulation Detection Efficacy.- and Accuracy Testing: A Fifty-State Review.

    1 in stock

    £31.49

  • Advances in Cryptology – CRYPTO 2022: 42nd Annual

    Springer International Publishing AG Advances in Cryptology – CRYPTO 2022: 42nd Annual

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the 4-volume proceedings LNCS 13507, 13508, 13509, 13510, was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures. Table of ContentsSecure Messaging.- Lattice-Based Zero Knowledge.- Quantum Cryptography II.- Lattice-Based Signatures.- Blockchain.- Best Paper Awards.- Coding Theory.- Public Key Cryptography.- Signatures.

    1 in stock

    £40.49

  • Blockchain for Secure Healthcare Using Internet

    Springer International Publishing AG Blockchain for Secure Healthcare Using Internet

    1 in stock

    Book SynopsisHealthcare has become an extremely important and relevant topic in day to day discussions ever since the COVID-19 pandemic has been encountered by the global population. This has led to a renewed focus and attention that researchers from every discipline have put in to realize better strategies for healthcare management in general. This book is an attempt to put to use recent advancements in the field of the Internet of Medical Things often called IoMT, which is an extension of IoT for real-time, data analytics-driven prompt and quality healthcare to global citizens. Security has been always a challenge with pervasive technologies like IoMT and IoT, and thus usage of disruptive technology like blockchain to offset the security concerns that surround the data and network management. Therefore, this book is an honest attempt to provide directions to applied areas of research in IoMT for healthcare with the aid and help of Blockchain Technologies.Table of Contents1. Chapter1.1. Introduction 1.2. Smart Healthcare and Telemedical System 1.2.1. Smart Healthcare Technology 1.2.2. Remote monitoring and automated healthcare system 1.2.3. Remote Care and Telehealth 1.2.4. Emergency response solution for connectivity 1.2.5. Smart Hospital Management 1.3. Telemedical Healthcare 1.3.1. Registration Phase 1.3.2. Login Phase and Mutual Authentication 1.3.3. Telemedicine Server 1.4. Intelligent Medical Care using IoT 1.5. Smart Healthcare: Challenges and Threats Conclusion References 2. Chapter 2.1. Introduction 2.2. IoT Related Sub-Components 2.2.1. Embedded programming 2.2.2. Hardware device 2.2.3. Security 2.2.4. Networking and cloud Integration 2.2.5. Data Analytics and prediction 2.2.6. Machine Learning and AI 2.3. Architecture of IoT 2.3.1. Sensors and Actuators 2.3.2. Internet gateway 2.3.3. Edge Computing IT System 2.3.4. Data Centre and Cloud 2.3.5. Application of IoT 2.3.6. Smart Homes 2.3.7. Smart Agriculture 2.3.8. Energy Management 2.3.9. Industrial Internet 2.4. IoT In Healthcare 2.4.1. Remote patient monitoring 2.4.2. Real time Data Tracking 2.4.3. Connected wearables 2.5. Internet of Medical Things (IoMT or IoMedT) 2.6. Challenges for IoMT Conclusion References 3. Chapter 3.1. Introduction 3.2. IoT Components 3.2.1. Devices/Sensors 3.2.2. Connectivity 3.2.3. Data Processing 3.2.4. User Interface 3.3. IoMedT Components 3.3.1. Patient and Payer 3.3.2. Connected Medical Devices 3.3.3. Communication Services (Connectivity) 3.3.4. Analytics Platform (Data Processing 3.3.5. Service Providers 3.4. Integration of Latest Technology with IoMedT 3.5. Benefits and Challenges of IoMedT 3.5.1. Benefits of IoMedT 3.5.2. Challenges in IoMedT Conclusion References 4. Chapter 4.1. Introduction to Smart healthcare and IoMT 4.2. Perception layer - Sensor systems for data collection 4.2.1. Gateway layer 4.2.2. Management service layer/application support layer- data storage 4.2.3. Application/service layer 4.3. IoMT: A boon in healthcare 4.4. Challenges of IoMT 4.5. Benefits of IoMT 4.6. Structural components of IoMT 4.7. Functional components of IoMT 4.8. Structural and Functional Challenges Conclusion References 5. Chapter 5.1. Introduction 5.2. Working of Blockchain 5.2.1. Distributed Database 5.2.2. A network of nodes 5.2.3. Building Trust 5.3. Benefits of Blockchain Technology 5.3.1. Time-saving 5.3.2. Cost-saving 5.3.3. Tighter security 5.4. Application of Blockchain 5.4.1. Asset Management 5.4.2. Cross-Border Payments 5.4.3. Healthcare 5.4.4. Cryptocurrency 5.4.5. Birth and Death Certificates 5.4.6. Online Identity Verification 5.4.7. Internet of Things 5.4.8. Copyright and Royalties 5.5. Application of Blockchain in Smart Healthcare 5.5.1. Research 5.5.2. Seamless switching of patients between providers 5.5.3. Faster, cheaper, better patient care 5.5.4. Interoperable electronic health records 5.5.5. Data security 5.5.6. Mobile health apps and remote monitoring 5.5.7. Tracing and securing medical supplies 5.5.8. Health insurance claims 5.5.9. Tracking diseases and outbreaks 5.5.10. Safeguarding genomics Conclusion References 6. Chapter 6.1. Introduction 6.2. Possible Security Attacks in DMR Internet of Things Networks 6.3. Security Schemes and There Challenges in DMR Conclusion References 7. Chapter 7.1. Introduction 7.2. Benefits of IoMT in Smart Healthcare 7.2.1. Cost Reduction 7.2.2. Improve Treatment 7.2.3. Faster Disease Diagnosis 7.2.4. Drug and Equipment Management 7.2.5. Error Reduction 7.3. Tools and Technique for IoMT in Smart Healthcare 7.3.1. Electronic Health Record (EHR) 7.3.2. Referral Trackers 7.3.3. Patient Portals 7.3.4. Remote Patient Monitoring 7.3.5. Computerized Provider Order Entry 7.4. Use case of IoMT in Healthcare Industry 7.4.1. Internet of things for patients 