Information theory Books

167 products


  • Information and Communication Technologies: 11th

    Springer International Publishing AG Information and Communication Technologies: 11th

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 11th Ecuadorian Conference on Information and Communication Technologies, TICEC 2023, held in Cuenca, Ecuador, during October 18–20, 2023.The 31 full papers presented were carefully reviewed and selected from 120 submissions. The papers cover a great variety of topics, such as internet of things, cyber-physical systems, human-machine interface, artificial Intelligence, e-Learning, smart healthcare, smart healthcare and others. The papers are organized in the following topical sections: data science and machine learning; ICTs and their applications; and software development.Table of Contents​Data Science and Machine Learning: Uncovering the Effects of the Russia-Ukraine Conflict on Cryptocurrencies: A Data-driven Analysis with Clustering and Biplot Techniques.- Human Trafficking in Social Networks: A Review of Machine Learning Techniques.- Exploring the Performance of Deep Learning in High-Energy Physics.- Human actions recognition system based on Neural Networks.- Big Data Architecture for Air Pollution Spatial Visualization: Quito, Ecuador.- The Role of Twitter in Media Coverage during Humanitarian Crises. Data mining from International News Agencies.- Applied Metaheuristics in International Trading: A Systematic Review.- Finding an Integrated Ultraviolet Radiation Index Using Fuzzy Logic Techniques.- Forecasting the Consumer Price Index of Ecuador using Classical and Advanced Time Series Models.- Forecasting PM2.5 concentrations in ambient air using a transformer based neural network.- Machine Learning Applied to the Analysis of Glacier Masses.- Profit vs Accuracy: Balancing the Impact on Users Introduced by Profit-Aware Recommender Systems.- Augmenting Data with DCGANs to Improve Skin Lesions Classification.- Unraveling the power of 4D residual blocks and transfer learning in violence detection.- ICTs and their Applications: Brainwaves communication system for people with reduced mobility and verbal impairment.- Advanced metrics to evaluate autistic children's attention and emotions from facial characteristics using a human-robot-game interface.- Performance analysis of You Only Look Once, RetinaNet, and Single Shot Detector applied to vehicle detection and counting.- Tumor kidney segmentation from CT images using residual U-net architecture.- Classification of Alzheimer disease’s Severity Using Support Vector Machine and Deep Feature Extraction of Convolutional Neural Networks: a Contrasting of Methodologies.- Creation of an alert device for early detection of epilepsy using an EEG signal power threshold.- Optimal location of the electric vehicle charging stands using multi-objective evolutionary algorithms: Cuenca city as a case study.- Detecting Parkinson’s Disease with Convolutional Neural Networks: Voice Analysis and Deep Learning.- Hyperparameter Tuning in a Dual Channel U-Net for Medical Image Segmentation.- Vitreous Hemorrhage Segmentation in Fundus Images by using an Efficient-UNet Network.- A non-invasive portable solution to estimate hemoglobin levels in the blood.- Mask R-CNN and YOLOv8 comparison to perform tomato maturity recognition task.- Software Development.- Development of a distributed hydrological model of continuous generation, in a GIS environment.- A Domain-Specific Language and Model-Based Engine for Implementing IoT Dash- board Web Applications.- Feasibility of using serious MIDI-AM videogames as resources in early childhood education.- Search and Visualization of Researcher Networks: Co-authorship in Ecuador.- Visualization Models Applied to Atmospheric Pollutants and Meteorological Variables: A Systematic Literature Review.

    1 in stock

    £71.24

  • Software Engineering and Formal Methods: 21st

    Springer International Publishing AG Software Engineering and Formal Methods: 21st

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 21st International Conference on Software Engineering and Formal Methods, SEFM 2023, held in Eindhoven, The Netherlands, during November 6-10, 2023. The 18 regular papers presented in this book, together with 1 invited paper and 1 tool paper, were carefully reviewed and selected from 41 submissions. The SEFM conference series aims to bring together researchers and practitioners from academia, industry and government, to advance the state of the art in formal methods, to facilitate their uptake in the software industry, and to encourage their integration within practical software engineering methods and tools.Table of ContentsRefinements for Open Automata.- The Cubicle Fuzzy Loop : A Fuzzing-Based Extension for the Cubicle Model Checker.- Guiding Symbolic Execution with A-star.- Robustness Testing of Software Verifiers.- Decoupled Fitness Criteria for Reactive Systems.- Capturing Smart Contract Design with DCR Graphs.- An Active Learning Approach to Synthesizing Program Contracts.- Ranged Program Analysis via Instrumentation.- Attack time analysis in dynamic attack trees via integer linear programming.- SSCalc A Calculus for Solidity Smart Contracts.- ATM: a Logic for Quantitative Security Properties on Attack Trees.- Refactoring of Multi-Instance BPMN Processes with Time and Resources.- Verified Scalable Parallel Computing with Why3.- Exact and Efficient Bayesian Inference for Privacy Risk Quantification.- A Formalization of Heisenbugs and Their Causes.- Verifying Read-Copy Update under RC11.- QNNRepair: Quantized Neural Network Repair.- Timeout Prediction for Software Analyses.- PART Tool Papers.- PMC-VIS: An Interactive Visualization Tool for Probabilistic Model Checking.

