Data encryption Books

203 products


  • Blockchain Technology for Managers

    Springer Nature Switzerland AG Blockchain Technology for Managers

    3 in stock

    Book SynopsisBlockchain is a technology that tends to be misunderstood by managers that need to make technology acquisition decisions. This book will provide readers with a basic understanding of blockchain and distributed ledger technology (DLT), the technologies that underpin it, and the technologies DLT is built upon. The book is purposefully not a book on how to code or explore other technical aspects of blockchain (other than the fundamentals). Rather, it provides managers with the basic understanding of the architectures and consensus algorithms, how they work, the design trade-offs of each architecture type, and what problems and use cases the core characteristics of DLT are best suited to solve ─ providing business managers with the core information they need to ask the right questions of vendors when making business value assessments and acquisition decisions. Table of ContentsDLT Types and Design Trade-offs.- Learning Objectives.- Proof-of-work.- Proof-of-stake.- Proof-of-storage.- Proof-of-authority.- Directed Acyclic Graph (DAG): AKA “The Tangle”.- Hash and Merkle Trees.- Byzantine Fault Tolerance.- Mining and Making Money.- Power Consumption.- Understanding the Fuss.- Bitcoin Demand History.- Stablecoins.- Use Cases and Applications.- Global Activity – Investment and Projects.- Which Use Cases Are Getting the Attention?.- Standards: IEEE 2418 and ISO/TC 307.- Securing IoT.- Questions for Managers to Ask.- Examples: Appliance Service Plan; Emobility; Utility Metering.

    3 in stock

    £49.49

  • Blockchain Technology for Managers

    Springer Nature Switzerland AG Blockchain Technology for Managers

    1 in stock

    Book SynopsisBlockchain is a technology that tends to be misunderstood by managers that need to make technology acquisition decisions. This book will provide readers with a basic understanding of blockchain and distributed ledger technology (DLT), the technologies that underpin it, and the technologies DLT is built upon. The book is purposefully not a book on how to code or explore other technical aspects of blockchain (other than the fundamentals). Rather, it provides managers with the basic understanding of the architectures and consensus algorithms, how they work, the design trade-offs of each architecture type, and what problems and use cases the core characteristics of DLT are best suited to solve ─ providing business managers with the core information they need to ask the right questions of vendors when making business value assessments and acquisition decisions. Table of ContentsDLT Types and Design Trade-offs.- Learning Objectives.- Proof-of-work.- Proof-of-stake.- Proof-of-storage.- Proof-of-authority.- Directed Acyclic Graph (DAG): AKA “The Tangle”.- Hash and Merkle Trees.- Byzantine Fault Tolerance.- Mining and Making Money.- Power Consumption.- Understanding the Fuss.- Bitcoin Demand History.- Stablecoins.- Use Cases and Applications.- Global Activity – Investment and Projects.- Which Use Cases Are Getting the Attention?.- Standards: IEEE 2418 and ISO/TC 307.- Securing IoT.- Questions for Managers to Ask.- Examples: Appliance Service Plan; Emobility; Utility Metering.

    1 in stock

    £35.99

  • Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings

    Springer Nature Switzerland AG Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings

    15 in stock

    Book SynopsisThis book constitutes the proceedings of the 7th International Conference on Cryptology and Information Security in Latin America, LATIN 2021, which was held in October 2021. The conference was originally planned to take place in Bogota, Colombia, but changed to a virtual event due to the COVID-19 pandemic. The 22 full papers included in this volume were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: quantum cryptography; post-quantum cryptography; asymmetric cryptanalysis; cryptanalysis and side-channel analysis; distributed cryptographic protocols; and multiparty computation.Table of ContentsQuantum Cryptography.- Tight Bounds for Simon's Algorithm.- Constructions for Quantum Indistinguishability Obfuscation.- On Forging SPHINCS+-Haraka Signatures on a Fault-tolerant Quantum Computer.- Post-Quantum Cryptography.- Post-Quantum Key-Blinding for Authentication in Anonymity Networks.- Implementing and measuring KEMTLS.- A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates.- Attribute-Based Access Control for Inner Product Functional Encryption from LWE.- Asymmetric Cryptanalysis.- Classical Attacks on a Variant of the RSA Cryptosystem.- Improved attacks against key reuse in learning with errors key exchange.- Cryptanalysis and Side-Channel Analysis.- Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis.- Train or Adapt a Deeply Learned Profile.- Autocorrelations of vectorial Boolean functions.- Automatic Search for Bit-based Division Property.- TEDT2 - Highly Secure Leakage-resilient TBC-based Authenticated Encryption.- Distributed Cryptographic Protocols.- Weight-Based Nakamoto-Style Blockchains.- LOVE a Pairing.- Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoToo.- Stronger Notions and a More E cient Construction of Threshold Ring Signatures.- Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms.- Multiparty Computation.- Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling.- The Cost of IEEE Arithmetic in Secure Computation.- Honest Majority MPC with Abort with Minimal Online Communication.

    15 in stock

    £66.49

  • Smart Card Research and Advanced Applications: 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11–12, 2021, Revised Selected Papers

    Springer Nature Switzerland AG Smart Card Research and Advanced Applications: 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11–12, 2021, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 20th International Conference on Smart Card Research and Advanced Applications, CARDIS 2021, which took place in November 2021. The conference took place in Lübeck, Germany, and changed to a hybrid format due to the COVID-19 pandemic.The 16 full papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named Side-Channel Attacks, Fault Attacks, Public Key and Secure Implementations. Table of ContentsSide-Channel Attacks.- Fault Attacks.- Public Key.- Secure Implementations.

    1 in stock

    £49.49

  • Advances in Cryptology – CRYPTO 2022: 42nd Annual

    Springer International Publishing AG Advances in Cryptology – CRYPTO 2022: 42nd Annual

    1 in stock

    Book SynopsisThe 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures. Table of ContentsCryptanalysis I.- Randomness.- Quantum Cryptography I.- Secure Multiparty Computation I.- Proof Systems.- Advanced Encryption Systems.- Secure Multiparty Computation II.- Secure Messaging.

    1 in stock

    £42.74

  • Electronic Voting: 7th International Joint

    Springer International Publishing AG Electronic Voting: 7th International Joint

    1 in stock

    Book SynopsisThis open access book LNCS 13353 constitutes the proceedings of the 7th International Conference on Electronic Voting, E-Vote-ID 2022, held in Bregenz, Austria, in October 2022. The 10 full papers presented were carefully reviewed and selected from 39 submissions. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others.Table of ContentsAn analysis of the security and privacy issues of the Neovote online voting system.- Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol.- Review Your Choices: When Confirmation Pages Break Ballot Secrecy in Online Elections.- Running the Race: a Swiss Voting Story.- The Effect of Exogenous Shocks on the Administration of Online Voting: Evidence from Ontario, Canada.- The Council of Europe's CM/Rec(2017)5 on e-voting and secret suffrage: time for yet another update?.- Sweeter than SUITE: Supermartingale Stratified Union-Intersection Tests of Elections.- They may look and look, yet not see: BMDs cannot be tested adequately.- Individual Verifiability with Return Codes: Manipulation Detection Efficacy.- and Accuracy Testing: A Fifty-State Review.

    1 in stock

    £31.49

  • Advances in Cryptology – CRYPTO 2022: 42nd Annual

    Springer International Publishing AG Advances in Cryptology – CRYPTO 2022: 42nd Annual

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the 4-volume proceedings LNCS 13507, 13508, 13509, 13510, was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures. Table of ContentsSecure Messaging.- Lattice-Based Zero Knowledge.- Quantum Cryptography II.- Lattice-Based Signatures.- Blockchain.- Best Paper Awards.- Coding Theory.- Public Key Cryptography.- Signatures.

    1 in stock

    £40.49

  • Blockchain for Secure Healthcare Using Internet

    Springer International Publishing AG Blockchain for Secure Healthcare Using Internet