7.4.2. Internet of things for Hospitals 7.4.3. Internet of things for Physicians 7.4.4. Internet of things for Business 7.4.5. Internet of things for Health Insurance Companies 7.5. Privacy and Security Issue in IoMT 7.5.1. Patients are not in charge of their own information 7.5.2. Present to Your Own Device (BYOD) 7.5.3. Telecommuting presents security chances 7.6. Challenges of IoMT in Smart Healthcare 7.6.1. Underdeveloped Initiatives 7.6.2. Unavailability of Memory 7.6.3. Keeping Updated 7.6.4. Data Security 7.6.5. Global healthcare regulations 7.6.6. Scalable Platforms 7.6.7. Data Overloading 7.7. Impact of IoMT on the future of the healthcare industry Conclusion References 8. Chapter 8.1. Introduction 8.1.1. Big Data relation with Cloud Computing 8.1.2. Relationship between IoMT and Big Data 8.1.3. Big Data and the Internet of Medical Things 8.1.4. IoT and Cloud Computing 8.1.5. Benefits of using big data, IoT and the cloud 8.2. IoMT needs to be integrated with cloud computing 8.3. Integration of IoT and Cloud Computing 8.4. Benefits of integrating IoT and cloud computing Conclusion References 9. Chapter 9.1. Introduction 9.1.1. IoT in Smart Healthcare Systems 9.2. Background/Present state in Data security 9.2.1. Data Security requirements in Smart Healthcare Systems 9.3. Privacy and QoS in smart healthcare 9.4. Data Security and Privacy Issues in Healthcare 9.5. QoS Parameters for Smart Healthcare 9.6. Suggested Security Techniques to Preserve QoS Conclusion References 10. Chapter 10.1. Introduction 10.2. Authentication Schemes for Tele Medical Healthcare System 10.3. Processes of an authentication protocol Conclusion References 11. Chapter 11.1. Introduction 11.1.1. Security 11.1.2. Features 11.2. Types of Blockchain Networks 11.2.1. Public blockchain network 11.2.2. Private blockchain network 11.2.3. Permissioned blockchain network 11.2.4. Consortium Blockchain networks 11.3. Applications of Blockchain 11.3.1. Smart contracts 11.3.2. Involving Blockchain into Internet of Things (IOT) 11.3.3. Preventing Identity Theft 11.4. Application of Blockchain in Smart Healthcare 11.4.1. Keeping transparency in delivering healthcare goods 11.4.2. Storing of medical data of patients 11.4.3. Remote health monitoring using IOT and blockchain 11.5. Electronic Health Record (EHR) and its Storage 11.5.1. Medical Big Data Mining and Processing in e-Healthcar 11.5.2. Smart healthcare systems using big data 11.6. Significance of Blockchain in Security of Electronic Health Record (EHR) Conclusion References 12. Chapter 12.1. Introduction 12.1.1. A Different Healthcare World 12.2. Components of Telemedicine 12.2.1. Teleconsultation 12.2.2. Telementoring 12.2.3. Telemonitoring 12.3. Emerging technologies in telemedicine 12.3.1. Technologies proceeding telemedicine 12.3.2. mRNA Technology 12.3.3. Neurotechnology 12.3.4. Precision Medicine 12.3.5. Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR) 12.3.6. Health Wearables 12.3.7. Technology in Mental Health 12.3.8. Artificial Intelligence 12.3.9. Augmented and virtual reality 12.3.10. Tele-robots 12.3.11. IoT and nanotechnology 12.3.12. 3D Printing 12.3.13. Enhanced Access to Medical Data and Information 12.3.14. Big Data 12.3.15. Improved Lines of Communication 12.3.16. Electronic Health Records 12.3.17. Metaverse Conclusion References 13. Chapter 13.1. Introduction 13.1.1. AI and Machine Learning 13.1.2. Cloud Computing 13.1.3. Cyber security/Cloud Security 13.2. Role of Artificial Intelligence, Cloud Computing, and Internet Security in Smart Healthcare 13.2.1. Artificial Intelligence and Machine Learning (AIML) in Healthcare Systems 182 13.2.2. Early Cancer Diagnosis 13.2.3. Diagnosis of Fatal Blood Diseases 13.2.4. Customer Service Chatbots 13.2.5. Managing the Medical Records 13.2.6. Dosage Errors 13.2.7. Robotic Surgeries 13.3. Cloud Computing in Healthcare Systems 13.4. Security Challenge in Smart Healthcare Conclusion References 14. Chapter 14.1. Introduction 14.1.1. Capturing storage techniques for healthcare data 14.1.2. About Healthcare Data 14.1.3. Data storage 14.1.4. Onsite data storage 14.1.5. Public cloud data storage 14.1.6. Hybrid cloud data storage solution 14.1.7. Benefits of storing data on the cloud from multiple sources 14.2. ML-enabled storage systems 14.3. The current state of technology 14.4. Enhancing existing Enterprise Data Warehouses (EDW) 14.5. Background work 14.6. ML techniques for treatment of healthcare data 14.7. Smart access techniques for storage systems 14.8. Prediction of diseases on healthcare data, both batch, and real-time data streams 197 Conclusion References 15. Chapter 15.1. Introduction 15.2. Smart Healthcare Tools and Techniques 15.2.1. Cloud Computing in Smart Healthcare 15.2.2. Medical Records Centralization 15.2.3. Promoting Patient Engagement 15.2.4. Better Scalability 15.2.5. Cost-Effectiveness 15.2.6. Advanced Analytics for Healthcare 15.3. Current and Future application of AI, IoT, Blockchain and Cloud Computing in Smart Healthcare . 210 15.3.1. Applications of Artificial Intelligence in Smart Healthcare 15.3.2. Machine learning neural networks and deep learning 15.3.3. Physical robots 15.3.4. Natural language processing (NLP) 15.3.5. Applications of Internet of Things (IoT) in Smart Healthcare 15.3.6. Applications of Blockchain in Smart Healthcare 15.3.7. Applications of Cloud Computing in Smart Healthcare 15.4. Challenges in Smart Healthcare 15.4.1. Availability 15.4.2. Data Centralization 15.4.3. Privacy/Security 15.4.4. Open Access 15.5. Future of Smart Healthcare and Telemedicine Conclusion References