    1 in stock

    £49.49

  • Foundations of Software Science and Computation

    Springer International Publishing AG Foundations of Software Science and Computation

    3 in stock

    Book SynopsisThe two open access volumes LNCS 14574 and 14575 constitute the proceedings of the27th International Conference onFoundations of Software Science and Computation Structures, FOSSACS 2024, which took place in Luxembourg in April 2024. The 24 full papers included in this book were carefully reviewed and selected from 79 submissions. They were organized in topical sections as follows:Part I: Infinite games; categorical semantics; automata and synthesis;Part II: Types and programming languages; logic and proofs; infinite-state systems.

    3 in stock

    £31.49

  • Springer International Publishing AG Modelling and Mining Networks

    1 in stock

    Book Synopsis

    1 in stock

    £44.99

  • Software Source Code: Statistical Modeling

    De Gruyter Software Source Code: Statistical Modeling

    7 in stock

    Book Synopsis

    7 in stock

    £51.75

  • Cryptography Made Simple

    Springer International Publishing AG Cryptography Made Simple

    15 in stock

    Book SynopsisIn this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout.The author balances a largely non-rigorous style — many proofs are sketched only — with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading.This is a suitable textbook for advanced undergraduate and graduate students in computer science, mathematics and engineering, and for self-study by professionals in information security. While the appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus.Trade Review“The goal of cryptography is to obfuscate data for unintended recipients. … The book is divided into four parts. … The book is very comprehensive, and very accessible for dedicated students.” (Klaus Galensa, Computing Reviews, computingreviews.com, October, 2016)“Cryptography made simple is a textbook that provides a broad coverage of topics that form an essential working knowledge for the contemporary cryptographer. It is particularly suited to introducing graduate and advanced undergraduate students in computer science to the concepts necessary for understanding academic cryptography and its impact on real-world practice, though it will also be useful for mathematicians or engineers wishing to gain a similar perspective on this material.” (Maura Beth Paterson, Mathematical Reviews, July, 2016)“This is a very thorough introduction to cryptography, aimed at lower-division undergraduates. It is an engineering textbook that uses modern mathematical terminology (such as groups and finite fields). … Bottom line: really for engineers, and a useful book if used carefully; the organization makes is easy to get overwhelmed by the background material before you get to the 'good stuff', and even the good stuff has an overwhelming amount of detail.” (Allen Stenger, MAA Reviews, maa.org, June, 2016)“This very thorough book by Smart (Univ. of Bristol, UK) is aimed at graduate students and advanced undergraduates in mathematics and computer science and intended to serve as a bridge to research papers in the field. … Summing Up: Recommended. Upper-division undergraduates through professionals/practitioners.” (C. Bauer, Choice, Vol. 53 (10), June, 2016)Table of ContentsModular Arithmetic, Groups, Finite Fields and Probability.- Elliptic Curves.- Historical Ciphers.- The Enigma Machine.- Information Theoretic Security.- Historical Stream Ciphers.- Modern Stream Ciphers.- Block Ciphers.- Symmetric Key Distribution.- Hash Functions and Message Authentication Codes.- Basic Public Key Encryption Algorithms.- Primality Testing and Factoring.- Discrete Logarithms.- Key Exchange and Signature Schemes.- Implementation Issues.- Obtaining Authentic Public Keys.- Attacks on Public Key Schemes.- Definitions of Security.- Complexity Theoretic Approaches.- Provable Security: With Random Oracles.- Hybrid Encryption.- Provable Security: Without Random Oracles.- Secret Sharing Schemes.- Commitments and Oblivious Transfer.- Zero-Knowledge Proofs.- Secure Multiparty Computation.

    15 in stock

    £22.99

  • Network Coding and Subspace Designs

    Springer International Publishing AG Network Coding and Subspace Designs

    1 in stock

    Book SynopsisThis book, written by experts from universities and major research laboratories, addresses the hot topic of network coding, a powerful scheme for information transmission in networks that yields near-optimal throughput. It introduces readers to this striking new approach to network coding, in which the network is not simply viewed as a mechanism for delivering packets, but rather an algebraic structure named the subspace, which these packets span. This leads to a new kind of coding theory, employing what are called subspace codes. The book presents selected, highly relevant advanced research output on: Subspace Codes and Rank Metric Codes; Finite Geometries and Subspace Designs; Application of Network Coding; Codes for Distributed Storage Systems. The outcomes reflect research conducted within the framework of the European COST Action IC1104: Random Network Coding and Designs over GF(q). Taken together, they offer communications engineers, R&D engineers, researchers and graduate students in Mathematics, Computer Science, and Electrical Engineering a comprehensive reference guide to the construction of optimal network codes, as well as efficient encoding and decoding schemes for a given network code.Table of ContentsSubspace Codes and Rank Metric Codes.- Finite Geometries and Subspace Designs.- Application of Network Coding.- Codes For Distributed Storage Systems.