    1 in stock

    Book SynopsisHealthcare has become an extremely important and relevant topic in day to day discussions ever since the COVID-19 pandemic has been encountered by the global population. This has led to a renewed focus and attention that researchers from every discipline have put in to realize better strategies for healthcare management in general. This book is an attempt to put to use recent advancements in the field of the Internet of Medical Things often called IoMT, which is an extension of IoT for real-time, data analytics-driven prompt and quality healthcare to global citizens. Security has been always a challenge with pervasive technologies like IoMT and IoT, and thus usage of disruptive technology like blockchain to offset the security concerns that surround the data and network management. Therefore, this book is an honest attempt to provide directions to applied areas of research in IoMT for healthcare with the aid and help of Blockchain Technologies.Table of Contents1. Chapter1.1. Introduction 1.2. Smart Healthcare and Telemedical System 1.2.1. Smart Healthcare Technology 1.2.2. Remote monitoring and automated healthcare system 1.2.3. Remote Care and Telehealth 1.2.4. Emergency response solution for connectivity 1.2.5. Smart Hospital Management 1.3. Telemedical Healthcare 1.3.1. Registration Phase 1.3.2. Login Phase and Mutual Authentication 1.3.3. Telemedicine Server 1.4. Intelligent Medical Care using IoT 1.5. Smart Healthcare: Challenges and Threats Conclusion References 2. Chapter 2.1. Introduction 2.2. IoT Related Sub-Components 2.2.1. Embedded programming 2.2.2. Hardware device 2.2.3. Security 2.2.4. Networking and cloud Integration 2.2.5. Data Analytics and prediction 2.2.6. Machine Learning and AI 2.3. Architecture of IoT 2.3.1. Sensors and Actuators 2.3.2. Internet gateway 2.3.3. Edge Computing IT System 2.3.4. Data Centre and Cloud 2.3.5. Application of IoT 2.3.6. Smart Homes 2.3.7. Smart Agriculture 2.3.8. Energy Management 2.3.9. Industrial Internet 2.4. IoT In Healthcare 2.4.1. Remote patient monitoring 2.4.2. Real time Data Tracking 2.4.3. Connected wearables 2.5. Internet of Medical Things (IoMT or IoMedT) 2.6. Challenges for IoMT Conclusion References 3. Chapter 3.1. Introduction 3.2. IoT Components 3.2.1. Devices/Sensors 3.2.2. Connectivity 3.2.3. Data Processing 3.2.4. User Interface 3.3. IoMedT Components 3.3.1. Patient and Payer 3.3.2. Connected Medical Devices 3.3.3. Communication Services (Connectivity) 3.3.4. Analytics Platform (Data Processing 3.3.5. Service Providers 3.4. Integration of Latest Technology with IoMedT 3.5. Benefits and Challenges of IoMedT 3.5.1. Benefits of IoMedT 3.5.2. Challenges in IoMedT Conclusion References 4. Chapter 4.1. Introduction to Smart healthcare and IoMT 4.2. Perception layer - Sensor systems for data collection 4.2.1. Gateway layer 4.2.2. Management service layer/application support layer- data storage 4.2.3. Application/service layer 4.3. IoMT: A boon in healthcare 4.4. Challenges of IoMT 4.5. Benefits of IoMT 4.6. Structural components of IoMT 4.7. Functional components of IoMT 4.8. Structural and Functional Challenges Conclusion References 5. Chapter 5.1. Introduction 5.2. Working of Blockchain 5.2.1. Distributed Database 5.2.2. A network of nodes 5.2.3. Building Trust 5.3. Benefits of Blockchain Technology 5.3.1. Time-saving 5.3.2. Cost-saving 5.3.3. Tighter security 5.4. Application of Blockchain 5.4.1. Asset Management 5.4.2. Cross-Border Payments 5.4.3. Healthcare 5.4.4. Cryptocurrency 5.4.5. Birth and Death Certificates 5.4.6. Online Identity Verification 5.4.7. Internet of Things 5.4.8. Copyright and Royalties 5.5. Application of Blockchain in Smart Healthcare 5.5.1. Research 5.5.2. Seamless switching of patients between providers 5.5.3. Faster, cheaper, better patient care 5.5.4. Interoperable electronic health records 5.5.5. Data security 5.5.6. Mobile health apps and remote monitoring 5.5.7. Tracing and securing medical supplies 5.5.8. Health insurance claims 5.5.9. Tracking diseases and outbreaks 5.5.10. Safeguarding genomics Conclusion References 6. Chapter 6.1. Introduction 6.2. Possible Security Attacks in DMR Internet of Things Networks 6.3. Security Schemes and There Challenges in DMR Conclusion References 7. Chapter 7.1. Introduction 7.2. Benefits of IoMT in Smart Healthcare 7.2.1. Cost Reduction 7.2.2. Improve Treatment 7.2.3. Faster Disease Diagnosis 7.2.4. Drug and Equipment Management 7.2.5. Error Reduction 7.3. Tools and Technique for IoMT in Smart Healthcare 7.3.1. Electronic Health Record (EHR) 7.3.2. Referral Trackers 7.3.3. Patient Portals 7.3.4. Remote Patient Monitoring 7.3.5. Computerized Provider Order Entry 7.4. Use case of IoMT in Healthcare Industry 7.4.1. Internet of things for patients 7.4.2. Internet of things for Hospitals 7.4.3. Internet of things for Physicians 7.4.4. Internet of things for Business 7.4.5. Internet of things for Health Insurance Companies 7.5. Privacy and Security Issue in IoMT 7.5.1. Patients are not in charge of their own information 7.5.2. Present to Your Own Device (BYOD) 7.5.3. Telecommuting presents security chances 7.6. Challenges of IoMT in Smart Healthcare 7.6.1. Underdeveloped Initiatives 7.6.2. Unavailability of Memory 7.6.3. Keeping Updated 7.6.4. Data Security 7.6.5. Global healthcare regulations 7.6.6. Scalable Platforms 7.6.7. Data Overloading 7.7. Impact of IoMT on the future of the healthcare industry Conclusion References 8. Chapter 8.1. Introduction 8.1.1. Big Data relation with Cloud Computing 8.1.2. Relationship between IoMT and Big Data 8.1.3. Big Data and the Internet of Medical Things 8.1.4. IoT and Cloud Computing 8.1.5. Benefits of using big data, IoT and the cloud 8.2. IoMT needs to be integrated with cloud computing 8.3. Integration of IoT and Cloud Computing 8.4. Benefits of integrating IoT and cloud computing Conclusion References 9. Chapter 9.1. Introduction 9.1.1. IoT in Smart Healthcare Systems 9.2. Background/Present state in Data security 9.2.1. Data Security requirements in Smart Healthcare Systems 9.3. Privacy and QoS in smart healthcare 9.4. Data Security and Privacy Issues in Healthcare 9.5. QoS Parameters for Smart Healthcare 9.6. Suggested Security Techniques to Preserve QoS Conclusion References 10. Chapter 10.1. Introduction 10.2. Authentication Schemes for Tele Medical Healthcare System 10.3. Processes of an authentication protocol Conclusion References 11. Chapter 11.1. Introduction 11.1.1. Security 11.1.2. Features 11.2. Types of Blockchain Networks 11.2.1. Public blockchain network 11.2.2. Private blockchain network 11.2.3. Permissioned blockchain network 11.2.4. Consortium Blockchain networks 11.3. Applications of Blockchain 11.3.1. Smart contracts 11.3.2. Involving Blockchain into Internet of Things (IOT) 11.3.3. Preventing Identity Theft 11.4. Application of Blockchain in Smart Healthcare 11.4.1. Keeping transparency in delivering healthcare goods 11.4.2. Storing of medical data of patients 11.4.3. Remote health monitoring using IOT and blockchain 11.5. Electronic Health Record (EHR) and its Storage 11.5.1. Medical Big Data Mining and Processing in e-Healthcar 11.5.2. Smart healthcare systems using big data 11.6. Significance of Blockchain in Security of Electronic Health Record (EHR) Conclusion References 12. Chapter 12.1. Introduction 12.1.1. A Different Healthcare World 12.2. Components of Telemedicine 12.2.1. Teleconsultation 12.2.2. Telementoring 12.2.3. Telemonitoring 12.3. Emerging technologies in telemedicine 12.3.1. Technologies proceeding telemedicine 12.3.2. mRNA Technology 12.3.3. Neurotechnology 12.3.4. Precision Medicine 12.3.5. Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR) 12.3.6. Health Wearables 12.3.7. Technology in Mental Health 12.3.8. Artificial Intelligence 12.3.9. Augmented and virtual reality 12.3.10. Tele-robots 12.3.11. IoT and nanotechnology 12.3.12. 3D Printing 12.3.13. Enhanced Access to Medical Data and Information 12.3.14. Big Data 12.3.15. Improved Lines of Communication 12.3.16. Electronic Health Records 12.3.17. Metaverse Conclusion References 13. Chapter 13.1. Introduction 13.1.1. AI and Machine Learning 13.1.2. Cloud Computing 13.1.3. Cyber security/Cloud Security 13.2. Role of Artificial Intelligence, Cloud Computing, and Internet Security in Smart Healthcare 13.2.1. Artificial Intelligence and Machine Learning (AIML) in Healthcare Systems 182 13.2.2. Early Cancer Diagnosis 13.2.3. Diagnosis of Fatal Blood Diseases 13.2.4. Customer Service Chatbots 13.2.5. Managing the Medical Records 13.2.6. Dosage Errors 13.2.7. Robotic Surgeries 13.3. Cloud Computing in Healthcare Systems 13.4. Security Challenge in Smart Healthcare Conclusion References 14. Chapter 14.1. Introduction 14.1.1. Capturing storage techniques for healthcare data 14.1.2. About Healthcare Data 14.1.3. Data storage 14.1.4. Onsite data storage 14.1.5. Public cloud data storage 14.1.6. Hybrid cloud data storage solution 14.1.7. Benefits of storing data on the cloud from multiple sources 14.2. ML-enabled storage systems 14.3. The current state of technology 14.4. Enhancing existing Enterprise Data Warehouses (EDW) 14.5. Background work 14.6. ML techniques for treatment of healthcare data 14.7. Smart access techniques for storage systems 14.8. Prediction of diseases on healthcare data, both batch, and real-time data streams 197 Conclusion References 15. Chapter 15.1. Introduction 15.2. Smart Healthcare Tools and Techniques 15.2.1. Cloud Computing in Smart Healthcare 15.2.2. Medical Records Centralization 15.2.3. Promoting Patient Engagement 15.2.4. Better Scalability 15.2.5. Cost-Effectiveness 15.2.6. Advanced Analytics for Healthcare 15.3. Current and Future application of AI, IoT, Blockchain and Cloud Computing in Smart Healthcare . 210 15.3.1. Applications of Artificial Intelligence in Smart Healthcare 15.3.2. Machine learning neural networks and deep learning 15.3.3. Physical robots 15.3.4. Natural language processing (NLP) 15.3.5. Applications of Internet of Things (IoT) in Smart Healthcare 15.3.6. Applications of Blockchain in Smart Healthcare 15.3.7. Applications of Cloud Computing in Smart Healthcare 15.4. Challenges in Smart Healthcare 15.4.1. Availability 15.4.2. Data Centralization 15.4.3. Privacy/Security 15.4.4. Open Access 15.5. Future of Smart Healthcare and Telemedicine Conclusion References

