Listing 1 - 10 of 412 | << page >> |
Sort by
|
Choose an application
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.
Computer security --- Computer science. --- Data structures (Computer science). --- Computer graphics. --- Computers. --- Law and legislation. --- Information theory. --- Mathematics. --- Visualization. --- Computer Science. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Data Structures, Cryptology and Information Theory. --- Legal Aspects of Computing. --- Information and Communication, Circuits.
Choose an application
These autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital signature, cover many topics besides his own personal career in mathematics and cryptography - travels to the Soviet Union, Latin America, Vietnam and elsewhere, political activism, and academic controversies relating to math education, the C. P. Snow two-culture problem, and mistreatment of women in academia. The stories speak for themselves and reflect the experiences of a student and later a scientist caught up in the tumultuous events of his generation.
Mathematics. --- History of Mathematics. --- Number Theory. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Data structures (Computer science). --- Data encryption (Computer science). --- Mathematics_$xHistory. --- Number theory. --- Mathématiques --- Structures de données (Informatique) --- Chiffrement (Informatique) --- Théorie des nombres --- Koblitz, Neal. --- Mathematicians --- World politics --- Mathematics - General --- Mathematics --- Physical Sciences & Mathematics --- Koblitz, Neal, --- Travel. --- Koblit︠s︡, N., --- Koblitz, Neal I. --- History. --- History of Mathematical Sciences.
Choose an application
The study of permutation complexity can be envisioned as a new kind of symbolic dynamics whose basic blocks are ordinal patterns, that is, permutations defined by the order relations among points in the orbits of dynamical systems. Since its inception in 2002 the concept of permutation entropy has sparked a new branch of research in particular regarding the time series analysis of dynamical systems that capitalizes on the order structure of the state space. Indeed, on one hand ordinal patterns and periodic points are closely related, yet ordinal patterns are amenable to numerical methods, while periodicity is not. Another interesting feature is that since it can be shown that random (unconstrained) dynamics has no forbidden patterns with probability one, their existence can be used as a fingerprint to identify any deterministic origin of orbit generation. This book is primarily addressed to researchers working in the field of nonlinear dynamics and complex systems, yet will also be suitable for graduate students interested in these subjects. The presentation is a compromise between mathematical rigor and pedagogical approach. Accordingly, some of the more mathematical background needed for more in depth understanding has been shifted into the appendices.
Nonlinear theories. --- Time-series analysis. --- Mathematical statistics. --- Mathematics --- Statistical inference --- Statistics, Mathematical --- Analysis of time series --- Statistical methods --- Physics. --- Data structures (Computer science). --- Applied mathematics. --- Engineering mathematics. --- Statistical physics. --- Dynamical systems. --- Statistical Physics, Dynamical Systems and Complexity. --- Mathematical Methods in Physics. --- Data Structures, Cryptology and Information Theory. --- Applications of Mathematics. --- Statistics --- Probabilities --- Sampling (Statistics) --- Autocorrelation (Statistics) --- Harmonic analysis --- Mathematical statistics --- Time-series analysis
Choose an application
The theory of elliptic curves involves a pleasing blend of algebra, geometry, analysis, and number theory. This book stresses this interplay as it develops the basic theory, thereby providing an opportunity for advanced undergraduates to appreciate the unity of modern mathematics. At the same time, every effort has been made to use only methods and results commonly included in the undergraduate curriculum. This accessibility, the informal writing style, and a wealth of exercises make Rational Points on Elliptic Curves an ideal introduction for students at all levels who are interested in learning about Diophantine equations and arithmetic geometry. Most concretely, an elliptic curve is the set of zeroes of a cubic polynomial in two variables. If the polynomial has rational coefficients, then one can ask for a description of those zeroes whose coordinates are either integers or rational numbers. It is this number theoretic question that is the main subject of this book. Topics covered include the geometry and group structure of elliptic curves, the Nagell–Lutz theorem describing points of finite order, the Mordell–Weil theorem on the finite generation of the group of rational points, the Thue–Siegel theorem on the finiteness of the set of integer points, theorems on counting points with coordinates in finite fields, Lenstra’s elliptic curve factorization algorithm, and a discussion of complex multiplication and the Galois representations associated to torsion points. Additional topics new to the second edition include an introduction to elliptic curve cryptography and a brief discussion of the stunning proof of Fermat’s Last Theorem by Wiles et al. via the use of elliptic curves.