    1 in stock

    £80.99

  • Moderne Kryptographie: Eine Einführung

    Springer Fachmedien Wiesbaden Moderne Kryptographie: Eine Einführung

    1 in stock

    Book SynopsisDieses Buch behandelt die Kernfragen und grundlegenden Verfahren der Kryptographie. Diese werden aus Sicht der modernen Kryptographie studiert, die durch eine präzise mathematische und informatische Herangehensweise geprägt ist. Die Inhalte dieser Einführung sind dabei aus der Praxis motiviert und es werden wichtige, in der Praxis eingesetzte kryptographische Verfahren, vorgestellt und diskutiert.Table of ContentsSymmetrische Verschlüsselung - Blockkryptosysteme, AES - Verschlüssungsmodi, CTR, CBC - Asymmetrische Verschlüsselung, RSA, ElGamal - Hybride Verschlüsselung - Kryptographische Hashfunktionen, die SHA-Familie, Merkle-Damgård-Konstruktion - Nachrichtenauthentifizierung, CBC-MAC, HMAC - Digitale Signaturen, FDH-RSA, Random-Oracle-Modell, PKCS#1, DSA - Ansätze der Kryptanalyse - Informationstheoretische bzw. beweisbare Sicherheit der betrachteten Verfahren - Public-Key-Infrastrukturen und Web of Trust

    1 in stock

    £26.59

  • Symmetrische Verschlüsselungsverfahren: Design,

    Springer Fachmedien Wiesbaden Symmetrische Verschlüsselungsverfahren: Design,

    1 in stock

    Book SynopsisEnigma und Lucifer-Chiffre: das spannende Lehrbuch zur Kryptographie mit Online-Service. Es wird detailliert beschrieben, was bei der Entwicklung eines symmetrischen Kryptosystems - das den heutigen Anforderungen entspricht - zu berücksichtigen ist. Dazu wird insbesondere die differentielle und die lineare Kryptoanalyse ausführlich erklärt.Table of ContentsKryptoanalyse klassischer Chiffrierverfahren - Die Kryptoanalyse der 'Enigma'-Chiffre - Shannons Theorie der Kryptosysteme - Lucifer-Chiffre und der Data Encryption Standard - Differentielle Kryptoanalyse - Lineare Kryptoanalyse - Advanced Encryption Standard - Mathematische Grundlagen

    1 in stock

    £34.19

  • Information and the Internal Structure of the

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Information and the Internal Structure of the

    1 in stock

    Book SynopsisNot so if the book has been translated into Arabic. Now the reader can discern no meaning in the letters. The text conveys almost no information to the reader, yet the linguistic informa­ tion contained by the book is virtually the same as in the English original. The reader, familiar with books will still recognise two things, however: First, that the book is a book. Second, that the squiggles on the page represent a pattern of abstractions which probably makes sense to someone who understands the mean­ ing of those squiggles. Therefore, the book as such, will still have some meaning for the English reader, even if the content of the text has none. Let us go to a more extreme case. Not a book, but a stone, or a rock with engravings in an ancient language no longer under­ stood by anyone alive. Does such a stone not contain human information even if it is not decipherable? Suppose at some point in the future, basic knowledge about linguistics and clever computer aids allow us to decipher it? Or suppose someone discovers the equivalent of a Rosetta stone which allows us to translate it into a known language, and then into English? Can one really say that the stone contained no information prior to translation? It is possible to argue that the stone, prior to deciphering contained only latent information.Table of ContentsPrologue.- The Author’s Dilemma.- 1 Information: Abstraction or Reality?.- Can Information Exist Outside the Human Brain?.- Can Information be Processed Outside the Human Brain?.- Forms of Human Information and its Communication.- Biological Information Systems.- Inorganic Information Systems.- Non-human Information Processing.- Some Epistemological Considerations.- 2 Information Physics: An Introduction.- The Reality of Information.- The Heart of the Concept.- Information: The Hidden Dimension.- 3 Information and Entropy: The Mathematical Relationship.- Information and Organisation.- The Second Law of Thermodynamics.- The Boltzmann/Schrödinger Equation.- Information as an Inverse Exponential Function of Entropy.- The Constant c.- 4 Measuring the Information Changes of Altered Physical States.- Measuring the Information Content of a Crystal.- Proteins as Information Systems.- The Denaturation of Trypsin.- Concluding Remarks.- 5 Information and Entropy: Further Implications.- Information and Entropy as Viewed by the Communications Engineers.- Positive Entropy.- Negative Entropy.- Information Magnitudes.- The Evolution of the Universe.- 6 Some Further Considerations About the Interrelationship Between Information and Energy.- Pure Energy: Heat, the Antithesis of Information.- The Information Content of Energy.- Motion, Distance and Time.- Information and Potential Energy.- The Interconversion of Energy and Information.- Information Machines.- Structural vs Kinetic Information.- Transformations Between Kinetic and Structural Information.- 7 Information and Work.- The Relationship Between Work and Information.- Energy Transducers.- Work in Biological Systems.- Reassessing the Work Equations.- Measuring the Information Content of Electrical Work.- 8 Summary and Concluding Remarks.- The Basic Propositions.- Historical Perspective.- Why Has Information Been Overlooked?.- The Need for Models and Theories.- The Relevance of Information Physics for a General Theory of Information.- Some Concluding Thoughts.- Appendixes.- A. Speculations on Electromagnetic Radiation and Particles of Information.- B. Further Speculations: Implications for Atomic Structure.- C. A Smaller Universe.- D. Other Universes?.