    1 in stock

    £134.99

  • Provable and Practical Security: 16th

    Springer International Publishing AG Provable and Practical Security: 16th

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11–12,2022. The 15 full papers and 4 short papers were presented carefully reviewed and selected from 52 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Encryption; Lattice Based Cryptography; Information Security; Blockchain; and Foundations.Table of ContentsEncryption.- A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test.- Secure-Channel Free Certificateless Searchable Public key Authenticated Encryption with Keyword Search.- More Efficient Verifiable Functional Encryption.- Subverting Deniability.- Epoch Confidentiality in Updatable Encryption.- Lattice Based Cryptography.- Simplified Server-Aided Revocable Identity-Based Encryption from Lattices.- Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask.- Batched Fully Dynamic Multi-key FHE from FHEW-like Cryptosystems.- Zero-knowledge Range Arguments for Signed Fractional Numbers from Lattices.- Information Security.- Fast Out-of-band Data Integrity Monitor to Mitigate Memory Corruption Attacks.- Construction of a New UAV Management System based on UMIA Technology.- FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning.- Practical Federated Learning for Samples with Different IDs.- Blockchain.- Reinforcement-Mining: Protecting Reward in Selfish Mining.- FolketID: A Decentralized Blockchain-based NemID Alternative against DDosS Attacks.- Secure Collaboration between Consortiums in Permissioned Blockchains.- Foundations.- (Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge.- Practical Non-Malleable Codes from Symmetric-key Primitives in 2-Split-State Model.- Cryptographic Role-Based Access Control, Reconsidered.

    1 in stock

    £47.49

  • Advances in Cryptology – ASIACRYPT 2022: 28th

    Springer International Publishing AG Advances in Cryptology – ASIACRYPT 2022: 28th

    1 in stock

    Book SynopsisThe four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.Table of ContentsIsogeny Based Cryptography.- Homomorphic Encryption.- NIZK and SNARKs.- Non Interactive Zero Knowledge.- and Symmetric Cryptography.

    1 in stock

    £75.99

  • Quantenkommunikationsnetze

    Springer Fachmedien Wiesbaden Quantenkommunikationsnetze

    1 in stock

    Book SynopsisDieses Buch bietet ein Tutorial über Quantenkommunikationsnetze. Die Autoren erörtern aktuelle Paradigmenwechsel in Kommunikationsnetzen, die erforderlich sind, um die einfachen Transportkonzepte der vorherrschenden Netze um Rechen- und Speicherfunktionen zu ergänzen. Sie zeigen, wie diese "softwarisierten" Lösungen neue Wege beschreiten, um Latenzzeiten zu reduzieren und die Ausfallsicherheit zu erhöhen. Die Autoren erörtern, wie diese Lösungen trotz der ihnen innewohnenden Probleme aufgrund der eingeführten Rechenlatenz und des Energieverbrauchs durch hybride klassisch-quantische Kommunikationsnetze gelöst werden können. Das Buch bringt Quantennetzwerke, Quanteninformationstheorie, Quantencomputer und Quantensimulation zusammen.Table of ContentsEinführung.- Grundlegender Hintergrund.- Quantencomputing und Programmierung.- Quanteninformationstheorie.- Quantenfehlerkorrektur.- Quantenkommunikationsnetze- Quantenkommunikationsnetze: Entwurf und Simulation.- Quantenkommunikationsnetze: Abschließende Betrachtungen und Anwendungsfälle.