Mathematics. --- Algebraic Geometry. --- Number Theory. --- Data Structures, Cryptology and Information Theory. --- Data structures (Computer science). --- Geometry, algebraic. --- Number theory. --- Mathématiques --- Structures de données (Informatique) --- Théorie des nombres --- Geometry --- Mathematics --- Physical Sciences & Mathematics --- Algebraic geometry. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Curvas elípticas --- Number study --- Numbers, Theory of --- Algebra --- Algebraic geometry --- Curves, Elliptic. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science)
Choose an application
This volume contains a collection of research and survey papers written by some of the most eminent mathematicians in the international community and is dedicated to Helmut Maier, whose own research has been groundbreaking and deeply influential to the field. Specific emphasis is given to topics regarding exponential and trigonometric sums and their behavior in short intervals, anatomy of integers and cyclotomic polynomials, small gaps in sequences of sifted prime numbers, oscillation theorems for primes in arithmetic progressions, inequalities related to the distribution of primes in short intervals, the Möbius function, Euler’s totient function, the Riemann zeta function and the Riemann Hypothesis. Graduate students, research mathematicians, as well as computer scientists and engineers who are interested in pure and interdisciplinary research, will find this volume a useful resource. Contributors to this volume: Bill Allombert, Levent Alpoge, Nadine Amersi, Yuri Bilu, Régis de la Bretèche, Christian Elsholtz, John B. Friedlander, Kevin Ford, Daniel A. Goldston, Steven M. Gonek, Andrew Granville, Adam J. Harper, Glyn Harman, D. R. Heath-Brown, Aleksandar Ivić, Geoffrey Iyer, Jerzy Kaczorowski, Daniel M. Kane, Sergei Konyagin, Dimitris Koukoulopoulos, Michel L. Lapidus, Oleg Lazarev, Andrew H. Ledoan, Robert J. Lemke Oliver, Florian Luca, James Maynard, Steven J. Miller, Hugh L. Montgomery, Melvyn B. Nathanson, Ashkan Nikeghbali, Alberto Perelli, Amalia Pizarro-Madariaga, János Pintz, Paul Pollack, Carl Pomerance, Michael Th. Rassias, Maksym Radziwiłł, Joël Rivat, András Sárközy, Jeffrey Shallit, Terence Tao, Gérald Tenenbaum, László Tóth, Tamar Ziegler, Liyang Zhang.
Algebra --- Mathematics --- Physical Sciences & Mathematics --- Numerical analysis. --- Data structures (Computer science) --- Mathematics. --- Math --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Data structures (Computer science). --- Number theory. --- Number Theory. --- Numerical Analysis. --- Data Structures, Cryptology and Information Theory. --- Science --- Mathematical analysis --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Number study --- Numbers, Theory of
Choose an application
This textbook effectively builds a bridge from basic number theory to recent advances in applied number theory. It presents the first unified account of the four major areas of application where number theory plays a fundamental role, namely cryptography, coding theory, quasi-Monte Carlo methods, and pseudorandom number generation, allowing the authors to delineate the manifold links and interrelations between these areas. Number theory, which Carl-Friedrich Gauss famously dubbed the queen of mathematics, has always been considered a very beautiful field of mathematics, producing lovely results and elegant proofs. While only very few real-life applications were known in the past, today number theory can be found in everyday life: in supermarket bar code scanners, in our cars’ GPS systems, in online banking, etc. Starting with a brief introductory course on number theory in Chapter 1, which makes the book more accessible for undergraduates, the authors describe the four main application areas in Chapters 2-5 and offer a glimpse of advanced results that are presented without proofs and require more advanced mathematical skills. In the last chapter they review several further applications of number theory, ranging from check-digit systems to quantum computation and the organization of raster-graphics memory. Upper-level undergraduates, graduates and researchers in the field of number theory will find this book to be a valuable resource.
Algebra --- Mathematics --- Physical Sciences & Mathematics --- Mathematics. --- Data structures (Computer science). --- Information theory. --- Number theory. --- Number Theory. --- Information and Communication, Circuits. --- Data Structures, Cryptology and Information Theory. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Number study --- Numbers, Theory of --- Math --- Science --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication theory --- Communication --- Cybernetics
Choose an application
This textbook provides an introduction to the mathematics on which modern cryptology is based. It covers not only public key cryptography, the glamorous component of modern cryptology, but also pays considerable attention to secret key cryptography, its workhorse in practice. Modern cryptology has been described as the science of the integrity of information, covering all aspects like confidentiality, authenticity and non-repudiation and also including the protocols required for achieving these aims. In both theory and practice it requires notions and constructions from three major disciplines: computer science, electronic engineering and mathematics. Within mathematics, group theory, the theory of finite fields, and elementary number theory as well as some topics not normally covered in courses in algebra, such as the theory of Boolean functions and Shannon theory, are involved. Although essentially self-contained, a degree of mathematical maturity on the part of the reader is assumed, corresponding to his or her background in computer science or engineering. Algebra for Cryptologists is a textbook for an introductory course in cryptography or an upper undergraduate course in algebra, or for self-study in preparation for postgraduate study in cryptology.