    1 in stock

    £50.99

  • Sequences and Their Applications – SETA 2006: 4th

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Sequences and Their Applications – SETA 2006: 4th

    15 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 4th International Conference on Sequences and Their Applications, SETA 2006. The book presents 32 revised full papers together with 4 invited lectures. The papers are organized in topical sections on linear complexity of sequences, correlation of sequences, stream ciphers and transforms, topics in complexities of sequences, multi-sequence synthesis, sequences and combinatorics, FCSR sequences, aperiodic correlation and applications, and boolean functions, and more.Table of ContentsInvited Papers.- Shift Register Sequences – A Retrospective Account.- The Probabilistic Theory of the Joint Linear Complexity of Multisequences.- Multi-Continued Fraction Algorithms and Their Applications to Sequences.- Codes for Optical CDMA.- Linear Complexity of Sequences.- On the Linear Complexity of Sidel’nikov Sequences over .- Linear Complexity over F p of Ternary Sidel’nikov Sequences.- Bounds on the Linear Complexity and the 1-Error Linear Complexity over F p of M-ary Sidel’nikov Sequences.- The Characterization of 2 n -Periodic Binary Sequences with Fixed 1-Error Linear Complexity.- Correlation of Sequences.- Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation.- Extended Hadamard Equivalence.- Analysis of Designing Interleaved ZCZ Sequence Families.- Stream Ciphers and Transforms.- Security of Jump Controlled Sequence Generators for Stream Ciphers.- Improved Rijndael-Like S-Box and Its Transform Domain Analysis.- Topics in Complexities of Sequences.- Nonlinear Complexity of Binary Sequences and Connections with Lempel-Ziv Compression.- On Lempel-Ziv Complexity of Sequences.- Computing the k-Error N-Adic Complexity of a Sequence of Period p n .- On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.- Linear/Nonlinear Feedback Shift Register Sequences.- On the Classification of Periodic Binary Sequences into Nonlinear Complexity Classes.- Sequences of Period 2 N –2.- A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences.- Multi-sequence Synthesis.- Implementation of Multi-continued Fraction Algorithm and Application to Multi-sequence Linear Synthesis.- The Hausdorff Dimension of the Set of r-Perfect M-Multisequences.- Filtering Sequences and Pseudorandom Sequence Generators.- Lower Bounds on Sequence Complexity Via Generalised Vandermonde Determinants.- Construction of Pseudo-random Binary Sequences from Elliptic Curves by Using Discrete Logarithm.- On the Discrepancy and Linear Complexity of Some Counter-Dependent Recurrence Sequences.- Sequences and Combinatorics.- Nonexistence of a Kind of Generalized Perfect Binary Array.- FCSR Sequences.- On the Distinctness of Decimations of Generalized l-Sequences.- On FCSR Memory Sequences.- Periodicity and Distribution Properties of Combined FCSR Sequences.- Aperiodic Correlation and Applications.- Generalized Bounds on Partial Aperiodic Correlation of Complex Roots of Unity Sequences.- Chip-Asynchronous Version of Welch Bound: Gaussian Pulse Improves BER Performance.- Boolean Functions.- On Immunity Profile of Boolean Functions.- Reducing the Number of Homogeneous Linear Equations in Finding Annihilators.- The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function.- Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions.- Construction of 1-Resilient Boolean Functions with Very Good Nonlinearity.

    15 in stock

    £42.74

  • Number Theory in Science and Communication: With

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Number Theory in Science and Communication: With

    1 in stock

    Book Synopsis"Number Theory in Science and Communication" is a well-known introduction for non-mathematicians to this fascinating and useful branch of applied mathematics . It stresses intuitive understanding rather than abstract theory and highlights important concepts such as continued fractions, the golden ratio, quadratic residues and Chinese remainders, trapdoor functions, pseudo primes and primitive elements. Their applications to problems in the real world are one of the main themes of the book. This revised fifth edition is augmented by recent advances in coding theory, permutations and derangements and a chapter in quantum cryptography. From reviews of earlier editions – "I continue to find [Schroeder’s] Number Theory a goldmine of valuable information. It is a marvelous book, in touch with the most recent applications of number theory and written with great clarity and humor.’ Philip Morrison (Scientific American) "A light-hearted and readable volume with a wide range of applications to which the author has been a productive contributor – useful mathematics outside the formalities of theorem and proof." Martin GardnerTrade ReviewFrom the reviews of the fifth edition:“Number theory has been a very active field in the last twenty-seven years, and Schroeder’s text has a palimpsest quality, with later mathematical advances layered on earlier ones. … Number Theory in Science and Communication is rewarding to browse, or as a jumping-off point for further research … . It would be a good source of student projects in an undergraduate discrete mathematics or number theory course.” (Ursula Whitcher, The Mathematical Association of America, March, 2011)Table of ContentsA Few Fundamentals.- The Natural Numbers.- Primes.- The Prime Distribution.- Some Simple Applications.- Fractions: Continued, Egyptian and Farey.- Congruences and the Like.- Linear Congruences.- Diophantine Equations.- The Theorems of Fermat Wilson and Euler.- Permutations Cycles and Derangements.- Cryptography and Divisors.- Euler Trap Doors and Public-Key Encryption.- The Divisor Functions.- The Prime Divisor Functions.- Certified Signatures.- Primitive Roots.- Knapsack Encryption.- Residues and Diffraction.- Quadratic Residues.- Chinese and Other Fast Algorithms.- The Chinese Remainder Theorem and Simultaneous Congruences.- Fast Transformation and Kronecker Products.- Quadratic Congruences.- Pseudoprimes, Möbius Transform, and Partitions.- Pseudoprimes Poker and Remote Coin Tossing.- The Möbius Function and the Möbius Transform.- Generating Functions and Partitions.- From Error Correcting Codes to Covering Sets.- Cyclotomy and Polynomials.- Cyclotomic Polynomials.- Linear Systems and Polynomials.- Polynomial Theory.- Galois Fields and More Applications.- Galois Fields.- Spectral Properties of Galois Sequences.- Random Number Generators.- Waveforms and Radiation Patterns.- Number Theory Randomness and “Art”.- Self-Similarity, Fractals and Art.- Self-Similarity, Fractals, Deterministic Chaos and a New State of Matter.