    1 in stock

    £134.99

  • Provable and Practical Security: 16th

    Springer International Publishing AG Provable and Practical Security: 16th

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11–12,2022. The 15 full papers and 4 short papers were presented carefully reviewed and selected from 52 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Encryption; Lattice Based Cryptography; Information Security; Blockchain; and Foundations.Table of ContentsEncryption.- A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test.- Secure-Channel Free Certificateless Searchable Public key Authenticated Encryption with Keyword Search.- More Efficient Verifiable Functional Encryption.- Subverting Deniability.- Epoch Confidentiality in Updatable Encryption.- Lattice Based Cryptography.- Simplified Server-Aided Revocable Identity-Based Encryption from Lattices.- Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask.- Batched Fully Dynamic Multi-key FHE from FHEW-like Cryptosystems.- Zero-knowledge Range Arguments for Signed Fractional Numbers from Lattices.- Information Security.- Fast Out-of-band Data Integrity Monitor to Mitigate Memory Corruption Attacks.- Construction of a New UAV Management System based on UMIA Technology.- FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning.- Practical Federated Learning for Samples with Different IDs.- Blockchain.- Reinforcement-Mining: Protecting Reward in Selfish Mining.- FolketID: A Decentralized Blockchain-based NemID Alternative against DDosS Attacks.- Secure Collaboration between Consortiums in Permissioned Blockchains.- Foundations.- (Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge.- Practical Non-Malleable Codes from Symmetric-key Primitives in 2-Split-State Model.- Cryptographic Role-Based Access Control, Reconsidered.

    1 in stock

    £47.49

  • Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part III

    Springer International Publishing AG Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part III

    Out of stock

    Book SynopsisThe three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.Table of ContentsVerifiable Private Information Retrieval.- Random-Index Oblivious RAM.- On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR.- Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions.- One-Time Programs from Commodity Hardware.- Universal Reductions: Reductions Relative to Stateful Oracles.- Permissionless Clock Synchronization with Public Setup.- Beyond Uber: Instantiating Generic Groups via PGGs.

    Out of stock

    £47.49

  • Advances in Cryptology – ASIACRYPT 2022: 28th

    Springer International Publishing AG Advances in Cryptology – ASIACRYPT 2022: 28th

    1 in stock

    Book SynopsisThe four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.Table of ContentsIsogeny Based Cryptography.- Homomorphic Encryption.- NIZK and SNARKs.- Non Interactive Zero Knowledge.- and Symmetric Cryptography.

    1 in stock

    £75.99

  • Digital Forensics and Watermarking: 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers

    Springer International Publishing AG Digital Forensics and Watermarking: 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers

    Out of stock

    Book SynopsisThis book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022. The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking.Table of ContentsSteganology.- High-Performance Steganographic Coding Based on Sub-Polarized Channel.- High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC.- Forensics and Security Analysis.- SE-ResNet56: Robust Network Model for Deepfake Detection.- Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder.- Visual Explanations for Exposing Potential Inconsistency of Deepfakes.- Improving the Transferability of Adversarial Attacks through Both Front and Rear Vector Method.- Manipulated Face Detection and Localization Based on Semantic Segmentation.- Deep Learning Image Age Approximation - What is more Relevant: Image Content or Age Information?.- Watermarking.- Physical Anti-Copying Semi-Robust Random Watermarking for QR Code.- Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability.- Adaptive Robust Watermarking Method Based on Deep Neural Networks.- Adaptive Despread Spectrum-Based Image Watermarking for Fast Product Tracking.- Reversible Data Hiding via Arranging Blocks of Bit-Planes in Encrypted Images.- High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology.

    Out of stock

    £47.49

  • Smart Card Research and Advanced Applications: 21st International Conference, CARDIS 2022, Birmingham, UK, November 7–9, 2022, Revised Selected Papers

    Springer International Publishing AG Smart Card Research and Advanced Applications: 21st International Conference, CARDIS 2022, Birmingham, UK, November 7–9, 2022, Revised Selected Papers

    Out of stock

    Book SynopsisThis book constitutes the proceedings of the 21st International Conference on Smart Card Research and Advanced Applications, CARDIS 2022, which took place in November 2022. The conference took place in Birmingham, United Kingdom. The 15 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: physical attacks; physical countermeasures; protecting AES; evaluation methodologies; attacking NTRU; next-generation cryptography.Table of Contents​Physical Attacks.- Time’s a Thief of Memory: Breaking Multi-tenant Isolation in TrustZones through Timing based Bidirectional Covert Channels.- Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing.- A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters.- Physical Countermeasures.- A Nearly Tight Proof of Duc et al.s Conjectured Security Bound for Masked Implementations.- Short-Iteration Constant-Time GCD and Modular Inversion.- Protecting AES.- Guarding the First Order: The Rise of AES Maskings.- Rivain-Prouff on Steroids: Faster and Stronger Masking of the AES.- Self-Timed Masking: Implementing Masked S-Boxes Without Registers.- Evaluation Methodologies.- An Evaluation Procedure for Comparing Clock Jitter Measurement Methods.- Comparing Key Rank Estimation Methods.- Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling.- Attacking NTRU.- Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU.- Security Assessment of NTRU Against Non-Profiled SCA.- Next-Generation Cryptography.- Post-Quantum Protocols for Banking Applications.- Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists.

    Out of stock

    £47.49

  • Quantenkommunikationsnetze

    Springer Fachmedien Wiesbaden Quantenkommunikationsnetze

    1 in stock

    Book SynopsisDieses Buch bietet ein Tutorial über Quantenkommunikationsnetze. Die Autoren erörtern aktuelle Paradigmenwechsel in Kommunikationsnetzen, die erforderlich sind, um die einfachen Transportkonzepte der vorherrschenden Netze um Rechen- und Speicherfunktionen zu ergänzen. Sie zeigen, wie diese "softwarisierten" Lösungen neue Wege beschreiten, um Latenzzeiten zu reduzieren und die Ausfallsicherheit zu erhöhen. Die Autoren erörtern, wie diese Lösungen trotz der ihnen innewohnenden Probleme aufgrund der eingeführten Rechenlatenz und des Energieverbrauchs durch hybride klassisch-quantische Kommunikationsnetze gelöst werden können. Das Buch bringt Quantennetzwerke, Quanteninformationstheorie, Quantencomputer und Quantensimulation zusammen.Table of ContentsEinführung.- Grundlegender Hintergrund.- Quantencomputing und Programmierung.- Quanteninformationstheorie.- Quantenfehlerkorrektur.- Quantenkommunikationsnetze- Quantenkommunikationsnetze: Entwurf und Simulation.- Quantenkommunikationsnetze: Abschließende Betrachtungen und Anwendungsfälle.

    1 in stock

    £85.49

  • Code-Based Cryptography: 10th International

    Springer International Publishing AG Code-Based Cryptography: 10th International

    5 in stock

    Book SynopsisThis book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway.The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all aspects of code-based cryptography, from design to software and hardware implementations, works about recent NIST PQC standardization candidates, side channel analysis, and improved decoding techniques.Table of ContentsDistinguishing and Recovering Generalized Linearized ReedSolomon Codes.- Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation.- Key-Recovery Fault Injection Attack on the Classic McEliece KEM.- Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC.- Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes.- On Decoding High-Order Interleaved Sum-Rank-Metric Codes.- Information Set Decoding for Lee-Metric Codes using Restricted Balls.- Cryptanalysis of IvanovKroukZyablov cryptosystem

    5 in stock

    £42.74

  • Progress in Cryptology - AFRICACRYPT 2023: 14th

    Springer International Publishing AG Progress in Cryptology - AFRICACRYPT 2023: 14th

    Out of stock

    Book SynopsisThis volume contains the papers accepted for presentation at Africacrypt 2023, the 14th International Conference on the Theory and Application of Cryptographic Techniques in Africa. The 21 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Post-quantum cryptography; Symmetric cryptography; Cryptanalysis; Blockchain; Lattice-based cryptography; Implementations; Theory. Table of Contents​Post-quantum cryptography.- MinRank in the Head: Short Signatures from Zero-Knowledge Proofs.- Take your MEDS: Digital Signatures from Matrix Code Equivalence.- Efficient computation of (3^n,3^n)-isogenies.- On the Post-Quantum Security of Classical Authenticated Encryption Schemes.- A Side-Channel Attack against Classic McEliece when loading the Goppa Polynomial.- Symmetric cryptography.- Universal hashing based on field multiplication and (near-)MDS matrices.- Invertible Quadratic Non-Linear Functions over F_p^n via Multiple Local Maps.- Poseidon2: A Faster Version of the Poseidon Hash Function.- From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers.- Cryptanalysis.- The special case of cyclotomic fields in quantum algorithms for unit groups.- Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant.- Blockchain.- The curious case of the half-half Bitcoin ECDSA nonces.- Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality.- Lattice-based cryptography.- ComBo: a Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain.- Concrete Security from Worst-Case to Average-Case Lattice Reductions.- Finding and Evaluating Parameters for BGV.- Quantum Search-to-Decision Reduction for the LWE Problem.- Implementations.- Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions.- Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7.- Theory.- Impossibilities in Succinct Arguments: Black-box Extraction and More.- Applications of Timed-release Encryption with Implicit Authentication.