Mathematics. --- Data structures (Computer science). --- Computer science --- Algebra. --- Data Structures, Cryptology and Information Theory. --- Discrete Mathematics in Computer Science. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Math --- Mathematics --- Data structures (Computer scienc. --- Computational complexity. --- Data Structures and Information Theory. --- Mathematical analysis --- Complexity, Computational --- Machine theory --- Data encryption (Computer science) --- Computer science—Mathematics. --- File organization (Computer science) --- Abstract data types (Computer science)
Choose an application
"Journal of Trust Management encompasses all aspects of computational trust and trust management seen from technical, social, psychological, legal, economical and cultural perspectives."
Computer systems --- Computer security --- Trust --- Systèmes informatiques --- Sécurité informatique --- Confiance --- Reliability --- Periodicals --- Periodicals. --- Fiabilité --- Périodiques --- Computer security. --- Trust. --- Reliability. --- Trust (Psychology) --- Computer privacy --- Computer system security --- Computers --- Electronic digital computers --- Security of computer systems --- ADP systems (Computer systems) --- Computing systems --- Security measures --- Systems, Computer --- Computer Science --- Systems and Data Security --- Software Engineering/Programming and Operating Systems --- Coding and Information Theory --- Data Structures; Cryptology and Information Theory --- Attitude (Psychology) --- Emotions --- Data protection --- Security systems --- Hacking --- Electronic systems --- Cyberinfrastructure --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Choose an application
This book presents the basics of quantum information, e.g., foundation of quantum theory, quantum algorithms, quantum entanglement, quantum entropies, quantum coding, quantum error correction and quantum cryptography. The required knowledge is only elementary calculus and linear algebra. This way the book can be understood by undergraduate students. In order to study quantum information, one usually has to study the foundation of quantum theory. This book describes it from more an operational viewpoint which is suitable for quantum information while traditional textbooks of quantum theory lack this viewpoint. The current book bases on Shor's algorithm, Grover's algorithm, Deutsch-Jozsa's algorithm as basic algorithms. To treat several topics in quantum information, this book covers several kinds of information quantities in quantum systems including von Neumann entropy. The limits of several kinds of quantum information processing are given. As important quantum protocols,this book contains quantum teleportation, quantum dense coding, quantum data compression. In particular conversion theory of entanglement via local operation and classical communication are treated too. This theory provides the quantification of entanglement, which coincides with von Neumann entropy. The next part treats the quantum hypothesis testing. The decision problem of two candidates of the unknown state are given. The asymptotic performance of this problem is characterized by information quantities. Using this result, the optimal performance of classical information transmission via noisy quantum channel is derived. Quantum information transmission via noisy quantum channel by quantum error correction are discussed too. Based on this topic, the secure quantum communication is explained. In particular, the quantification of quantum security which has not been treated in existing book is explained. This book treats quantum cryptography from a more practical viewpoint.
Physics. --- Quantum Information Technology, Spintronics. --- Quantum Computing. --- Theoretical, Mathematical and Computational Physics. --- Data Structures, Cryptology and Information Theory. --- Information and Communication, Circuits. --- Data structures (Computer science). --- Mathematics. --- Physique --- Structures de données (Informatique) --- Mathématiques --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Electrical Engineering --- Information theory. --- Quantum computers. --- Spintronics. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Math --- Science --- Mathematical physics. --- Communication theory --- Communication --- Cybernetics --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Physical mathematics --- Physics --- Fluxtronics --- Magnetoelectronics --- Spin electronics --- Spinelectronics --- Microelectronics --- Nanotechnology --- Computers --- Mathematics
Choose an application
Rainbow connections are natural combinatorial measures that are used in applications to secure the transfer of classified information between agencies in communication networks. Rainbow Connections of Graphs covers this new and emerging topic in graph theory and brings together a majority of the results that deal with the concept of rainbow connections, first introduced by Chartrand et al. in 2006. The authors begin with an introduction to rainbow connectedness, rainbow coloring, and rainbow connection number. The work is organized into the following categories, computation of the exact values of the rainbow connection numbers for some special graphs, algorithms and complexity analysis, upper bounds in terms of other graph parameters, rainbow connection for dense and sparse graphs, for some graph classes and graph products, rainbow k-connectivity and k-rainbow index, and, rainbow vertex-connection number. Rainbow Connections of Graphs appeals to researchers and graduate students in the field of graph theory. Conjectures, open problems and questions are given throughout the text with the hope for motivating young graph theorists and graduate students to do further study in this subject.
Graph theory. --- Graphs. --- Mathematics. --- Mathematics --- Physical Sciences & Mathematics --- Algebra --- Graphic methods. --- Graphics --- Graphs --- Data structures (Computer science). --- Number theory. --- Graph Theory. --- Data Structures, Cryptology and Information Theory. --- Number Theory. --- Geometrical drawing --- Least squares --- Mechanical drawing --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Number study --- Numbers, Theory of --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Graph theory --- Graphs, Theory of --- Theory of graphs --- Combinatorial analysis --- Topology --- Extremal problems --- Information theory. --- Communication theory --- Communication --- Cybernetics
Listing 1 - 10 of 412 | << page >> |
Sort by
|