    1 in stock

    £56.99

  • Handbook of Information and Communication

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Handbook of Information and Communication

    15 in stock

    Book SynopsisAt its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. Te terrorist attacks of 11 September 2001 raised security concerns to a new level. Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communi- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. Te ?rst editor was intimately involved with security for the Athens Olympic Games of 2004.Trade ReviewAus den Rezensionen: “... Besonderes Augenmerk gilt dabei dem Wechselspiel zwischen Kommunikation und dem Bereich der Informationssicherheit. ... herausgegriffene Themen illustrieren die Relevanz des Buchs. … Verschiedene HIPs werden vorgestellt und verglichen Weitere Beitrage befassen sich mit Phishing Attacken bzw mit Authentifikationen mittels biometrischer Methoden. ... Die Beitrage sind theoretisch fundiert und oft praxisbezogen. … Das Buch eignet sich deshalb gut als Einstiegslektüre für Studierende oder für Informatiker, die sich nur am Rande für die Sicherheitsthematik interessieren. Für Experten ist das Buch eine wertvolle, vielseitige Inspirationsquelle.“ (in: Bulletin electrosuisse, 2/July/2010, Issue 7, S. 121)Table of ContentsPart A Fundamentals and Cryptography A Framework for System Security .- Public-Key Cryptography.- Elliptic Curve Cryptography.- Cryptographic Hash Functions.- Block Cipher Cryptanalysis.- Chaos-Based Information Security.- Bio-Cryptography.- Quantum Cryptography.- Part B Intrusion Detection and Access Control Intrusion Detection and Prevention Systems.- Intrusion Detection Systems.- Intranet Security via Firewalls.- Distributed Port Scan Detection.- Host-Based Anomaly Intrusion Detection.- Security in Relational Databases.- Anti-Bot Strategies Based on Human Interactive Proofs.- Access and Usage Control in GRID Systems.- Secure Human Identification.- Part C Networking Peer-to-Peer Botnets.- Security of Service Networks.- SCADA Security.- Mobile Ad-Hoc Network Routing.- Security Approach for Ad–Hoc Networks.- Phishing: Attacks and Countermeasures´.- Part D Optical Networking Chaos-Based Secure Optical Communications.- Chaos Applications in Optical Communications.- Part E Wireless Networking Security in Wireless Sensor Networks.- Secure routing in Wireless Sensor Networks.- Security Via Surveillance and Monitoring.- Security and QoS in Wireless Networks.- Part F Software Low-Level Software Security by Example.- Software Reverse Engineering.- Trusted Computing.- Security via Trusted Communications.- Viruses and Malware.- Designing a Secure Programming Language.- Part G Forensics and Legal Issues Fundamentals of Digital Forensic Evidence.- Multimedia Forensics for Detecting Forgeries.- Technological and Legal Aspects of CIS Subject Index

    15 in stock

    £424.99

  • Einrichtungsübergreifende elektronische

    Springer Fachmedien Wiesbaden Einrichtungsübergreifende elektronische

    1 in stock

    Book SynopsisUwe K. Schneider untersucht den rechtlichen Rahmen einrichtungsübergreifender elektronischer Patientenakten, über die alle bereits erhobenen Gesundheitsdaten jederzeit am Ort der Behandlung verfügbar gemacht werden können. Er veranschaulicht diese Rahmenbedingungen anhand von Regelungsinstrumenten wie der Gewährung finanzieller Anreize für die Nutzung solcher Akten oder gar der Verpflichtung hierzu. Dabei bewegt der Autor sich im Spannungsfeld von Daten- und Gesundheitsschutz. Denn diese Akten bieten einerseits die Chance, Qualität und Wirtschaftlichkeit der Versorgung zu verbessern. Auf der anderen Seite existieren Risiken, wenn hierfür Patientendaten auf externen Servern vorgehalten und über elektronische Netze ausgetauscht werden. Es droht eine Verflüchtigung von Daten, Verantwortung und Vertrauen im Netz.Table of ContentsMedizinische, technische und wirtschaftliche Grundlagen.- Verfassungsrechtliche Rahmenbedingungen.- Europarechtliche Rahmenbedingungen.