    Out of stock

    £69.99

  • Advances in Cryptology – CRYPTO 2023: 43rd Annual

    Springer International Publishing AG Advances in Cryptology – CRYPTO 2023: 43rd Annual

    1 in stock

    Book SynopsisThe five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

    1 in stock

    £85.49

  • Stabilization, Safety, and Security of

    Springer International Publishing AG Stabilization, Safety, and Security of

    1 in stock

    Book SynopsisThis book constitutes the proceedings of 25th International Symposium, SSS 2023, in Jersey City, NJ, USA, in October 2023.The 32 full papers presented together with 8 short papers were carefully reviewed and selected from 78 submissions. The conference was organized into five tracks reflecting major trends related to the conference: (i) Track A. Self-stabilizing Systems: Theory and Practice, (ii) Track B. Distributed and Concurrent Computing: Foundations, Fault-Tolerance and Scalability, (iii) Track C. Cryptogrophy and Security, (iv) Track D. Dynamic, Mobile and Nature-Inspired Computing Mobile Agents, (v) and Distributed Databases.Table of ContentsDistributed computing methodologies.- Software fault tolerance.- Ad hoc networks.- Security and privacy.- Software safety.- Software reliability.- Mobile networks.- Dependable and fault-tolerant systems and networks.- Concurrent computing methodologies.

    1 in stock

    £66.49

  • Provable and Practical Security: 17th

    Springer International Publishing AG Provable and Practical Security: 17th

    3 in stock

    Book SynopsisThis volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.Table of Contents​Fundamentals & Cryptographic Primitives.- Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement.- Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation.- Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections.- Cryptanalysis.- Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMs.- Linear Cryptanalysis of Lightweight Block Cipher WARP.- Linicrypt in the Ideal Cipher Model.- Signature.- SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBC.- Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications.- A Certificateless Aggregate Signature Scheme with Better Security.- Constant-size Group Signatures with Message-Dependent Opening from Lattices.- Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions.- Threshold Ring Signature Scheme from Cryptographic Group Action.- Encryption.- Homomorphic Witness Encryption from Indistinguishable Obfuscation.- Identity-based Matchmaking Encryption Secure against Key Generation Center.- Multi-Input Functional Encryption for Unbounded Inner Products.- FleS: a compact and parameter-flexible supersingular isogeny based public key encryption scheme.- A New Revocable Attribute Based Encryption on Lattice.- An efficient keyword-based ciphertext retrieval scheme.- Privacy Preservation.- Privacy Preserving Outsourced K-means Clustering using Kd-tree.- Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency.- A Privacy-Preserving Takeaway Delivery Service Scheme.- Blockchain Security.- CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest.- simuBits: Pool Security Verification of Novel Mining Attacks.

    3 in stock

    £61.74

  • Code-Based Cryptography: 11th International

    Springer International Publishing AG Code-Based Cryptography: 11th International

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 11th International Conference on Code-Based Cryptography, CBCrypto 2023, held in Lyon, France, during April 22–23, 2023. The 8 full papers included in this book were carefully reviewed and selected from 28 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms.

    1 in stock

    £42.74

  • Theory of Cryptography: 21st International

    Springer International Publishing AG Theory of Cryptography: 21st International

    1 in stock

    Book SynopsisThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. Table of ContentsProofs and outsourcing.- theoretical foundations.- multi-party computation.

    1 in stock

    £66.49

  • Theory of Cryptography: 21st International

    Springer International Publishing AG Theory of Cryptography: 21st International

    1 in stock

    Book SynopsisThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. Table of ContentsMulti-party computation.- encryption.- secret sharing, PIR and memory.

    1 in stock

    £61.74

  • Theory of Cryptography: 21st International

    Springer International Publishing AG Theory of Cryptography: 21st International

    1 in stock

    Book SynopsisThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. Table of ContentsAnonymity, surveillance and tampering; lower bounds; IOPs and succinctness.

    1 in stock

    £66.49

  • Theory of Cryptography: 21st International

    Springer International Publishing AG Theory of Cryptography: 21st International

    3 in stock

    Book SynopsisThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. Table of ContentsLattices.- quantum cryptography.- group-based cryptography.- Byzantine agreement, consensus and composability.

    3 in stock

    £66.49

  • PublicKey Cryptography  PKC 2024

    Springer Nature Switzerland PublicKey Cryptography PKC 2024

    1 in stock

    Book Synopsis

    1 in stock

    £104.49

  • PublicKey Cryptography  Pkc 2024

    Springer Nature Switzerland PublicKey Cryptography Pkc 2024

    3 in stock

    Book Synopsis

    3 in stock

    £104.49

  • PublicKey Cryptography  Pkc 2024

    Springer Nature Switzerland PublicKey Cryptography Pkc 2024

    1 in stock

    Book Synopsis

    1 in stock

    £104.49

  • BlockchainBased Internet of Things

    Springer BlockchainBased Internet of Things

    1 in stock

    Book SynopsisIntroduction.- Architecture of BIoT.- Transaction Migration Scheme for BIoT.- Lightweight Consensus Mechanism for BIoT.- Prototype Implementation of BIoT.- Conclusion and Outlook.

    1 in stock

    £40.49

  • Distributed Denial of Service Attacks: Concepts,

    1 in stock

    £88.50

  • Informatik: Aufgaben und Lösungen

    Springer Verlag GmbH Informatik: Aufgaben und Lösungen

    Out of stock

    Book SynopsisDiese Aufgabensammlung stellt eine sinnvolle Ergänzung zum Lehrbuch "Informatik" von Blieberger et al. dar, das mittlerweile in der 4. Auflage erschienen ist. Ziel der Aufgabensammlung ist es, durch das Lösen von Aufgaben den angebotenen Stoff zu vertiefen und zugleich anhand der Lösungen die eigene Bearbeitung zu überprüfen. Den Aufgaben und Lösungen zu den einzelnen Kapiteln werden jeweils Zusammenfassungen des Stoffes vorangestellt, die das Buch auch unabhängig vom Lehrbuch verwendbar machen.Table of ContentsInformationstheorie,-Codierungstheorie,-Datenübertragungsverfahren,-Zahlendarstellungen,-Numerik,-Algorithmen,-Boolesche Algebra,-Fuzzy-Logik

    Out of stock

    £17.26

  • Foundations and Practice of Security: 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers

    Springer International Publishing AG Foundations and Practice of Security: 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers

    15 in stock

    Book SynopsisThis book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of Security, FPS 2013, held in La Rochelle, France, in October 2013. The 25 revised full papers presented together with a keynote address were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on security protocols, formal methods, physical security, attack classification and assessment, access control, cipher attacks, ad-hoc and sensor networks, resilience and intrusion detection.Table of ContentsOn the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case.- On the Feasibility of a Censorship Resistant Decentralized Naming System.- A General Framework for Group Authentication and Key Exchange Protocols.- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange.- Model-Based Specification and Validation of Security and Dependability Patterns.- Enforcing Information Flow by Combining Static and Dynamic Analysis.- Fault Injection to Reverse Engineer DES-like Cryptosystems.- Software Camouflage.- Investigation of Parameters Influencing the Success of Optical Fault Attacks.- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework.- Quantitative Evaluation of Enforcement Strategies.- Collusion Resistant Inference Control for Cadastral Databases.- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model.- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations.- Computational Soundness of Symbolic Blind Signatures under Active Attacker.- Improved Davies-Murphys Attack on DES Revisited.- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts.- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs.- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks.- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs.- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.- Evaluation of Software-Oriented Block Ciphers on Smartphones.- Don’t Push it: Breaking iButton Security.- Discovering Flaws in IDS through Analysis of their Inputs.- On the Reverse Engineering of the Citadel Botnet.- The Carna Botnet Through the Lens of a Network Telescope.

    15 in stock

    £42.74

  • Symmetrische Verschlüsselungsverfahren: Design,

    Springer Fachmedien Wiesbaden Symmetrische Verschlüsselungsverfahren: Design,

    1 in stock

    Book SynopsisEnigma und Lucifer-Chiffre: das spannende Lehrbuch zur Kryptographie mit Online-Service. Es wird detailliert beschrieben, was bei der Entwicklung eines symmetrischen Kryptosystems - das den heutigen Anforderungen entspricht - zu berücksichtigen ist. Dazu wird insbesondere die differentielle und die lineare Kryptoanalyse ausführlich erklärt.Table of ContentsKryptoanalyse klassischer Chiffrierverfahren - Die Kryptoanalyse der 'Enigma'-Chiffre - Shannons Theorie der Kryptosysteme - Lucifer-Chiffre und der Data Encryption Standard - Differentielle Kryptoanalyse - Lineare Kryptoanalyse - Advanced Encryption Standard - Mathematische Grundlagen