    1 in stock

    £85.49

  • Code-Based Cryptography: 10th International

    Springer International Publishing AG Code-Based Cryptography: 10th International

    5 in stock

    Book SynopsisThis book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway.The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all aspects of code-based cryptography, from design to software and hardware implementations, works about recent NIST PQC standardization candidates, side channel analysis, and improved decoding techniques.Table of ContentsDistinguishing and Recovering Generalized Linearized ReedSolomon Codes.- Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation.- Key-Recovery Fault Injection Attack on the Classic McEliece KEM.- Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC.- Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes.- On Decoding High-Order Interleaved Sum-Rank-Metric Codes.- Information Set Decoding for Lee-Metric Codes using Restricted Balls.- Cryptanalysis of IvanovKroukZyablov cryptosystem

    5 in stock

    £42.74

  • Advances in Cryptology – CRYPTO 2023: 43rd Annual

    Springer International Publishing AG Advances in Cryptology – CRYPTO 2023: 43rd Annual

    1 in stock

    Book SynopsisThe five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

    1 in stock

    £85.49

  • Stabilization, Safety, and Security of

    Springer International Publishing AG Stabilization, Safety, and Security of

    1 in stock

    Book SynopsisThis book constitutes the proceedings of 25th International Symposium, SSS 2023, in Jersey City, NJ, USA, in October 2023.The 32 full papers presented together with 8 short papers were carefully reviewed and selected from 78 submissions. The conference was organized into five tracks reflecting major trends related to the conference: (i) Track A. Self-stabilizing Systems: Theory and Practice, (ii) Track B. Distributed and Concurrent Computing: Foundations, Fault-Tolerance and Scalability, (iii) Track C. Cryptogrophy and Security, (iv) Track D. Dynamic, Mobile and Nature-Inspired Computing Mobile Agents, (v) and Distributed Databases.Table of ContentsDistributed computing methodologies.- Software fault tolerance.- Ad hoc networks.- Security and privacy.- Software safety.- Software reliability.- Mobile networks.- Dependable and fault-tolerant systems and networks.- Concurrent computing methodologies.

    1 in stock

    £66.49

  • Provable and Practical Security: 17th

    Springer International Publishing AG Provable and Practical Security: 17th

    3 in stock

    Book SynopsisThis volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.Table of Contents​Fundamentals & Cryptographic Primitives.- Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement.- Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation.- Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections.- Cryptanalysis.- Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMs.- Linear Cryptanalysis of Lightweight Block Cipher WARP.- Linicrypt in the Ideal Cipher Model.- Signature.- SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBC.- Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications.- A Certificateless Aggregate Signature Scheme with Better Security.- Constant-size Group Signatures with Message-Dependent Opening from Lattices.- Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions.- Threshold Ring Signature Scheme from Cryptographic Group Action.- Encryption.- Homomorphic Witness Encryption from Indistinguishable Obfuscation.- Identity-based Matchmaking Encryption Secure against Key Generation Center.- Multi-Input Functional Encryption for Unbounded Inner Products.- FleS: a compact and parameter-flexible supersingular isogeny based public key encryption scheme.- A New Revocable Attribute Based Encryption on Lattice.- An efficient keyword-based ciphertext retrieval scheme.- Privacy Preservation.- Privacy Preserving Outsourced K-means Clustering using Kd-tree.- Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency.- A Privacy-Preserving Takeaway Delivery Service Scheme.- Blockchain Security.- CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest.- simuBits: Pool Security Verification of Novel Mining Attacks.

    3 in stock

    £61.74

  • Code-Based Cryptography: 11th International

    Springer International Publishing AG Code-Based Cryptography: 11th International

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 11th International Conference on Code-Based Cryptography, CBCrypto 2023, held in Lyon, France, during April 22–23, 2023. The 8 full papers included in this book were carefully reviewed and selected from 28 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms.

    1 in stock

    £42.74

  • Theory of Cryptography: 21st International

    Springer International Publishing AG Theory of Cryptography: 21st International

    1 in stock

    Book SynopsisThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. Table of ContentsProofs and outsourcing.- theoretical foundations.- multi-party computation.

    1 in stock

    £66.49

  • Theory of Cryptography: 21st International

    Springer International Publishing AG Theory of Cryptography: 21st International

    1 in stock

    Book SynopsisThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. Table of ContentsMulti-party computation.- encryption.- secret sharing, PIR and memory.

    1 in stock

    £61.74

  • Theory of Cryptography: 21st International

    Springer International Publishing AG Theory of Cryptography: 21st International

    1 in stock

    Book SynopsisThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. Table of ContentsAnonymity, surveillance and tampering; lower bounds; IOPs and succinctness.

    1 in stock

    £66.49

  • Theory of Cryptography: 21st International

    Springer International Publishing AG Theory of Cryptography: 21st International

    3 in stock

    Book SynopsisThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. Table of ContentsLattices.- quantum cryptography.- group-based cryptography.- Byzantine agreement, consensus and composability.