    1 in stock

    £66.49

  • Mobile Computing: Grundlagen – Prozesse und

    Springer Fachmedien Wiesbaden Mobile Computing: Grundlagen – Prozesse und

    1 in stock

    Book SynopsisDas Herausgeberwerk zeigt, welche Auswirkungen der Einsatz von mobilen Endgeräten auf betriebliche Abläufe hat und wie Anwendungsszenarien in verschiedenen Branchen aussehen können. Hierzu werden u. a. Beispiele aus dem Personalmanagement und dem Gesundheitswesen vorgestellt. Experten aus Wissenschaft und Praxis diskutieren Fragen rund um das Mobile Enterprise ebenso, wie die Gestaltung mobiler Prozesse im ERP und mobiles e-Learning.Dieser Band bietet damit all jenen Lesern und Wissenschaftlern neue Einsichten, die sich für das Thema mobile Anwendungen umfassend interessieren.Table of ContentsMobile Enterprise – Sichere mobile Unternehmensanwendungen – Sicherer Einsatz mobiler Endgeräte im Unternehmen – Mobile Prozesse im ERP – Mobile Device Management – Mobile Anwendungen im Personalmanagement – Mobile Anwendungen im Gesundheitswesen – Mobile Contracting – Mobile e-Learning

    1 in stock

    £40.49

  • Das Zeitalter der Daten: Was Sie über Grundlagen,

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Das Zeitalter der Daten: Was Sie über Grundlagen,

    3 in stock

    Book SynopsisDaten werden überall gesammelt. Jeder Kauf, ob online oder offline, jede Autofahrt und jede Benutzung des Smartphones erzeugt Daten, die gespeichert werden. So entstehen Datenberge, die in atemberaubendem Tempo wachsen – für 2020 geht man von 40 Billionen Gigabytes aus. Aber was passiert dann mit diesen Daten? Wie werden sie ausgewertet? Und wer macht das? Holger Aust nimmt Sie mit auf einen unterhaltsamen Ausflug in die wunderbare Welt der Data Science. Sein Buch richtet sich an alle, die schon immer wissen wollten, wie Maschinen anhand von Daten lernen und ob sie dadurch (künstliche) Intelligenz erlangen. Sie erfahren natürlich auch, was neuronale Netze und Deep Learning eigentlich mit all dem zu tun haben. In leicht verständlichem Stil erhalten Sie außerdem Einblicke in die Funktionsweise der wichtigsten Algorithmen und lernen konkrete Beispiele, Herausforderungen und Risiken aus der Praxis kennen: Sie erfahren etwa, wie Mobilfunkanbieter ihre Kunden bei Laune halten, wie Erdbebenvorhersage funktioniert und warum auch Computer zum Schubladendenken neigen.Trade Review“… Aust erklärt mathematische Grundlagen und Formeln ebenso wie die Aufgaben eines Data Scientists. Vom Einzelkämpfer und Alleskönner bis zum Spezialisten in einem Team aus 500 Leuten sind alle möglichen Arbeitsmöglichkeiten drin. … Wer in die Materie einsteigen will, bekommt Grafiken und Tabellen zur Veranschaulichung mit an die Hand. Dass es nötig ist, sich mit dem Thema auseinanderzusetzen, wird die rund 250 Seiten hinweg immer wieder deutlich …” (Marco Krefting, in: dpa-Dossier Wissen, Heft 42, 22. Oktober 2021)Table of ContentsData Science: Die Kunst mit Daten umzugehen.- KI: Hype oder Technologie der Zukunft?- Wie lernt eine Maschine?- Stolz und Vorurteile - Risiken von Data Science.- Typische Aufgaben eines Data Scientists.- Das Gehirn kopieren? - Künstliche neuronale Netze.- Data Science in der Praxis.- Abschluss.

    3 in stock

    £17.09

  • Encrypt, Sign, Attack: A compact introduction to cryptography

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Encrypt, Sign, Attack: A compact introduction to cryptography

    1 in stock

    Book SynopsisThis book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to "crack" encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults.Table of ContentsBasics and history.- Symmetric ciphers.- Public-key ciphers.- Digital signature.

    1 in stock

    £26.59

  • Informations- und Kodierungstheorie

    Springer Fachmedien Wiesbaden Informations- und Kodierungstheorie

    1 in stock

    Book SynopsisWas ist Information? Wie kann man sie darstellen, sicher übertragen oder speichern? Viele Fragen, auf die das Buch Antworten gibt. Die Informationstheorie liefert die Grundlage für die Berechnung des Informationsgehalts von diskreten und kontinuierlichen Quellen und deren Darstellung in kodierter Form. So können erforderliche Speicher- und Kanalkapazitäten bei der Informationsverarbeitung und -übertragung in IT-Systemen bestimmt werden.Table of ContentsInformationsquellen und deren Beschreibung - Kodierung diskreter Quellen - Nachrichten und Kanäle - Diskrete Kanäle - Analoge Kanäle - Quantisierung analoger Signale - Kanalkodierung und Fehlerkorrekturverfahren - Bewertung von Kanalkodes