    1 in stock

    £34.19

  • Blockchain für Dummies

    Wiley-VCH Verlag GmbH Blockchain für Dummies

    Out of stock

    Book SynopsisDie Blockchain-Technologie verspricht, den Finanzmarkt, die Versicherungsbranche, das Supply-Chain-Management und andere Branchen zu revolutionieren. Aber Sie müssen kein Tech-Nerd sein, um die Blockchain zu verstehen. Dieses Buch erklärt die Grundlagen und wichtige Anwendungen wie Kryptowährungen und Smart Contracts. Reale Beispiele machen deutlich, wie Blockchains funktionieren und wo ihr Mehrwert liegt. Erstellen Sie eine eigene Blockchain, schauen Sie sich die wichtigsten Blockchain-Anbieter an, erkennen Sie das Disruptionspotenzial für eingesessene Industrien und vieles mehr.Table of ContentsÜber die Autorin 9 Einführung 19 Über dieses Buch 19 Törichte Annahmen über den Leser 20 Symbole in diesem Buch 20 Wie es von hier aus weitergeht 20 Teil I Erste Schritte Mit Blockchains 21 Kapitel 1 Blockchain – eine Einführung 23 Von Anfang an: Was sind Blockchains? 23 Was Blockchains können 24 Warum Blockchains so wichtig sind 25 Blockchain-Struktur 26 Blockchain-Anwendungen 28 Der Blockchain-Lebenszyklus 28 Konsens: Die treibende Kraft der Blockchains 29 Blockchains in der Praxis 31 Derzeitige Anwendungen für Blockchains 31 Blockchain-Anwendungen der Zukunft 32 Kapitel 2 Eine Blockchain auswählen 33 Wo Blockchains für Mehrwert sorgen 33 Anforderungen bestimmen 34 Ihr Ziel definieren 35 Eine Lösung auswählen 36 Einen Entscheidungsbaum für eine Blockchain zeichnen 37 Einen Plan machen 38 Kapitel 3 Einstieg in Blockchain 41 Die Blockchain-Technologie 42 Eine sichere Umgebung einrichten 42 Zum ersten Mal Bitcoin kaufen 45 Kryptowährungen absichern und handeln 46 Jaxx herunterladen 46 Die Jaxx-Wallet absichern 47 Bitcoin in die Jaxx-Wallet transferieren 48 Bitcoin in Ether umtauschen 48 Guthaben in die MetaMask-Wallet transferieren 49 Ein CryptoKitties-Benutzerkonto anlegen 49 Eine private Blockchain mit Docker und Ethereum erstellen 52 Ihren Computer vorbereiten 52 Ihre Blockchain erstellen 54 Teil II Ihr Wissen Erweitern 57 Kapitel 4 Die Bitcoin-Blockchain kennenlernen 59 Eine kurze Geschichte der Bitcoin-Blockchain 60 Der neue Bitcoin: Bitcoin Cash 62 Häufige Missverständnisse über Bitcoin 64 Bitcoin: Der neue wilde Westen 65 Fake-Websites 65 Nein, Sie zuerst! 66 Schnell-reich-werden-Geschichten 66 Bitcoin-Mining 66 Ihre erste Paper-Wallet 68 Kapitel 5 Die Ethereum-Blockchain entdecken 71 Die kurze Geschichte von Ethereum 71 Ethereum: Der Open-Source-Weltcomputer 73 Dezentralisierte Anwendungen: Willkommen in der Zukunft 74 Die Macht der DAOs 74 Eine Blockchain hacken 77 Smart Contracts verstehen 77 Die Kryptowährung Ether 78 Ether-Mining 78 Die Zukunft der dezentralen autonomen Organisationen (DAOs) 79 Geld in eine DAO stecken 79 Intelligentere Smart Contracts erstellen 80 Bugs im System erkennen 80 Ihre eigenen ERC20-Token erstellen 81 Ihr GitHub-Konto einrichten 81 KETH über das Gitter Faucet anfordern 81 Ihr Token erstellen 82 Kapitel 6 Die Waves-Blockchain 87 Wie unterscheidet sich die Waves-Blockchain von anderen Blockchains? 87 Die volle Leistung von Waves ausschöpfen 89 Die Waves-Wallet einrichten 89 Ihre Wallet sichern 90 Die Wallet-Funktionen entdecken 91 Krypto-Assets transferieren 91 Eine dezentrale Börse verwenden 92 Ihre eigene Kryptowährung erstellen und verleihen 94 Kapitel 7 Die Factom-Blockchain 97 Eine Frage des Vertrauens 97 Der Zweck der Factom-Blockchain: Beliebige Daten veröffentlichen 99 Anreize für den Zusammenschluss 100 Anwendungen auf Factom aufbauen 102 Mit APIs Dokumente authentifizieren und Identitäten erstellen 102 Factoid: Keine normale Kryptowährung 103 Anwendungen und Factom im Zusammenspiel 103 Auf Factom veröffentlichen 104 Transparenz in der Hypothekenbranche schaffen 104 Überprüfung physischer Dokumente: dLoc mit Factom 106 Kapitel 8 Die EOS-Blockchain 109 EOS kennenlernen 109 Die Evolution des Minings 111 Die 21 Block-Producer 112 EOS-Blockproduzenten wählen 113 Das Greymass-Voting-Tool einrichten 114 Einen Blockproduzenten auswählen 114 Die EOS-DApp-Sammlung 115 Everipedia: Die Enzyklopädie der nächsten Generation 116 Dezentrale EOS-Spiele 117 Teil III Leistungsstarke Blockchain-Plattformen 119 Kapitel 9 Hyperledger 121 Hyperledger kennenlernen 122 Wichtige Hyperledger-Projekte 123 Fabric 123 Das Iroha-Projekt 123 Sawtooth Lake 125 Ein eigenes System in Fabric erstellen 127 Vermögenswerte mit Hyperledger Composer verfolgen 127 Smart-Contracts auf Hyperledger verwenden 130 Kapitel 10 Microsoft Azure 137 Bletchley: Die modulare Blockchain-Struktur 137 Cryptlets für die Verschlüsselung und Authentifizierung 139 Utility- und Contract-Cryplets und CryptoDelegates 140 Entwicklung im Azure-Ökosystem 141 Die ersten Schritte mit Chain auf Azure 142 Installation des verteilten Ledgers von Chain 143 Ein eigenes privates Netzwerk erstellen 143 Finanzdienstleistungen von Azure Chain nutzen 144 Bereitstellung von Blockchain-Tools auf Azure 144 Ethereum auf Azure 144 Cortana: Ihr Tool für analytisches maschinelles Lernen 145 Mit Power BI Daten visualisieren 145 Verwaltung Ihrer Vermögenswerte mit Active Directory von Azure 146 Kapitel 11 IBM Bluemix 147 Unternehmens-Blockchains auf Bluemix 147 Ihre isolierte Umgebung 148 Anwendungsfälle für Bluemix 149 Die intelligente Watson-Blockchain 150 Ihr erstes Netzwerk auf Big Blue 152 Teil IV Auswirkungen Auf Die Wirtschaft 155 Kapitel 12 Finanztechnologie 157 Holen wir die Kristallkugel heraus: Banking-Trends der Zukunft 157 Geld schneller und über Grenzen hinweg bewegen 159 Einen permanenten Verlauf erstellen 160 Es wird international: Globale Finanzprodukte 161 Grenzüberschreitende Gehaltszahlungen 162 Schnellerer und besserer Handel 163 Garantierte Zahlungen 163 Mikrozahlungen: Die neue Transaktionsform 164 Dem Betrug ein Ende setzen 164 Kapitel 13 Immobilien 167 Wegfall der Rechtstitelversicherung 167 Kosten senken 168 Fannie Mae und die Verbraucher 170 Hypotheken in der Blockchain-Welt 170 Reduzierung der Bearbeitungsgebühren 171 Das letzte bekannte Dokument finden 171 Regionale Trends vorhersehen 172 USA und Europa: Engstellen in der Infrastruktur 172 China: Als Erster im Rennen 174 Entwicklungsländer: Hürden für Blockchains 174 Kapitel 14 Versicherungen 177 Präziser, maßgeschneiderter Versicherungsschutz 177 Individuelle Versicherung 178 Die neue Welt der Mikroversicherungen 179 Das Internet der Dinge als vertrauenswürdige Datenquelle 180 IoT-Projekte in der Versicherung 180 Auswirkungen von Big Data 181 Wegfall der Drittpartei bei Versicherungen 181 Dezentrale Sicherheit 182 Abdeckung durch Crowdfunding 182 Auswirkungen der DAO-Versicherung 183 Kapitel 15 Regierung 185 Die intelligenten Städte Asiens 185 Singapurs Satellitenstädte in Indien 186 Das chinesische Big-Data-Problem 188 Der Kampf um das Finanzkapital der Welt 188 Londons früher Weitblick 189 Die regulatorische Sandbox Singapurs 190 Die Initiative Dubai 2020 191 Das Bitlicense-Regelwerk: New York City 192 Die freundliche Gesetzesstruktur von Malta 193 Sicherung der Grenzen auf der ganzen Welt 194 Das US-Ministerium für innere Sicherheit und die Identität von Gegenständen 194 Ausweise der Zukunft 195 Die neue Geburtsurkunde 195 Kapitel 16 Weitere Branchen 197 Schlanke Regierungen 197 Das Smart-Nation-Projekt in Singapur 198 e-Residency in Estland 198 Bessere Beurkundung in China 200 Die Vertrauensebene für das Internet 200 Spamfreie E-Mail 200 Im Besitz der eigenen Identität 201 Blockchain-Orakel 202 Vertrauenswürdige Verfasser 202 Recht auf geistiges Eigentum 203 Teil V Der Top-Ten-Teil 205 Kapitel 17 (Ungefähr) zehn kostenlose Blockchain-Ressourcen 207 Ethereum 207 DigiKnow 208 Blockchain University 208 Bitcoin Core 208 Blockchain Alliance 208 Multichain Blog 209 HiveMind 209 Smith + Crown 209 Die Podcast-Reihen Unchained und Unconfirmed 210 Kapitel 18 Zehn Blockchain-Regeln, die Sie niemals brechen dürfen 211 Verwenden Sie Kryptowährungen oder Blockchains nicht, um das Gesetz zu umgehen 211 Halten Sie Ihre Contracts so einfach wie möglich 212 Veröffentlichungen nur mit größter Vorsicht 213 Sichern Sie Ihre privaten Schlüssel! Unbedingt! 213 Überprüfen Sie Adressen dreimal, bevor Sie Geld senden 215 Seien Sie vorsichtig bei der Verwendung von Börsen 215 Hüten Sie sich vor WLAN 216 Wählen Sie Ihren Blockchain-Entwickler sorgfältig aus 216 Lassen Sie sich nicht entmutigen 216 Handeln Sie keine Token, wenn Sie nicht wissen, was Sie tun 217 Kapitel 19 Zehn herausragende Blockchain-Projekte 219 Das R3-Konsortium 219 T ZERO: Blockchains am Aktienmarkt 220 Verteilte Systeme von Blockstream 221 MadHive 222 Blockdaemon 222 Gemini-Dollar und -Börse 222 Decentraland 223 TransferWise 223 Lightning Network 224 Bitcoin Cash 224 Stichwortverzeichnis 225

