Narrow your search

Library

KU Leuven (14)

Odisee (14)

Thomas More Kempen (14)

Thomas More Mechelen (14)

UCLL (14)

ULB (14)

ULiège (14)

VIVES (14)

AP (1)

HZS (1)

More...

Resource type

book (13)

periodical (1)


Language

English (14)


Year
From To Submit

2014 (14)

Listing 1 - 10 of 14 << page
of 2
>>
Sort by

Periodical
Journal of trust management
Author:
ISSN: 2196064X Year: 2014


Book
Open Problems in Mathematics and Computational Science
Author:
ISBN: 3319106821 331910683X Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents interesting, important unsolved problems in the mathematical and computational sciences. The contributing authors are leading researchers in their fields and they explain outstanding challenges in their domains, first by offering basic definitions, explaining the context, and summarizing related algorithms, theorems, and proofs, and then by suggesting creative solutions.   The authors feel a strong motivation to excite deep research and discussion in the mathematical and computational sciences community, and the book will be of value to postgraduate students and researchers in the areas of theoretical computer science, discrete mathematics, engineering, and cryptology.


Book
Recent Advances in Information Technology : RAIT-2014 Proceedings
Authors: ---
ISBN: 8132218566 8132218558 Year: 2014 Publisher: New Delhi : Springer India : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book is based on the research papers presented in Second International Conference on Recent Advances in Information Technology (RAIT 2014), held at Indian School of Mines, Dhanbad, India. It provides the latest developments in the area of information technology and covers a variety of topics, including Advanced Algorithm Design and Analysis, Algorithmic Graph Theory, Artificial Intelligence, Bioinformatics, Circuit Design Automation, Computational Biology, Computational Mathematics, Cryptology, Data Compression, Database Management System, Data Mining, E-Applications, Embedded System, Information and Network Security, Information Retrieval, Internet Computing, etc. The objective is to familiarize the reader with the latest scientific developments that are taking place in various fields and the latest sophisticated problem solving tools that are being developed to deal with the complex and intricate problems that are otherwise difficult to solve by the usual and traditional methods.

Keywords

Engineering. --- Computer communication systems. --- Data structures (Computer science). --- Algorithms. --- Computational intelligence. --- Computational Intelligence. --- Computer Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Construction --- Industrial arts --- Technology --- Algorism --- Algebra --- Arithmetic --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Foundations --- Distributed processing --- Information technology --- Data encryption (Computer science) --- Image processing --- Digital techniques --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data structures (Computer scienc. --- Computer software. --- Data Structures and Information Theory. --- Software, Computer --- Computer systems --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Biometrics in the New World : The Cloud, Mobile Technology and Pervasive Identity
Author:
ISBN: 3319041584 3319041592 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Biometrics in the New World takes a fresh look at biometrics and identity management within a fast-changing world. The concept of biometric identity verification is revisited, including identity intelligence, federation and the use of third party infrastructure. Furthermore, the book examines some of the fundamentals of the technology which are often overlooked. However, the dialogue extends beyond technical considerations, and explores some of the broader societal and philosophical aspects surrounding the use of biometric applications, bringing this whole area into a new focus at a time. Topics and features: Presents a brief history of the development of biometrics, and describes some of the popularly held misconceptions surrounding the technology Investigates the challenges and possibilities of biometrics across third party infrastructures and on mobile computing devices Provides guidance on biometric systems design, stressing the importance of an end-to-end approach, together with the alignment with policy and operational procedures Explores the mechanisms necessary to enable identity intelligence, including logging mechanisms, data communications and data formats Discusses such usage issues as collaboration frameworks, and messaging and data translation Examines the impact of biometric technologies on society, for better and worse, covering issues of privacy and user factors Reviews the current situation in identity management and biometric technologies, and predicts where these trends may take us in the future This accessible and thought-provoking work is an essential guide for biometric systems integrators, professional consultancies, government agencies and other consumers of biometric technology. Academics interested in biometrics will also find the book to be a source of valuable insights, as will the casual reader.