    1 in stock

    £28.49

  • Codierung und Kryptologie: Facetten einer

    Springer Fachmedien Wiesbaden Codierung und Kryptologie: Facetten einer

    1 in stock

    Book SynopsisThomas Borys untersucht aus didaktischer Sicht, welchen Beitrag die Inhalte Codierung und Kryptologie zur mathematischen bzw. informatischen Bildung leisten. Seine epistemologische Analyse erfolgt auf Basis des genetischen Prinzips und der fundamentalen Ideen der Mathematik und der Informatik, die als Leitlinien der mathematischen bzw. informatischen Bildung dienen. An ausgewählten Beispielen der Codierung und Kryptologie wird gezeigt, was bei der Umsetzung im Unterricht zu beachten ist.Table of ContentsAnforderungen an die Bildung für die Kommunikations- und Wissensgesellschaft - Bildungsrelevanz codierungstheoretischer und kryptologischer Inhalte unter besonderer Berücksichtigung der Allgemeinbildung und des genetischen Prinzips - Bildungsrelevanz codierungstheoretischer und kryptologischer Inhalte unter besonderer Berücksichtigung weiterer fundamentaler Ideen - Konkrete codierungstheoretische und kryptologische Verfahren aus fachdidaktischer Perspektive - Resümee und fachdidaktische Konsequenzen

    1 in stock

    £52.24

  • A Statistical Mechanical Interpretation of Algorithmic Information Theory

    Springer Verlag, Singapore A Statistical Mechanical Interpretation of Algorithmic Information Theory

    1 in stock

    Book SynopsisThis book is the first one that provides a solid bridge between algorithmic information theory and statistical mechanics. Algorithmic information theory (AIT) is a theory of program size and recently is also known as algorithmic randomness. AIT provides a framework for characterizing the notion of randomness for an individual object and for studying it closely and comprehensively. In this book, a statistical mechanical interpretation of AIT is introduced while explaining the basic notions and results of AIT to the reader who has an acquaintance with an elementary theory of computation.A simplification of the setting of AIT is the noiseless source coding in information theory. First, in the book, a statistical mechanical interpretation of the noiseless source coding scheme is introduced. It can be seen that the notions in statistical mechanics such as entropy, temperature, and thermal equilibrium are translated into the context of noiseless source coding in a natural manner. Then, the framework of AIT is introduced. On this basis, the introduction of a statistical mechanical interpretation of AIT is begun. Namely, the notion of thermodynamic quantities, such as free energy, energy, and entropy, is introduced into AIT. In the interpretation, the temperature is shown to be equal to the partial randomness of the values of all these thermodynamic quantities, where the notion of partial randomness is a stronger representation of the compression rate measured by means of program-size complexity. Additionally, it is demonstrated that this situation holds for the temperature itself as a thermodynamic quantity. That is, for each of all the thermodynamic quantities above, the computability of its value at temperature T gives a sufficient condition for T to be a fixed point on partial randomness.In this groundbreaking book, the current status of the interpretation from both mathematical and physical points of view is reported. For example, a total statistical mechanical interpretation of AIT that actualizes a perfect correspondence to normal statistical mechanics can be developed by identifying a microcanonical ensemble in the framework of AIT. As a result, the statistical mechanical meaning of the thermodynamic quantities of AIT is clarified. In the book, the close relationship of the interpretation to Landauer's principle is pointed out.Table of ContentsStatistical Mechanical Interpretation of Noiseless Source Coding.- Algorithmic Information Theory.- Partial Randomness.- Temperature Equals to Partial Randomness.- Fixed Point Theorems on Partial Randomness.- Statistical Mechanical Meaning of the Thermodynamic Quantities of AIT.- The Partial Randomness of Recursively Enumerable Reals.- Computation-Theoretic Clarification of the Phase Transition at Temperature T=1.- Other Related Results and Future Development.

    1 in stock

    £49.49

  • Graph Neural Networks: Foundations, Frontiers, and Applications

    Springer Verlag, Singapore Graph Neural Networks: Foundations, Frontiers, and Applications