    Out of stock

    £18.99

  • Krypto-Mining für Dummies

    Wiley-VCH Verlag GmbH Krypto-Mining für Dummies

    Out of stock

    Book SynopsisKryptowährungen versprechen schnelles Geld und Reichtum. Anders als die Goldsucher im vorletzten Jahrhundert brauchen Sie als Investor aber sehr viel mehr technisches Know-how, um in das Krypto-Mining einzusteigen. Dieses Buch wurde von zwei Insidern geschrieben. Sie erläutern, welche Hard- und Software Sie brauchen und wie Sie bei der Gewinnung von Bitcoin, Ethereum, Monero, LiteCoin und Dash am besten vorgehen - und zwar so, dass Sie der Konkurrenz voraus sind und Ihren Return on Investment maximieren.Table of ContentsÜber die Autoren 11 Einleitung 23 Teil I: Erste Schritte mit Krypto-Mining 27 Kapitel 1: Kryptowährungen kurz erklärt 29 Kapitel 2: Krypto-Mining verstehen 49 Kapitel 3: Die Reise der Transaktion zur Blockchain 57 Kapitel 4: Die Arten und Wege des Minings 71 Teil II: Die Evolution des Krypto-Minings 89 Kapitel 5: Die Evolution des Minings 91 Kapitel 6: Die Zukunft des Krypto-Minings 101 Teil III: Ein Krypto-Miner werden 113 Kapitel 7: Mining leicht gemacht: Einen Pool finden und ein Benutzerkonto einrichten 115 Kapitel 8: Eine Kryptowährung auswählen 137 Kapitel 9: Die Ausrüstung zusammenstellen 163 Kapitel 10: Die Mining-Hardware einrichten 183 Teil IV: Betriebswirtschaftliche Aspekte des Minings 209 Kapitel 11: Rechnen Sie nach: Lohnt es sich? 211 Kapitel 12: Kosten senken: Immer einen Schritt voraus 235 Kapitel 13: Ihr Kryptowährungs-Business betreiben 253 Teil V: Der Top-Ten-Teil 273 Kapitel 14: Etwa zehn Tipps für den Fall, dass der Markt einbricht 275 Kapitel 15: Zehn Möglichkeiten zur Steigerung der Kapitalrendite 293 Kapitel 16: Zehn Arten von Kryptowährungs-Ressourcen 303 Kapitel 17: Zehn Kritikpunkte an Kryptowährungen und am Mining 309 Abbildungsverzeichnis 321 Stichwortverzeichnis 327

    Out of stock

    £22.46

  • Kryptografie für Dummies

    John Wiley & Sons Inc Kryptografie für Dummies

    3 in stock

    Book SynopsisKryptografie ist ein wichtiges Mittel um IT-Systeme zu schützen. Sie ermöglicht nicht nur die Verschlüsselung von Nachrichten, sondern auch digitale Unterschriften, die Authentifizierung und die Anonymisierung von Kommunikationspartnern. Das hier vorliegende Buch ist eine Einführung in die Kryptografie für Studierende ? von der symmetrischen über die asymmetrische Verschlüsselung bis hin zu Hash-Funktionen. Mit Übungsaufgaben und Lösungen können Sie Ihr frisch erworbenes Wissen überprüfen und festigen. So ist dieses Buch umfassend, keinesfalls oberflächlich, aber ohne Vorwissen verständlich.Table of ContentsÜber den Autor 7 Einleitung 21 Teil I: Verschlüsseln 29 Kapitel 1: Sicherheit in Zeiten des Internet 31 Kapitel 2: Klassische Verschlüsselung 37 Kapitel 3: Public-Key-Verschlüsselung 51 Teil II: Kryptische Mathematik 61 Kapitel 4: Menge, Relation, Abbildung 63 Kapitel 5: Teilbarkeit und Modulo-Rechnung 67 Kapitel 6: Gruppe 77 Teil III: Kryptografische Verfahren 89 Kapitel 7: RSA: Korrektheit und Schlüsselerzeugung 91 Kapitel 8: Diffie-Hellman, ElGamal und Shamir 99 Kapitel 9: AES-Verschlüsselungsverfahren 111 Kapitel 10: AES-Mathematik: Rechnen in einem Körper 123 Kapitel 11: Diffie-Hellman-Schlüsselvereinbarung mit elliptischer Kurve 133 Teil IV: Berechnungsverfahren 141 Kapitel 12: Python-Einführung 143 Kapitel 13: Erweiterter euklidischer Algorithmus 149 Kapitel 14: Schnelle Exponentiation und Primzahltest 159 Kapitel 15: Chinesischer Restsatz 171 Kapitel 16: Elliptische Kurven implementieren 179 Kapitel 17: Kryptografische Verfahren implementieren 187 Teil V: Authentifizieren 193 Kapitel 18: Kryptografische Hashfunktion 195 Kapitel 19: Authentizität und Integrität von Nachrichten 207 Kapitel 20: Digitale Signatur 215 Kapitel 21: Teilnehmer-Authentifizierung 225 Teil VI: Sicherheit 237 Kapitel 22: Angriffe auf das RSA-Verfahren 239 Kapitel 23: Faktorisierungsangriff 251 Kapitel 24: Angriffe auf Hashfunktionen 261 Teil VII: Zufall 267 Kapitel 25: Zufallsbits und Pseudozufallsbits 269 Kapitel 26: Kryptografisch sichere Zufallsbits 275 Teil VIII: Anwendungen 281 Kapitel 27: Zertifizierte Sicherheit 283 Teil IX: Top-Ten-Teil 291 Kapitel 28: Die glorreichen Sieben 293 Anhang 307 Anhang A: Zum Weiterlesen 309 Anhang B: Lösungen zu den Übungsaufgaben 311 Literaturverzeichnis 323 Abbildungsverzeichnis 325 Stichwortverzeichnis 329

    3 in stock

    £21.38

  • Sequences and Their Applications – SETA 2006: 4th

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Sequences and Their Applications – SETA 2006: 4th

    15 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 4th International Conference on Sequences and Their Applications, SETA 2006. The book presents 32 revised full papers together with 4 invited lectures. The papers are organized in topical sections on linear complexity of sequences, correlation of sequences, stream ciphers and transforms, topics in complexities of sequences, multi-sequence synthesis, sequences and combinatorics, FCSR sequences, aperiodic correlation and applications, and boolean functions, and more.Table of ContentsInvited Papers.- Shift Register Sequences – A Retrospective Account.- The Probabilistic Theory of the Joint Linear Complexity of Multisequences.- Multi-Continued Fraction Algorithms and Their Applications to Sequences.- Codes for Optical CDMA.- Linear Complexity of Sequences.- On the Linear Complexity of Sidel’nikov Sequences over .- Linear Complexity over F p of Ternary Sidel’nikov Sequences.- Bounds on the Linear Complexity and the 1-Error Linear Complexity over F p of M-ary Sidel’nikov Sequences.- The Characterization of 2 n -Periodic Binary Sequences with Fixed 1-Error Linear Complexity.- Correlation of Sequences.- Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation.- Extended Hadamard Equivalence.- Analysis of Designing Interleaved ZCZ Sequence Families.- Stream Ciphers and Transforms.- Security of Jump Controlled Sequence Generators for Stream Ciphers.- Improved Rijndael-Like S-Box and Its Transform Domain Analysis.- Topics in Complexities of Sequences.- Nonlinear Complexity of Binary Sequences and Connections with Lempel-Ziv Compression.- On Lempel-Ziv Complexity of Sequences.- Computing the k-Error N-Adic Complexity of a Sequence of Period p n .- On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.- Linear/Nonlinear Feedback Shift Register Sequences.- On the Classification of Periodic Binary Sequences into Nonlinear Complexity Classes.- Sequences of Period 2 N –2.- A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences.- Multi-sequence Synthesis.- Implementation of Multi-continued Fraction Algorithm and Application to Multi-sequence Linear Synthesis.- The Hausdorff Dimension of the Set of r-Perfect M-Multisequences.- Filtering Sequences and Pseudorandom Sequence Generators.- Lower Bounds on Sequence Complexity Via Generalised Vandermonde Determinants.- Construction of Pseudo-random Binary Sequences from Elliptic Curves by Using Discrete Logarithm.- On the Discrepancy and Linear Complexity of Some Counter-Dependent Recurrence Sequences.- Sequences and Combinatorics.- Nonexistence of a Kind of Generalized Perfect Binary Array.- FCSR Sequences.- On the Distinctness of Decimations of Generalized l-Sequences.- On FCSR Memory Sequences.- Periodicity and Distribution Properties of Combined FCSR Sequences.- Aperiodic Correlation and Applications.- Generalized Bounds on Partial Aperiodic Correlation of Complex Roots of Unity Sequences.- Chip-Asynchronous Version of Welch Bound: Gaussian Pulse Improves BER Performance.- Boolean Functions.- On Immunity Profile of Boolean Functions.- Reducing the Number of Homogeneous Linear Equations in Finding Annihilators.- The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function.- Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions.- Construction of 1-Resilient Boolean Functions with Very Good Nonlinearity.

