Listing 1 - 10 of 14 | << page >> |
Sort by
|
Choose an application
"Journal of Trust Management encompasses all aspects of computational trust and trust management seen from technical, social, psychological, legal, economical and cultural perspectives."
Computer systems --- Computer security --- Trust --- Systèmes informatiques --- Sécurité informatique --- Confiance --- Reliability --- Periodicals --- Periodicals. --- Fiabilité --- Périodiques --- Computer security. --- Trust. --- Reliability. --- Trust (Psychology) --- Computer privacy --- Computer system security --- Computers --- Electronic digital computers --- Security of computer systems --- ADP systems (Computer systems) --- Computing systems --- Security measures --- Systems, Computer --- Computer Science --- Systems and Data Security --- Software Engineering/Programming and Operating Systems --- Coding and Information Theory --- Data Structures; Cryptology and Information Theory --- Attitude (Psychology) --- Emotions --- Data protection --- Security systems --- Hacking --- Electronic systems --- Cyberinfrastructure --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Choose an application
This book presents interesting, important unsolved problems in the mathematical and computational sciences. The contributing authors are leading researchers in their fields and they explain outstanding challenges in their domains, first by offering basic definitions, explaining the context, and summarizing related algorithms, theorems, and proofs, and then by suggesting creative solutions. The authors feel a strong motivation to excite deep research and discussion in the mathematical and computational sciences community, and the book will be of value to postgraduate students and researchers in the areas of theoretical computer science, discrete mathematics, engineering, and cryptology.
Mathematics --- Computer science --- Informatics --- Computer science. --- Data structures (Computer science). --- Computers. --- Computer mathematics. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Theory of Computation. --- Mathematics of Computing. --- Computational Mathematics and Numerical Analysis. --- Mathematics. --- Science --- Data structures (Computer scienc. --- Information theory. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Communication theory --- Communication --- Cybernetics --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer science—Mathematics. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Machine theory --- Calculators --- Cyberspace
Choose an application
The book is based on the research papers presented in Second International Conference on Recent Advances in Information Technology (RAIT 2014), held at Indian School of Mines, Dhanbad, India. It provides the latest developments in the area of information technology and covers a variety of topics, including Advanced Algorithm Design and Analysis, Algorithmic Graph Theory, Artificial Intelligence, Bioinformatics, Circuit Design Automation, Computational Biology, Computational Mathematics, Cryptology, Data Compression, Database Management System, Data Mining, E-Applications, Embedded System, Information and Network Security, Information Retrieval, Internet Computing, etc. The objective is to familiarize the reader with the latest scientific developments that are taking place in various fields and the latest sophisticated problem solving tools that are being developed to deal with the complex and intricate problems that are otherwise difficult to solve by the usual and traditional methods.
Engineering. --- Computer communication systems. --- Data structures (Computer science). --- Algorithms. --- Computational intelligence. --- Computational Intelligence. --- Computer Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Construction --- Industrial arts --- Technology --- Algorism --- Algebra --- Arithmetic --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Foundations --- Distributed processing --- Information technology --- Data encryption (Computer science) --- Image processing --- Digital techniques --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data structures (Computer scienc. --- Computer software. --- Data Structures and Information Theory. --- Software, Computer --- Computer systems --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Biometrics in the New World takes a fresh look at biometrics and identity management within a fast-changing world. The concept of biometric identity verification is revisited, including identity intelligence, federation and the use of third party infrastructure. Furthermore, the book examines some of the fundamentals of the technology which are often overlooked. However, the dialogue extends beyond technical considerations, and explores some of the broader societal and philosophical aspects surrounding the use of biometric applications, bringing this whole area into a new focus at a time. Topics and features: Presents a brief history of the development of biometrics, and describes some of the popularly held misconceptions surrounding the technology Investigates the challenges and possibilities of biometrics across third party infrastructures and on mobile computing devices Provides guidance on biometric systems design, stressing the importance of an end-to-end approach, together with the alignment with policy and operational procedures Explores the mechanisms necessary to enable identity intelligence, including logging mechanisms, data communications and data formats Discusses such usage issues as collaboration frameworks, and messaging and data translation Examines the impact of biometric technologies on society, for better and worse, covering issues of privacy and user factors Reviews the current situation in identity management and biometric technologies, and predicts where these trends may take us in the future This accessible and thought-provoking work is an essential guide for biometric systems integrators, professional consultancies, government agencies and other consumers of biometric technology. Academics interested in biometrics will also find the book to be a source of valuable insights, as will the casual reader.
Biometrics. --- Computer science. --- Data structures (Computer scienc. --- Social sciences_xData processing. --- Software engineering. --- Biometric identification --- Identification --- Biology --- Health & Biological Sciences --- Biology - General --- Automation --- Forensic identification --- Biometric person authentication --- Biometrics (Identification) --- Special purpose computers. --- Data structures (Computer science). --- Biometrics (Biology). --- Application software. --- Computers and civilization. --- Computer Science. --- Special Purpose and Application-Based Systems. --- Data Structures, Cryptology and Information Theory. --- Software Engineering/Programming and Operating Systems. --- Computer Appl. in Social and Behavioral Sciences. --- Computers and Society. --- Social sciences --- Data Structures and Information Theory. --- Data processing. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer software engineering --- Engineering --- Informatics --- Science --- Biometric identification. --- Automation. --- Anthropometry --- Special purpose computers --- Computers --- Biological statistics --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Statistical methods
Choose an application
In this thesis, the author explains the background of problems in quantum estimation, the necessary conditions required for estimation precision benchmarks that are applicable and meaningful for evaluating data in quantum information experiments, and provides examples of such benchmarks. The author develops mathematical methods in quantum estimation theory and analyzes the benchmarks in tests of Bell-type correlation and quantum tomography with those methods. Above all, a set of explicit formulae for evaluating the estimation precision in quantum tomography with finite data sets is derived, in contrast to the standard quantum estimation theory, which can deal only with infinite samples. This is the first result directly applicable to the evaluation of estimation errors in quantum tomography experiments, allowing experimentalists to guarantee estimation precision and verify quantitatively that their preparation is reliable.
