Cryptography

Cryptography

Author: Riccardo Bernardini

Publisher: BoD – Books on Demand

Published: 2021-08-18

Total Pages: 154

ISBN-13: 1839625651

DOWNLOAD EBOOK

Despite being 2000 years old, cryptography is still a very active field of research. New needs and application fields, like privacy, the Internet of Things (IoT), physically unclonable functions (PUFs), post-quantum cryptography, and quantum key distribution, will keep fueling the work in this field. This book discusses quantum cryptography, lightweight cryptography for IoT, PUFs, cryptanalysis, and more. It provides a snapshot of some recent research results in the field, providing readers with some useful tools and stimulating new ideas and applications for future investigation.


Information Modelling and Knowledge Bases XXXV

Information Modelling and Knowledge Bases XXXV

Author: M. Tropmann-Frick

Publisher: IOS Press

Published: 2024-02

Total Pages: 342

ISBN-13: 1643684779

DOWNLOAD EBOOK

The volume and complexity of information, together with the number of abstraction levels and the size of data and knowledge bases, grow continually. Data originating from diverse sources involves a combination of data from traditional legacy sources and unstructured data requiring backwards modeling, meanwhile, information modeling and knowledge bases have become important contributors to 21st-century academic and industrial research. This book presents the proceedings of EJC 2023, the 33rd International Conference on Information Modeling and Knowledge Bases, held from 5 to 9 June 2023 in Maribor, Slovenia. The aim of the EJC conferences is to bring together experts from different areas of computer science and from other disciplines that share the common interest of understanding and solving the problems of information modeling and knowledge bases and applying the results of research to practice. The conference constitutes a research forum for the exchange of results and experiences by academics and practitioners dealing with information and knowledge bases. The topics covered at EJC 2023 encompass a wide range of themes including conceptual modeling; knowledge and information modeling and discovery; linguistic modeling; cross-cultural communication and social computing; environmental modeling and engineering; and multimedia data modeling and systems. In the spirit of adapting to the changes taking place in these areas of research, the conference was also open to new topics related to its main themes. Providing a current overview of progress in the field, this book will be of interest to all those whose work involves the use of information modeling and knowledge bases.


Advances in Information and Computer Security

Advances in Information and Computer Security

Author: Kazuto Ogawa

Publisher: Springer

Published: 2016-09-08

Total Pages: 335

ISBN-13: 3319445243

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 11th International Workshop on Security, IWSEC 2016, held in Tokyo, Japan, in September 2016. The 15 regular papers and 4 short papers presented in this volume were carefully reviewed and selected from 53 submissions. They were organized in topical sections named: system security; searchable encryption; cryptanalysis; permutation and symmetric encryption; privacy preserving; hardware security; post-quantum cryptography; and paring computation.


Handbook of Formal Analysis and Verification in Cryptography

Handbook of Formal Analysis and Verification in Cryptography

Author: Sedat Akleylek

Publisher: CRC Press

Published: 2023-09-18

Total Pages: 445

ISBN-13: 1000955478

DOWNLOAD EBOOK

This handbook of formal analysis in cryptography is very important for secure communication and processing of information. It introduces readers to several formal verification methods and software used to analyse cryptographic protocols. The chapters give readers general knowledge and formal methods focusing on cryptographic protocols. Handbook of Formal Analysis and Verification in Cryptography includes major formalisms and tools used for formal verification of cryptography, with a spotlight on new-generation cryptosystems such as post-quantum, and presents a connection between formal analysis and cryptographic schemes. The text offers formal methods to show whether security assumptions are valid and compares the most prominent formalism and tools as they outline common challenges and future research directions. Graduate students, researchers, and engineers worldwide will find this an exciting read.


Computer Security -- ESORICS 2013

Computer Security -- ESORICS 2013

Author: Jason Crampton

Publisher: Springer

Published: 2013-08-15

Total Pages: 810

ISBN-13: 3642402038

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013. The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.


Human-Computer Interaction and Cybersecurity Handbook

Human-Computer Interaction and Cybersecurity Handbook

Author: Abbas Moallem

Publisher: CRC Press

Published: 2018-10-03

Total Pages: 532

ISBN-13: 1351730762

DOWNLOAD EBOOK

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019 Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2018 Cybersecurity, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that experts in cybersecurity focus on, both from a human–computer interaction point of view, and that of human factors. This handbook is a unique source of information from the human factors perspective that covers all topics related to the discipline. It includes new areas such as smart networking and devices, and will be a source of information for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management. Features Covers all areas of human–computer interaction and human factors in cybersecurity Includes information for IT specialists, who often desire more knowledge about the human side of cybersecurity Provides a reference for other disciplines such as psychology, behavioral science, software engineering, and security management Offers a source of information for cybersecurity practitioners in government agencies and private enterprises Presents new areas such as smart networking and devices


Computer and Network Security Essentials

Computer and Network Security Essentials

Author: Kevin Daimi

Publisher: Springer

Published: 2017-08-12

Total Pages: 609

ISBN-13: 3319584243

DOWNLOAD EBOOK

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers. Complementary slides are available for download on the book’s website at Springer.com.