Listing 1 - 10 of 1942 | << page >> |
Sort by
|
Choose an application
This book constitutes the revised selected papers from the workshops affiliated with the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which took place in Bol, Brač, Croatia, in May 2023. The 7 full papers presented in this book were carefully reviewed and selected from 18 submissions. They stem from the following workshops: CoDecFin 2022: 3rd Workshop on Coordination of Decentralized Finance DeFi 2022: 2nd Workshop on Decentralized Finance Voting 2022: 7th Workshop on Advances in Secure Electronic Voting WTSC 2022: 6th Workshop on Trusted Smart Contracts.
Cryptography. --- Data encryption (Computer science). --- Cryptology.
Choose an application
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.
Cryptography. --- Data encryption (Computer science). --- Cryptology.
Choose an application
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation. .
Cryptography. --- Data encryption (Computer science). --- Cryptology.
Choose an application
"Learn to develop blockchain-based distributed ledgers and deploy a Hyperledger Fabric network with concrete exercises and examples Key Features Updated with the latest features and additions that come with Hyperledger Fabric 2 Write your own smart contracts and services using Java and JavaScript on a Hyperledger Fabric network Dive into real-world blockchain challenges such as integration and scalability Book Description Blockchain with Hyperledger Fabric - Second Edition is a refreshed and extended version of the successful book on practical Hyperledger Fabric blockchain development. This edition includes many new chapters, alongside comprehensive updates and additions to the existing ones. Entirely reworked for Hyperledger Fabric version 2, this edition will bring you right up to date with the latest in blockchain. Using a real-world Trade Finance and Logistics example, with working code available on GitHub, you'll really understand both how and why Hyperledger Fabric can be used to maximum effect. This book is your comprehensive guide and reference to explore and build blockchain networks using Hyperledger Fabric version 2. This edition of the book begins by outlining the evolution of blockchain, including an overview of relevant blockchain technologies. Starting from first principles, you'll learn how to design and operate a permissioned blockchain network based on Hyperledger Fabric version 2. You will learn how to configure the main architectural components of a permissioned blockchain network including Peers, Orderers, Certificate Authorities, Channels, and Policies. You'll then learn how to design, develop, package, and deploy smart contracts, and how they are subsequently used by applications. This edition also contains chapters on DevOps, blockchain governance, and security, making this your go-to book for Hyperledger Fabric version 2. What you will learn Discover why blockchain is a technology and business game changer Set up blockchain networks using Hyperledger Fabric version 2 Understand how to create decentralized applications Learn how to integrate blockchains with existing systems Write smart contracts and services quickly with Hyperledger Fabric and Visual Studio Code Design transaction models and smart contracts with Java, JavaScript, TypeScript, and Golang Deploy REST gateways to access smart contracts and understand how wallets maintain user identities for access control Maintain, monitor, and govern your blockchain solutions Who this book is for This book is designed in such a way that professionals from different areas including business leaders, technology leaders, blockchain application developers, and even beginners can benefit from it." -- Publisher's description.
Coding theory & cryptology. --- Database design & theory. --- Data mining.
Choose an application
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise’s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization’s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities.
Data protection. --- Data encryption (Computer science). --- Security. --- Cryptology.
Choose an application
Periodicals --- Isecure --- Information --- security --- cryptology --- Cryptography --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- isecure --- information
Choose an application
Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
block cipher --- implementation --- symmetric cryptology --- stream cipher --- hash function --- cryptanalysis --- Cryptography --- Ciphers
Choose an application
Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
Mathematical Sciences --- Applied Mathematics --- mathematical cryptology --- information security --- theory of cryptology --- quantum cryptology --- algebraic geometry --- coding theory --- Coding theory --- Cryptography --- Mathematics --- Mathematics. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Listing 1 - 10 of 1942 | << page >> |
Sort by
|