Quantum field theory. --- Quantum measure theory. --- Quantum statistics. --- Quantum theory. --- Physics --- Physical Sciences & Mathematics --- Atomic Physics --- Quantum dynamics --- Quantum mechanics --- Quantum physics --- Quantum statistical mechanics --- Physics. --- Data structures (Computer science). --- Quantum physics. --- Quantum optics. --- Physical measurements. --- Measurement. --- Quantum computers. --- Spintronics. --- Quantum Physics. --- Quantum Information Technology, Spintronics. --- Quantum Optics. --- Measurement Science and Instrumentation. --- Data Structures, Cryptology and Information Theory. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Mechanics --- Thermodynamics --- Measure theory --- Quantum theory --- Matrix mechanics --- Statistical mechanics --- Wave mechanics --- Measurement . --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Measuring --- Mensuration --- Mathematics --- Technology --- Metrology --- Physical measurements --- Measurements, Physical --- Mathematical physics --- Measurement --- Optics --- Photons --- Fluxtronics --- Magnetoelectronics --- Spin electronics --- Spinelectronics --- Microelectronics --- Nanotechnology --- Computers --- Data structures (Computer science)
Choose an application
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user’s password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.
Computer security. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Electrical engineering. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Communications Engineering, Networks. --- Data protection --- Security systems --- Hacking --- Electric engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Distributed processing --- Data encryption (Computer science) --- Cryptography.
Choose an application
Locally computable (NC0) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and they can be realized by Boolean circuits of constant depth. This book establishes, for the first time, the possibility of local implementations for many basic cryptographic primitives such as one-way functions, pseudorandom generators, encryption schemes and digital signatures. It also extends these results to other stronger notions of locality, and addresses a wide variety of fundamental questions about local cryptography. The author's related thesis was honorably mentioned (runner-up) for the ACM Dissertation Award in 2007, and this book includes some expanded sections and proofs, and notes on recent developments. The book assumes only a minimal background in computational complexity and cryptography and is therefore suitable for graduate students or researchers in related areas who are interested in parallel cryptography. It also introduces general techniques and tools which are likely to interest experts in the area.
Cryptography. --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Data structures (Computer science). --- Computer science --- Computer Science. --- Mathematics of Computing. --- Data Structures, Cryptology and Information Theory. --- Mathematics. --- Data protection --- Security systems --- Hacking --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Informatics --- Science --- Computer science—Mathematics. --- Computer mathematics --- Mathematics --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: classical cryptographic constructions, such as Diffie–Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; an in-depth treatment of important cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. The second edition of An Introduction to Mathematical Cryptography includes a significant revision of the material on digital signatures, including an earlier introduction to RSA, Elgamal, and DSA signatures, and new material on lattice-based signatures and rejection sampling. Many sections have been rewritten or expanded for clarity, especially in the chapters on information theory, elliptic curves, and lattices, and the chapter of additional topics has been expanded to include sections on digital cash and homomorphic encryption. Numerous new exercises have been included.
Mathematics. --- Data structures (Computer science). --- Data encryption (Computer science). --- Algebra. --- Ordered algebraic structures. --- Information theory. --- Number theory. --- Number Theory. --- Data Structures, Cryptology and Information Theory. --- Data Encryption. --- Information and Communication, Circuits. --- Order, Lattices, Ordered Algebraic Structures. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cryptology. --- Number study --- Numbers, Theory of --- Algebra --- Mathematics --- Mathematical analysis --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Math --- Science --- Coding theory. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Algebraic structures, Ordered --- Structures, Ordered algebraic --- Communication theory --- Communication --- Cybernetics --- Codage. --- Cryptographie --- Mathématiques. --- Data structures (Computer science) --- Data encryption (Computer science)
Choose an application
This book constitutes the proceedings of the 28th International Symposium on Distributed Computing, DISC 2014, held in Austin, TX, USA, in October 2014. The 35 full papers presented in this volume were carefully reviewed and selected from 148 full paper submissions. In the back matter of the volume a total of 18 brief announcements is presented. The papers are organized in topical sections named: concurrency; biological and chemical networks; agreement problems; robot coordination and scheduling; graph distances and routing; radio networks; shared memory; dynamic and social networks; relativistic systems; transactional memory and concurrent data structures; distributed graph algorithms; and communication.
Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Algorithms. --- Computer Science. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Computer software. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Software, Computer --- Computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Algorism --- Algebra --- Arithmetic --- Distributed processing --- Foundations --- Computer networks. --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.
Computer science. --- Computer Communication Networks. --- Software engineering. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Data Structures, Cryptology and Information Theory. --- Math Applications in Computer Science. --- Models and Principles. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Computer software engineering --- Informatics --- Computer communication systems. --- Computer science --- Computers. --- Mathematics. --- Computer security --- Software engineering --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Engineering --- Cryptography --- Science --- Computer science—Mathematics. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing --- Seguridad informática
Listing 1 - 10 of 14 | << page >> |
Sort by
|