    15 in stock

    £42.74

  • Digitale Signatur: Grundlagen, Funktion und

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Digitale Signatur: Grundlagen, Funktion und

    15 in stock

    Book SynopsisDigitale Kommunikation dringt in immer mehr Bereiche privater und unternehmerischer Anwendungsfelder ein. Seit 1997 sind die gesetzlichen Rahmenbedingungen in Deutschland für rechtlich gesicherte Vorgänge im Internet geschaffen. Zentraler Bestandteil ist die digitale Signatur. Die Autoren erklären anschaulich und detailliert deren Konzept und Einsatzmöglichkeiten. Die Funktionen von Signatur, Trustcenter, Chipkarte und asymmetrischem Schlüsselverfahren werden dargestellt und durch zahlreiche Diagramme verdeutlicht. Die Informationen dienen als Entscheidungsgrundlage für den Einsatz der digitalen Signatur in Firmen, Institutionen und Behörden. Die Anwendungsbeispiele beziehen sich auf Business-to-Business- und Business-to-Customer-Beziehungen in Intranet und Internet. Das Werk wendet sich vor allem an Produzenten digitaler Medien sowie Entscheider in Wirtschaft und Verwaltung.Table of ContentsAusgangslage.- Konzept.- Zielsetzung.- Das Prinzip der digitalen Signatur.- Rechtliche Aspekte.- Europäische Entwicklung.- Internationale Entwicklungen.- Einsatzfelder.- Business-to-Business-Kommunikation.- Business-to-Customer-Kommunikation.- Intranet (firmeninterne Kommunikation).- Behördliche Kommunikation.- Gesetzesgrundlage.- Glossar.- Literaturverzeichnis.- Index.

    15 in stock

    £42.74

  • Personal Satellite Services: International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Personal Satellite Services: International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the International Conference on Personal Satellite Services (PSATS 2009) in Rome, Italy in March 2009. The 17 papers papers demonstrate recent advances in Internet applications over satellites, satellites technologies, and future satellite location-based systems.Table of ContentsAnalysing the Orbital Movement and Trajectory of LEO (Low Earth Orbit) Satellite Relative to Earth Rotation.- A Cross-Layer PEP for DVB-RCS Networks.- Triple Play over Satellite, Ka-Band Making the Difference.- Time Scheduling Based on Tradeoff between Detection Performance and QoS Requirement.- Study of the Quantum Channel between Earth and Space for Satellite Quantum Communications.- Spectral Analysis of Experimental Ka-Band Propagation Measurements over the Australian LEO Microsatellite ‘FedSat’.- Satellite Broadband Revolution: How Latest Ka-Band Systems Will Change the Rules of the Industry. An Interpretation of the Technological Trajectory.- Performance Enhanced Proxy Solutions for Satellite Networks: State of the Art, Protocol Stack and Possible Interfaces.- PEPsal Performance Analysis on Disruptive Radio Channels.- PEP Deployment and Bandwidth Management Issues.- High Altitude Platforms: Radio Resource Management Policy for MBMS Applications.- Frequency Tracking Performance Using a Hyperbolic Digital-Phase Locked Loop for Ka-Band Communication in Rain Fading Channels.- Design and Implementation of P2P Streaming Systems for Webcast.- Comparisons on Performances in MIMO Systems under Different Propagation Environments.- Combined Congestion Control and Link Selection Strategies for Delay Tolerant Interplanetary Networks.- Broadband Satellite Multimedia (BSM) Security Architecture and Interworking with Performance Enhancing Proxies.- A Satellite-Based Infrastructure Providing Broadband IP Services on Board High Speed Trains.

    1 in stock

    £40.49

  • Progress in Cryptology - INDOCRYPT 2010: 11th

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Progress in Cryptology - INDOCRYPT 2010: 11th

    Out of stock

    Book SynopsisStrong Pseudorandompermutations or SPRPs,which were introduced byLuby andRacko? [4], formalize the well established cryptographic notion ofblock ciphers.They provided a construction of SPRP, well known as LRconstruction, which was motivated by the structure of DES[6].The basicbuildingblock is the so called 2n-bit Feistel permutation (or LR round permutation) LR based F K on an n-bitpseudorandomfunction (PRF) F : K n LR (x ,x)=(F (x )?x ,x ),x ,x?{0,1} . F 1 2 K 1 2 1 1 2 K Theirconstruction consists (see Fig 1) offour rounds of Feistel permutations (or three rounds, for PRP), each round involves an application ofanindependent PRF(i.e.with independentrandomkeys K ,K ,K , and K ). More precisely, 1 2 3 4 LR and LR are PRP and SPRP respectively where K ,K ,K K ,K ,K ,K 1 2 3 1 2 3 4 LR := LR := LR (...(LR (*))...). K ,...,K F ,...,F F F 1 r K K K K r r 1 1 After this work, many results are known improvingperformance (reducingthe number of invocations of F )[5] and reducingthekey-sizes (i.e. reusingthe K roundkeys [7,8,10,12,11] orgenerate more keysfromsinglekey by usinga PRF[2]). However there are some limitations.Forexample,wecannotuseas few as single-keyLR (unless wetweak the roundpermutation) orasfew as two-roundsince they are not secure. Distinguishing attacks forsome other LR constructionsarealso known [8]. We list some oftheknow related results (see Table 1). Here all keys K ,K ,...are independently chosen.Table of ContentsInvited Talk.- Getting a Few Things Right and Many Things Wrong.- Security of RSA and Multivariate Schemes.- Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions.- Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks.- CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key.- Security Analysis, Pseudorandom Permutations and Applications.- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols.- Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations.- The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants.- Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface.- Invited Talk.- Cryptographic Hash Functions: Theory and Practice.- Hash Functions.- Cryptanalysis of Tav-128 Hash Function.- Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing.- Speeding Up the Wide-Pipe: Secure and Fast Hashing.- Attacks on Block Ciphers and Stream Ciphers.- New Boomerang Attacks on ARIA.- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers.- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA.- Greedy Distinguishers and Nonrandomness Detectors.- Fast Cryptographic Computation.- Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity.- Random Euclidean Addition Chain Generation and Its Application to Point Multiplication.- Cryptanalysis of AES.- Attack on a Higher-Order Masking of the AES Based on Homographic Functions.- Improved Impossible Differential Cryptanalysis of 7-Round AES-128.- Cryptanalysis of a Perturbated White-Box AES Implementation.- Efficient Implementation.- A Program Generator for Intel AES-NI Instructions.- ECC2K-130 on NVIDIA GPUs.- One Byte per Clock: A Novel RC4 Hardware.

    Out of stock

    £44.99

  • Sicherheit und Kryptographie im Internet: Theorie

    Springer Fachmedien Wiesbaden Sicherheit und Kryptographie im Internet: Theorie

    Out of stock

    Book SynopsisDas vorliegende Buch bietet eine strukturierte, gut lesbare Einführung zu den wichtigsten Sicherheitsstandards im Internet. Hierzu zählen bekannte Standards wie TLS, OpenPGP, S/MIME, SSH, IPsec und WPA, aber auch die versteckten Sicherheitsfeatures aus der Microsoft-Welt (PPTP, Kerberos), dem Mobilfunk, DNSSEC, Single-Sign-On-Protokollen und Datenformaten wie XML und JSON. Das Verständnis für diese Standards und deren Weiterentwicklung wird durch eine detaillierte Beschreibung der bekannten Angriffe vertieft, insbesondere für TLS liegt hier umfangreiches Material vor.Die 5. Auflage wurde erheblich erweitert und aktualisiert. Neue Themen sind unter anderem die WLAN-Standards WPA2 und WPA3, die neue TLS-Version 1.3, Kerberos, Anti-SPAM-Techniken und moderne Single-Sign-On-Protokolle. Das Thema TLS wird völlig neu dargestellt, und die Kapitel zu E-Mail-Sicherheit und IPsec deutlich erweitert. Eine umfangreiche Einführung in praktische Aspekte der Kryptographie macht dieses Buch ohne zusätzliche Literatur nutzbar.Table of ContentsVorwort.- 1 Das Internet.- 2 Kryptographie: Vertraulichkeit.- 3 Kryptographie: Integrität und Authentizität.- 4 Kryptographische Protokolle.- 5 Point-to-Point-Sicherheit.- 6 Drahtlose Netzwerke (WLAN).- 7 Mobilfunk.- 8 IP-Sicherheit (IPsec).- 9 Sicherheit von HTTP.- 10 Transport Layer Security.- 11 Eine kurze Geschichte von TLS.- 12 Angriffe auf SSL und TLS.- 13 Secure Shell (SSH).- 14 Kerberos.- 15 DNS Security.- 16 Datenverschlüsselung: PGP.- 17 S/MIME.- 18 Angriffe auf S/MIME und OpenPGP.- 19 E-Mail: Weitere Sicherheitsmechanismen.- 20 Web Security und Single-Sign-On-Protokolle.- 21 Kryptographische Datenformate im Internet.- 22 Ausblick: Herausforderungen der Internetsicherheit.- Literaturverzeichnis.- Stichwortverzeichnis.