    3 in stock

    £66.49

  • PublicKey Cryptography  PKC 2024

    Springer Nature Switzerland PublicKey Cryptography PKC 2024

    1 in stock

    Book Synopsis

    1 in stock

    £104.49

  • PublicKey Cryptography  Pkc 2024

    Springer Nature Switzerland PublicKey Cryptography Pkc 2024

    3 in stock

    Book Synopsis

    3 in stock

    £104.49

  • PublicKey Cryptography  Pkc 2024

    Springer Nature Switzerland PublicKey Cryptography Pkc 2024

    1 in stock

    Book Synopsis

    1 in stock

    £104.49

  • BlockchainBased Internet of Things

    Springer BlockchainBased Internet of Things

    1 in stock

    Book SynopsisIntroduction.- Architecture of BIoT.- Transaction Migration Scheme for BIoT.- Lightweight Consensus Mechanism for BIoT.- Prototype Implementation of BIoT.- Conclusion and Outlook.

    1 in stock

    £40.49

  • Distributed Denial of Service Attacks: Concepts,

    1 in stock

    £88.50

  • Foundations and Practice of Security: 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers

    Springer International Publishing AG Foundations and Practice of Security: 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers

    15 in stock

    Book SynopsisThis book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of Security, FPS 2013, held in La Rochelle, France, in October 2013. The 25 revised full papers presented together with a keynote address were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on security protocols, formal methods, physical security, attack classification and assessment, access control, cipher attacks, ad-hoc and sensor networks, resilience and intrusion detection.Table of ContentsOn the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case.- On the Feasibility of a Censorship Resistant Decentralized Naming System.- A General Framework for Group Authentication and Key Exchange Protocols.- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange.- Model-Based Specification and Validation of Security and Dependability Patterns.- Enforcing Information Flow by Combining Static and Dynamic Analysis.- Fault Injection to Reverse Engineer DES-like Cryptosystems.- Software Camouflage.- Investigation of Parameters Influencing the Success of Optical Fault Attacks.- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework.- Quantitative Evaluation of Enforcement Strategies.- Collusion Resistant Inference Control for Cadastral Databases.- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model.- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations.- Computational Soundness of Symbolic Blind Signatures under Active Attacker.- Improved Davies-Murphys Attack on DES Revisited.- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts.- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs.- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks.- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs.- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.- Evaluation of Software-Oriented Block Ciphers on Smartphones.- Don’t Push it: Breaking iButton Security.- Discovering Flaws in IDS through Analysis of their Inputs.- On the Reverse Engineering of the Citadel Botnet.- The Carna Botnet Through the Lens of a Network Telescope.

    15 in stock

    £42.74

  • Symmetrische Verschlüsselungsverfahren: Design,

    Springer Fachmedien Wiesbaden Symmetrische Verschlüsselungsverfahren: Design,

    1 in stock

    Book SynopsisEnigma und Lucifer-Chiffre: das spannende Lehrbuch zur Kryptographie mit Online-Service. Es wird detailliert beschrieben, was bei der Entwicklung eines symmetrischen Kryptosystems - das den heutigen Anforderungen entspricht - zu berücksichtigen ist. Dazu wird insbesondere die differentielle und die lineare Kryptoanalyse ausführlich erklärt.Table of ContentsKryptoanalyse klassischer Chiffrierverfahren - Die Kryptoanalyse der 'Enigma'-Chiffre - Shannons Theorie der Kryptosysteme - Lucifer-Chiffre und der Data Encryption Standard - Differentielle Kryptoanalyse - Lineare Kryptoanalyse - Advanced Encryption Standard - Mathematische Grundlagen