    1 in stock

    Book SynopsisDeep Learning models are at the core of artificial intelligence research today. It is well known that deep learning techniques are disruptive for Euclidean data, such as images or sequence data, and not immediately applicable to graph-structured data such as text. This gap has driven a wave of research for deep learning on graphs, including graph representation learning, graph generation, and graph classification. The new neural network architectures on graph-structured data (graph neural networks, GNNs in short) have performed remarkably on these tasks, demonstrated by applications in social networks, bioinformatics, and medical informatics. Despite these successes, GNNs still face many challenges ranging from the foundational methodologies to the theoretical understandings of the power of the graph representation learning.This book provides a comprehensive introduction of GNNs. It first discusses the goals of graph representation learning and then reviews the history, current developments, and future directions of GNNs. The second part presents and reviews fundamental methods and theories concerning GNNs while the third part describes various frontiers that are built on the GNNs. The book concludes with an overview of recent developments in a number of applications using GNNs. This book is suitable for a wide audience including undergraduate and graduate students, postdoctoral researchers, professors and lecturers, as well as industrial and government practitioners who are new to this area or who already have some basic background but want to learn more about advanced and promising techniques and applications.Table of ContentsChapter 1. Representation Learning.- Chapter 2. Graph Representation Learning.- Chapter 3. Graph Neural Networks.- Chapter 4. Graph Neural Networks for Node Classification.- Chapter 5. The Expressive Power of Graph Neural Networks.- Chapter 6. Graph Neural Networks: Scalability.- Chapter 7. Interpretability in Graph Neural Networks.- Chapter 8. "Graph Neural Networks: Adversarial Robustness".- Chapter 9. Graph Neural Networks: Graph Classification.- Chapter 10. Graph Neural Networks: Link Prediction.- Chapter 11. Graph Neural Networks: Graph Generation.- Chapter 12. Graph Neural Networks: Graph Transformation.- Chapter 13. Graph Neural Networks: Graph Matching.- Chapter 14. "Graph Neural Networks: Graph Structure Learning". Chapter 15. Dynamic Graph Neural Networks.- Chapter 16. Heterogeneous Graph Neural Networks.- Chapter 17. Graph Neural Network: AutoML.- Chapter 18. Graph Neural Networks: Self-supervised Learning.- Chapter 19. Graph Neural Network in Modern Recommender Systems.- Chapter 20. Graph Neural Network in Computer Vision.- Chapter 21. Graph Neural Networks in Natural Language Processing.- Chapter 22. Graph Neural Networks in Program Analysis.- Chapter 23. Graph Neural Networks in Software Mining.- Chapter 24. "GNN-based Biomedical Knowledge Graph Mining in Drug Development".- Chapter 25. "Graph Neural Networks in Predicting Protein Function and Interactions".- Chapter 26. Graph Neural Networks in Anomaly Detection.- Chapter 27. Graph Neural Networks in Urban Intelligence.

    1 in stock

    £56.99

  • Information Theory - Part I: An Introduction To

    World Scientific Publishing Co Pte Ltd Information Theory - Part I: An Introduction To

    1 in stock

    Book SynopsisThis book is about the definition of the Shannon measure of Information, and some derived quantities such as conditional information and mutual information. Unlike many books, which refer to the Shannon's Measure of information (SMI) as 'Entropy,' this book makes a clear distinction between the SMI and Entropy.In the last chapter, Entropy is derived as a special case of SMI.Ample examples are provided which help the reader in understanding the different concepts discussed in this book. As with previous books by the author, this book aims at a clear and mystery-free presentation of the central concept in Information theory — the Shannon's Measure of Information.This book presents the fundamental concepts of Information theory in a friendly-simple language and is devoid of all kinds of fancy and pompous statements made by authors of popular science books who write on this subject. It is unique in its presentation of Shannon's measure of information, and the clear distinction between this concept and the thermodynamic entropy.Although some mathematical knowledge is required by the reader, the emphasis is on the concepts and their meaning rather on the mathematical details of the theory.

    1 in stock

    £26.60

  • Information and Communications Security: 25th

    Springer Verlag, Singapore Information and Communications Security: 25th

    3 in stock

    Book SynopsisThis volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on Information and Communications Security, ICICS 2023, held in Tianjin, China, during November 18–20, 2023. The 38 full papers presented together with 6 short papers were carefully reviewed and selected from 181 submissions. The conference focuses on: Symmetric-Key Cryptography; Public-Key Cryptography; Applied Cryptography; Authentication and Authorization; Privacy and Anonymity; Security and Privacy of AI; Blockchain and Cryptocurrencies; and System and Network Security. Table of Contents​Symmetric-Key Cryptography.- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA.- Improved Related-Key Rectangle Attack against the Full AES-192.- Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM.- Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher.- PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation.- Public-Key Cryptography.- A Polynomial-time Attack on G2SIDH.- Improvements of Homomorphic Secure Evaluation of Inverse Square Root.- Oblivious Transfer from Rerandomizable PKE.- Forward Secure Lattice-based Ring Signature Scheme in the Standard Model.- Applied Cryptography.- Secure Multi-Party Computation with Legally-Enforceable Fairness.- On-demand Allocation of Cryptographic Computing Resource with Load Prediction.- Private Message Franking with After Opening Privacy.- Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction.- Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography.- Authentication and Authorization.- PiXi: Password Inspiration by Exploring Information.- Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification.- A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things.- BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks.- Privacy and Anonymity.- Link Prediction-Based Multi-Identity Recognition of Darknet Vendors.- CryptoMask: Privacy-preserving Face Recognition.- Efficient Private Multiset ID Protocols.- Zoomer: A Website Fingerprinting Attack against Tor Hidden Services.- An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV.- Security and Privacy of AI.- Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors.- Multi-scale Features Destructive Universal Adversarial Perturbations.- Pixel-Wise Reconstruction of Private Data in Split Federated Learning.- Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments.- Black-Box Fairness Testing with Shadow Models.- Graph Unlearning using Knowledge Distillation.- AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings.- Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference.- A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation.- Blockchain and Cryptocurrencies.- SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains.- Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy.- Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions.- Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection.- BDTS: Blockchain-based Data Trading System.- Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks.- System and Network security.- DRoT: A Decentralised Root of Trust for Trusted Networks.- Finding Missing Security Operation Bugs via Program Slicing and Differential Check.- TimeClave: Oblivious In-enclave Time series Processing System.- Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios.- A Fake News Detection Method Based on A Multimodal Cooperative Attention Network.

    3 in stock

    £80.74

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account