    Out of stock

    £42.74

  • Datenschutz: Einführung in technischen

    Springer Fachmedien Wiesbaden Datenschutz: Einführung in technischen

    1 in stock

    Book SynopsisDieses Lehrbuch behandelt im ersten Teil schwerpunktmäßig technische Maßnahmen, die den Schutz personenbezogener Daten sicherstellen. Dazu werden grundlegende Verfahren der Anonymisierung und der Gewährleistung von Anonymität im Internet (z. B. Tor) vorgestellt. Das Buch gibt einen Überblick über gängige Verfahren des Identitätsmanagements (z. B. OpenID Connect) und die in elektronischen Ausweisdokumenten (z. B. im Personalausweis) verwendeten Sicherheitsmaßnahmen. Die Datenschutz-Garantien der vermittelten Ansätze werden im Detail behandelt. Im Bereich des World Wide Web erfährt der Leser, wo die Probleme aus Sicht des Datenschutzes liegen und wie diese Lücken geschlossen werden können. Anonyme Bezahlverfahren und eine Untersuchung von Bitcoin runden den technischen Teil des Buches ab. Der Leser lernt Ansätze aus der Praxis kennen, um so je nach Anforderungen in der Systementwicklung das passende Verfahren auswählen zu können.Im zweiten Teil werden die Grundlagen des Datenschutzrechts behandelt. Denn technische Maßnahmen sollen unerlaubte Datenverarbeitung verhindern; das Recht bestimmt, welche Datenverarbeitungen erlaubt sind. Ohne Kenntnisse im Datenschutzrecht können technische Maßnahmen nicht richtig implementiert werden. Zum besseren Verständnis erfolgt ein Überblick über die Rechtsordnung insgesamt, in die das Datenschutzrecht eingeordnet wird. Betrachtet werden die europäische und die verfassungsrechtliche Dimension des Datenschutzes. Der Schwerpunkt liegt auf den Regelungen der Datenschutz-Grundverordnung. Dabei werden auch besonders häufig vorkommende und Fragen aufwerfende Verarbeitungssituationen wie das Webtracking erörtert. Beispielhaft werden datenschutzrechtliche Fälle bearbeitet.Trade Review“... Im rechtlichen Teil ist hervorzuheben, dass ... Grundlagen des Rechtsverständnisses zielgruppenbezogen für Informatikerinnen und Informatiker dargestellt werden. ... Es bildet die technischen Themen umfassend ab und bietet für das rechtliche Verständnis aktueller Fragestellungen eine solide Grundlage.” (Rudi Kramer, in: AWV-Informationen, 14. Februar 2023) Table of ContentsEinführung in den Technischen Datenschutz - Anonymitätsmaße - Anonymität im Internet - Identitätsmanagement - Anonymes Bezahlen und Bitcoin - Datenschutz im World Wide Web - Instant Messaging - Elektronische Ausweisdokumente - Weitere Privacy-Enhancing Technologies - Datenschutzrecht - Einführung in die Rechtsordnung - Wichtige Gesetze, wichtige Grundbegriffe - Erlaubte und unerlaubte Datenverarbeitungen, Rechtsgrundlagen - Rechenschaftspflicht - technische und organisatorische Maßnahmen (toM) - Betroffenenrechte (Auskunft, Kopie, Berichtigung, Löschung usw.) - Wichtige Verarbeitungssituationen (Videoüberwachung, Fotoaufnahmen, Tracking, Cloud Computing usw.) - Zertifizierung, Akkreditierung - Betriebliche Datenschutzbeauftragte - Datenschutz-Aufsichtsbehörde

    1 in stock

    £26.59

  • Wirtschaftsspionage und Intelligence Gathering:

    Springer Fachmedien Wiesbaden Wirtschaftsspionage und Intelligence Gathering:

    1 in stock

    Book SynopsisIm Wirtschaftskreislauf entstehend Datensammlungen. Darin werden Informationen über die wirtschaftliche Tätigkeit von Unternehmen gespeichert. Die Unternehmen haben aber keinen Einfluss auf die Generierung, Speicherung und Verwendung dieser Daten. Alexander Tsolkas und Friedrich Wimmer erklären anhand von Beispielen, wie diese Datensammlungen ausgespäht werden können, wie Unternehmen die eigene Gefährdungslage einschätzen und wie sie das Risiko durch Tarnen und Täuschen verringern können.Table of ContentsBegriffe - Bedrohungslage, Wirtschaftsspionage und Fallbeispiele - Akteure des Intelligence Gathering und deren Ziele - Im Wirtschaftskreislauf entstehende Datensammlungen - Möglichkeiten der Ausspähung von Unternehmen - Bedeutung und Auswirkung auf Unternehmen - Fazit und Ausblick

    1 in stock

    £35.99

  • Protect Your Information: With Intrusion

    BPB Publications Protect Your Information: With Intrusion

    1 in stock

    Book Synopsis

    1 in stock

    £14.62

  • Cryptography

    River Publishers Cryptography

    1 in stock

    Book SynopsisCryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including:full provision of Web-based material on almost every topic coveredprovision of additional on-line material, such as videos, source code, and labscoverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs)Key areas covered include:Fundamentals of EncryptionPublic Key EncryptionSymmetric Key EncryptionHashing MethodsKey Exchange MethodsDigital Certificates and AuthenticationTunnelingCrypto CrackingLight-weight CryptographyBlockchainZero-knowledge ProofsThis book provides extensive support through the associated website of: http://asecuritysite.com/encryptionTable of Contents1. Ciphers and Fundamentals 2. Secret Key Encryption 3. Hashing 4. Public Key 5. Key Exchange 6. Authentication and Digital Certificates 7. Tunneling 8. Crypto Cracking 9. Light-weight Cryptography 10. Blockchain 11. Zero Knowledge 12. Wifi

    1 in stock

    £61.74

  • Cryptology For Engineers: An Application-oriented

    World Scientific Publishing Co Pte Ltd Cryptology For Engineers: An Application-oriented

    Out of stock

    Book SynopsisCryptology is increasingly becoming one of the most essential topics of interest in everyday life. Digital communication happens by transferring data between at least two participants — But do we want to disclose private information while executing a sensitive bank transfer? How about allowing third-party entities to eavesdrop on private calls while performing an important secret business discussion? Do we want to allow ambient communication concerning us to be manipulated while control software is driving our autonomous car along a steep slope? Questions like these make it clear why issues of security are a great concern in our increasingly augmented world.Cryptology for Engineers is a study of digital security in communications systems. The book covers the cryptographical functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' requirements on the other. Numerous examples computable by hand or with a small additional cost in most cases are provided inside.

    Out of stock

    £85.50

  • Cryptography In The Information Society

    World Scientific Publishing Co Pte Ltd Cryptography In The Information Society

    Out of stock

    Book SynopsisThis textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided.

    Out of stock

    £76.00

  • Security in Computing and Communications: 8th

    Springer Verlag, Singapore Security in Computing and Communications: 8th

    3 in stock

    Book SynopsisThis book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.Table of ContentsPandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools.- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems.- Evading Static and Dynamic Android Malware Detection Mechanisms.- Multilevel Secure Container Deployment Framework in Edge Computing.- Deep Hierarchical APP Recommendation with Dynamic Behaviors.- New Security Architecture of Access Control in 5G MEC.- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments.- A Survey of Security Attacks on Silicon Based Weak PUF Architectures.- On the Feasibility of DoS Attack on Smart Door Lock IoT Network.- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning.- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection.- Thermal Management in Large Data Centres: Security Threats and Mitigation.- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm.- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data.- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm.- SaaS - Microservices-Based Scalable Smart Contract Architecture.- GIDS: Anomaly Detection Using Generative Adversarial Networks.- Audio Steganography Using Multi LSB and IGS Techniques.- A Forensic Analysis on the Availability of MQTT Network Traffic.- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications.- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment.

    3 in stock

    £40.49

  • Quantum Algorithms for Cryptographically

    Springer Verlag, Singapore Quantum Algorithms for Cryptographically

    3 in stock

    Book SynopsisThis book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the area and the hands-on analysis of the spectral properties of Boolean functions from a cryptologic viewpoint. Topics covered in the book include Qubit, Deutsch–Jozsa and Walsh spectrum, Grover’s algorithm, Simon’s algorithm and autocorrelation spectrum. The book aims at encouraging readers to design and implement practical algorithms related to Boolean functions. Apart from combinatorial techniques, this book considers implementing related programs in a quantum computer. Researchers, practitioners and educators will find this book valuable. Table of Contents1. Introduction.- 2. Deutsch-Jozsa and Walsh Spectrum.- 3. Grover’s Algorithm and Walsh Spectrum.- 4. Simon’s Algorithm and Autocorrelation Spectrum.- 5. Conclusion & Research Direction.

    3 in stock

    £52.24

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account