    1 in stock

    £34.19

  • Kryptografie für Dummies

    John Wiley & Sons Inc Kryptografie für Dummies

    3 in stock

    Book SynopsisKryptografie ist ein wichtiges Mittel um IT-Systeme zu schützen. Sie ermöglicht nicht nur die Verschlüsselung von Nachrichten, sondern auch digitale Unterschriften, die Authentifizierung und die Anonymisierung von Kommunikationspartnern. Das hier vorliegende Buch ist eine Einführung in die Kryptografie für Studierende ? von der symmetrischen über die asymmetrische Verschlüsselung bis hin zu Hash-Funktionen. Mit Übungsaufgaben und Lösungen können Sie Ihr frisch erworbenes Wissen überprüfen und festigen. So ist dieses Buch umfassend, keinesfalls oberflächlich, aber ohne Vorwissen verständlich.Table of ContentsÜber den Autor 7 Einleitung 21 Teil I: Verschlüsseln 29 Kapitel 1: Sicherheit in Zeiten des Internet 31 Kapitel 2: Klassische Verschlüsselung 37 Kapitel 3: Public-Key-Verschlüsselung 51 Teil II: Kryptische Mathematik 61 Kapitel 4: Menge, Relation, Abbildung 63 Kapitel 5: Teilbarkeit und Modulo-Rechnung 67 Kapitel 6: Gruppe 77 Teil III: Kryptografische Verfahren 89 Kapitel 7: RSA: Korrektheit und Schlüsselerzeugung 91 Kapitel 8: Diffie-Hellman, ElGamal und Shamir 99 Kapitel 9: AES-Verschlüsselungsverfahren 111 Kapitel 10: AES-Mathematik: Rechnen in einem Körper 123 Kapitel 11: Diffie-Hellman-Schlüsselvereinbarung mit elliptischer Kurve 133 Teil IV: Berechnungsverfahren 141 Kapitel 12: Python-Einführung 143 Kapitel 13: Erweiterter euklidischer Algorithmus 149 Kapitel 14: Schnelle Exponentiation und Primzahltest 159 Kapitel 15: Chinesischer Restsatz 171 Kapitel 16: Elliptische Kurven implementieren 179 Kapitel 17: Kryptografische Verfahren implementieren 187 Teil V: Authentifizieren 193 Kapitel 18: Kryptografische Hashfunktion 195 Kapitel 19: Authentizität und Integrität von Nachrichten 207 Kapitel 20: Digitale Signatur 215 Kapitel 21: Teilnehmer-Authentifizierung 225 Teil VI: Sicherheit 237 Kapitel 22: Angriffe auf das RSA-Verfahren 239 Kapitel 23: Faktorisierungsangriff 251 Kapitel 24: Angriffe auf Hashfunktionen 261 Teil VII: Zufall 267 Kapitel 25: Zufallsbits und Pseudozufallsbits 269 Kapitel 26: Kryptografisch sichere Zufallsbits 275 Teil VIII: Anwendungen 281 Kapitel 27: Zertifizierte Sicherheit 283 Teil IX: Top-Ten-Teil 291 Kapitel 28: Die glorreichen Sieben 293 Anhang 307 Anhang A: Zum Weiterlesen 309 Anhang B: Lösungen zu den Übungsaufgaben 311 Literaturverzeichnis 323 Abbildungsverzeichnis 325 Stichwortverzeichnis 329

    3 in stock

    £21.38

  • Sequences and Their Applications – SETA 2006: 4th

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Sequences and Their Applications – SETA 2006: 4th

    15 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 4th International Conference on Sequences and Their Applications, SETA 2006. The book presents 32 revised full papers together with 4 invited lectures. The papers are organized in topical sections on linear complexity of sequences, correlation of sequences, stream ciphers and transforms, topics in complexities of sequences, multi-sequence synthesis, sequences and combinatorics, FCSR sequences, aperiodic correlation and applications, and boolean functions, and more.Table of ContentsInvited Papers.- Shift Register Sequences – A Retrospective Account.- The Probabilistic Theory of the Joint Linear Complexity of Multisequences.- Multi-Continued Fraction Algorithms and Their Applications to Sequences.- Codes for Optical CDMA.- Linear Complexity of Sequences.- On the Linear Complexity of Sidel’nikov Sequences over .- Linear Complexity over F p of Ternary Sidel’nikov Sequences.- Bounds on the Linear Complexity and the 1-Error Linear Complexity over F p of M-ary Sidel’nikov Sequences.- The Characterization of 2 n -Periodic Binary Sequences with Fixed 1-Error Linear Complexity.- Correlation of Sequences.- Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation.- Extended Hadamard Equivalence.- Analysis of Designing Interleaved ZCZ Sequence Families.- Stream Ciphers and Transforms.- Security of Jump Controlled Sequence Generators for Stream Ciphers.- Improved Rijndael-Like S-Box and Its Transform Domain Analysis.- Topics in Complexities of Sequences.- Nonlinear Complexity of Binary Sequences and Connections with Lempel-Ziv Compression.- On Lempel-Ziv Complexity of Sequences.- Computing the k-Error N-Adic Complexity of a Sequence of Period p n .- On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.- Linear/Nonlinear Feedback Shift Register Sequences.- On the Classification of Periodic Binary Sequences into Nonlinear Complexity Classes.- Sequences of Period 2 N –2.- A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences.- Multi-sequence Synthesis.- Implementation of Multi-continued Fraction Algorithm and Application to Multi-sequence Linear Synthesis.- The Hausdorff Dimension of the Set of r-Perfect M-Multisequences.- Filtering Sequences and Pseudorandom Sequence Generators.- Lower Bounds on Sequence Complexity Via Generalised Vandermonde Determinants.- Construction of Pseudo-random Binary Sequences from Elliptic Curves by Using Discrete Logarithm.- On the Discrepancy and Linear Complexity of Some Counter-Dependent Recurrence Sequences.- Sequences and Combinatorics.- Nonexistence of a Kind of Generalized Perfect Binary Array.- FCSR Sequences.- On the Distinctness of Decimations of Generalized l-Sequences.- On FCSR Memory Sequences.- Periodicity and Distribution Properties of Combined FCSR Sequences.- Aperiodic Correlation and Applications.- Generalized Bounds on Partial Aperiodic Correlation of Complex Roots of Unity Sequences.- Chip-Asynchronous Version of Welch Bound: Gaussian Pulse Improves BER Performance.- Boolean Functions.- On Immunity Profile of Boolean Functions.- Reducing the Number of Homogeneous Linear Equations in Finding Annihilators.- The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function.- Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions.- Construction of 1-Resilient Boolean Functions with Very Good Nonlinearity.