Keywords

Biometrics. --- Computer science. --- Data structures (Computer scienc. --- Social sciences_xData processing. --- Software engineering. --- Biometric identification --- Identification --- Biology --- Health & Biological Sciences --- Biology - General --- Automation --- Forensic identification --- Biometric person authentication --- Biometrics (Identification) --- Special purpose computers. --- Data structures (Computer science). --- Biometrics (Biology). --- Application software. --- Computers and civilization. --- Computer Science. --- Special Purpose and Application-Based Systems. --- Data Structures, Cryptology and Information Theory. --- Software Engineering/Programming and Operating Systems. --- Computer Appl. in Social and Behavioral Sciences. --- Computers and Society. --- Social sciences --- Data Structures and Information Theory. --- Data processing. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer software engineering --- Engineering --- Informatics --- Science --- Biometric identification. --- Automation. --- Anthropometry --- Special purpose computers --- Computers --- Biological statistics --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Statistical methods


Book
Finite Sample Analysis in Quantum Estimation
Author:
ISSN: 21905061 ISBN: 4431547762 4431547770 Year: 2014 Publisher: Tokyo : Springer Japan : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In this thesis, the author explains the background of problems in quantum estimation, the necessary conditions required for estimation precision benchmarks that are applicable and meaningful for evaluating data in quantum information experiments, and provides examples of such benchmarks. The author develops mathematical methods in quantum estimation theory and analyzes the benchmarks in tests of Bell-type correlation and quantum tomography with those methods. Above all, a set of explicit formulae for evaluating the estimation precision in quantum tomography with finite data sets is derived, in contrast to the standard quantum estimation theory, which can deal only with infinite samples. This is the first result directly applicable to the evaluation of estimation errors in quantum tomography experiments, allowing experimentalists to guarantee estimation precision and verify quantitatively that their preparation is reliable.


Book
Dynamic secrets in communication security
Authors: --- ---
ISBN: 1461478308 1461478316 Year: 2014 Publisher: New York : Springer Science,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user’s password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.

Keywords

Computer security. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Electrical engineering. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Communications Engineering, Networks. --- Data protection --- Security systems --- Hacking --- Electric engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Distributed processing --- Data encryption (Computer science) --- Cryptography.


Book
Cryptography in constant parallel time
Author:
ISBN: 3642173667 3642173675 Year: 2014 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Locally computable (NC0) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and they can be realized by Boolean circuits of constant depth.  This book establishes, for the first time, the possibility of local implementations for many basic cryptographic primitives such as one-way functions, pseudorandom generators, encryption schemes and digital signatures. It also extends these results to other stronger notions of locality, and addresses a wide variety of fundamental questions about local cryptography. The author's related thesis was honorably mentioned (runner-up) for the ACM Dissertation Award in 2007, and this book includes some expanded sections and proofs, and notes on recent developments.  The book assumes only a minimal background in computational complexity and cryptography and is therefore suitable for graduate students or researchers in related areas who are interested in parallel cryptography. It also introduces general techniques and tools which are likely to interest experts in the area.


Book
An Introduction to Mathematical Cryptography
Authors: --- ---
ISBN: 1493917102 1493917110 9781493917105 Year: 2014 Publisher: New York, NY : Springer New York : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: classical cryptographic constructions, such as Diffie–Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; an in-depth treatment of important cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. The second edition of An Introduction to Mathematical Cryptography includes a significant revision of the material on digital signatures, including an earlier introduction to RSA, Elgamal, and DSA signatures, and new material on lattice-based signatures and rejection sampling. Many sections have been rewritten or expanded for clarity, especially in the chapters on information theory, elliptic curves, and lattices, and the chapter of additional topics has been expanded to include sections on digital cash and homomorphic encryption. Numerous new exercises have been included.


Book
Distributed Computing : 28th International Symposium DISC 2014, Austin, TX, USA, October 12-15, 2014, Proceedings
Author:
ISBN: 3662451735 3662451743 Year: 2014 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 28th International Symposium on Distributed Computing, DISC 2014, held in Austin, TX, USA, in October 2014. The 35 full papers presented in this volume were carefully reviewed and selected from 148 full paper submissions. In the back matter of the volume a total of 18 brief announcements is presented. The papers are organized in topical sections named: concurrency; biological and chemical networks; agreement problems; robot coordination and scheduling; graph distances and routing; radio networks; shared memory; dynamic and social networks; relativistic systems; transactional memory and concurrent data structures; distributed graph algorithms; and communication.


Book
Engineering Secure Software and Systems : 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings
Authors: --- ---
ISBN: 3319048961 331904897X Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.

Keywords

Computer science. --- Computer Communication Networks. --- Software engineering. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Data Structures, Cryptology and Information Theory. --- Math Applications in Computer Science. --- Models and Principles. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Computer software engineering --- Informatics --- Computer communication systems. --- Computer science --- Computers. --- Mathematics. --- Computer security --- Software engineering --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Engineering --- Cryptography --- Science --- Computer science—Mathematics. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing --- Seguridad informática

Listing 1 - 10 of 14 << page
of 2
>>
Sort by