    15 in stock

    £42.74

  • Digitale Signatur: Grundlagen, Funktion und

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Digitale Signatur: Grundlagen, Funktion und

    15 in stock

    Book SynopsisDigitale Kommunikation dringt in immer mehr Bereiche privater und unternehmerischer Anwendungsfelder ein. Seit 1997 sind die gesetzlichen Rahmenbedingungen in Deutschland für rechtlich gesicherte Vorgänge im Internet geschaffen. Zentraler Bestandteil ist die digitale Signatur. Die Autoren erklären anschaulich und detailliert deren Konzept und Einsatzmöglichkeiten. Die Funktionen von Signatur, Trustcenter, Chipkarte und asymmetrischem Schlüsselverfahren werden dargestellt und durch zahlreiche Diagramme verdeutlicht. Die Informationen dienen als Entscheidungsgrundlage für den Einsatz der digitalen Signatur in Firmen, Institutionen und Behörden. Die Anwendungsbeispiele beziehen sich auf Business-to-Business- und Business-to-Customer-Beziehungen in Intranet und Internet. Das Werk wendet sich vor allem an Produzenten digitaler Medien sowie Entscheider in Wirtschaft und Verwaltung.Table of ContentsAusgangslage.- Konzept.- Zielsetzung.- Das Prinzip der digitalen Signatur.- Rechtliche Aspekte.- Europäische Entwicklung.- Internationale Entwicklungen.- Einsatzfelder.- Business-to-Business-Kommunikation.- Business-to-Customer-Kommunikation.- Intranet (firmeninterne Kommunikation).- Behördliche Kommunikation.- Gesetzesgrundlage.- Glossar.- Literaturverzeichnis.- Index.

    15 in stock

    £42.74

  • Personal Satellite Services: International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Personal Satellite Services: International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the International Conference on Personal Satellite Services (PSATS 2009) in Rome, Italy in March 2009. The 17 papers papers demonstrate recent advances in Internet applications over satellites, satellites technologies, and future satellite location-based systems.Table of ContentsAnalysing the Orbital Movement and Trajectory of LEO (Low Earth Orbit) Satellite Relative to Earth Rotation.- A Cross-Layer PEP for DVB-RCS Networks.- Triple Play over Satellite, Ka-Band Making the Difference.- Time Scheduling Based on Tradeoff between Detection Performance and QoS Requirement.- Study of the Quantum Channel between Earth and Space for Satellite Quantum Communications.- Spectral Analysis of Experimental Ka-Band Propagation Measurements over the Australian LEO Microsatellite ‘FedSat’.- Satellite Broadband Revolution: How Latest Ka-Band Systems Will Change the Rules of the Industry. An Interpretation of the Technological Trajectory.- Performance Enhanced Proxy Solutions for Satellite Networks: State of the Art, Protocol Stack and Possible Interfaces.- PEPsal Performance Analysis on Disruptive Radio Channels.- PEP Deployment and Bandwidth Management Issues.- High Altitude Platforms: Radio Resource Management Policy for MBMS Applications.- Frequency Tracking Performance Using a Hyperbolic Digital-Phase Locked Loop for Ka-Band Communication in Rain Fading Channels.- Design and Implementation of P2P Streaming Systems for Webcast.- Comparisons on Performances in MIMO Systems under Different Propagation Environments.- Combined Congestion Control and Link Selection Strategies for Delay Tolerant Interplanetary Networks.- Broadband Satellite Multimedia (BSM) Security Architecture and Interworking with Performance Enhancing Proxies.- A Satellite-Based Infrastructure Providing Broadband IP Services on Board High Speed Trains.

    1 in stock

    £40.49

  • Datenschutz: Einführung in technischen

    Springer Fachmedien Wiesbaden Datenschutz: Einführung in technischen

    1 in stock

    Book SynopsisDieses Lehrbuch behandelt im ersten Teil schwerpunktmäßig technische Maßnahmen, die den Schutz personenbezogener Daten sicherstellen. Dazu werden grundlegende Verfahren der Anonymisierung und der Gewährleistung von Anonymität im Internet (z. B. Tor) vorgestellt. Das Buch gibt einen Überblick über gängige Verfahren des Identitätsmanagements (z. B. OpenID Connect) und die in elektronischen Ausweisdokumenten (z. B. im Personalausweis) verwendeten Sicherheitsmaßnahmen. Die Datenschutz-Garantien der vermittelten Ansätze werden im Detail behandelt. Im Bereich des World Wide Web erfährt der Leser, wo die Probleme aus Sicht des Datenschutzes liegen und wie diese Lücken geschlossen werden können. Anonyme Bezahlverfahren und eine Untersuchung von Bitcoin runden den technischen Teil des Buches ab. Der Leser lernt Ansätze aus der Praxis kennen, um so je nach Anforderungen in der Systementwicklung das passende Verfahren auswählen zu können.Im zweiten Teil werden die Grundlagen des Datenschutzrechts behandelt. Denn technische Maßnahmen sollen unerlaubte Datenverarbeitung verhindern; das Recht bestimmt, welche Datenverarbeitungen erlaubt sind. Ohne Kenntnisse im Datenschutzrecht können technische Maßnahmen nicht richtig implementiert werden. Zum besseren Verständnis erfolgt ein Überblick über die Rechtsordnung insgesamt, in die das Datenschutzrecht eingeordnet wird. Betrachtet werden die europäische und die verfassungsrechtliche Dimension des Datenschutzes. Der Schwerpunkt liegt auf den Regelungen der Datenschutz-Grundverordnung. Dabei werden auch besonders häufig vorkommende und Fragen aufwerfende Verarbeitungssituationen wie das Webtracking erörtert. Beispielhaft werden datenschutzrechtliche Fälle bearbeitet.Trade Review“... Im rechtlichen Teil ist hervorzuheben, dass ... Grundlagen des Rechtsverständnisses zielgruppenbezogen für Informatikerinnen und Informatiker dargestellt werden. ... Es bildet die technischen Themen umfassend ab und bietet für das rechtliche Verständnis aktueller Fragestellungen eine solide Grundlage.” (Rudi Kramer, in: AWV-Informationen, 14. Februar 2023) Table of ContentsEinführung in den Technischen Datenschutz - Anonymitätsmaße - Anonymität im Internet - Identitätsmanagement - Anonymes Bezahlen und Bitcoin - Datenschutz im World Wide Web - Instant Messaging - Elektronische Ausweisdokumente - Weitere Privacy-Enhancing Technologies - Datenschutzrecht - Einführung in die Rechtsordnung - Wichtige Gesetze, wichtige Grundbegriffe - Erlaubte und unerlaubte Datenverarbeitungen, Rechtsgrundlagen - Rechenschaftspflicht - technische und organisatorische Maßnahmen (toM) - Betroffenenrechte (Auskunft, Kopie, Berichtigung, Löschung usw.) - Wichtige Verarbeitungssituationen (Videoüberwachung, Fotoaufnahmen, Tracking, Cloud Computing usw.) - Zertifizierung, Akkreditierung - Betriebliche Datenschutzbeauftragte - Datenschutz-Aufsichtsbehörde

    1 in stock

    £26.59

  • Wirtschaftsspionage und Intelligence Gathering:

    Springer Fachmedien Wiesbaden Wirtschaftsspionage und Intelligence Gathering:

    1 in stock

    Book SynopsisIm Wirtschaftskreislauf entstehend Datensammlungen. Darin werden Informationen über die wirtschaftliche Tätigkeit von Unternehmen gespeichert. Die Unternehmen haben aber keinen Einfluss auf die Generierung, Speicherung und Verwendung dieser Daten. Alexander Tsolkas und Friedrich Wimmer erklären anhand von Beispielen, wie diese Datensammlungen ausgespäht werden können, wie Unternehmen die eigene Gefährdungslage einschätzen und wie sie das Risiko durch Tarnen und Täuschen verringern können.Table of ContentsBegriffe - Bedrohungslage, Wirtschaftsspionage und Fallbeispiele - Akteure des Intelligence Gathering und deren Ziele - Im Wirtschaftskreislauf entstehende Datensammlungen - Möglichkeiten der Ausspähung von Unternehmen - Bedeutung und Auswirkung auf Unternehmen - Fazit und Ausblick

    1 in stock

    £35.99

  • Protect Your Information: With Intrusion

    BPB Publications Protect Your Information: With Intrusion

    1 in stock

    Book Synopsis

    1 in stock

    £14.62

  • Cryptography

    River Publishers Cryptography

    1 in stock

    Book SynopsisCryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including:full provision of Web-based material on almost every topic coveredprovision of additional on-line material, such as videos, source code, and labscoverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs)Key areas covered include:Fundamentals of EncryptionPublic Key EncryptionSymmetric Key EncryptionHashing MethodsKey Exchange MethodsDigital Certificates and AuthenticationTunnelingCrypto CrackingLight-weight CryptographyBlockchainZero-knowledge ProofsThis book provides extensive support through the associated website of: http://asecuritysite.com/encryptionTable of Contents1. Ciphers and Fundamentals 2. Secret Key Encryption 3. Hashing 4. Public Key 5. Key Exchange 6. Authentication and Digital Certificates 7. Tunneling 8. Crypto Cracking 9. Light-weight Cryptography 10. Blockchain 11. Zero Knowledge 12. Wifi

    1 in stock

    £61.74

  • Security in Computing and Communications: 8th

    Springer Verlag, Singapore Security in Computing and Communications: 8th

    3 in stock

    Book SynopsisThis book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.Table of ContentsPandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools.- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems.- Evading Static and Dynamic Android Malware Detection Mechanisms.- Multilevel Secure Container Deployment Framework in Edge Computing.- Deep Hierarchical APP Recommendation with Dynamic Behaviors.- New Security Architecture of Access Control in 5G MEC.- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments.- A Survey of Security Attacks on Silicon Based Weak PUF Architectures.- On the Feasibility of DoS Attack on Smart Door Lock IoT Network.- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning.- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection.- Thermal Management in Large Data Centres: Security Threats and Mitigation.- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm.- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data.- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm.- SaaS - Microservices-Based Scalable Smart Contract Architecture.- GIDS: Anomaly Detection Using Generative Adversarial Networks.- Audio Steganography Using Multi LSB and IGS Techniques.- A Forensic Analysis on the Availability of MQTT Network Traffic.- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications.- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment.

    3 in stock

    £40.49

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account