Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Applied Cryptography and Network Security
  • Language: en
  • Pages: 615

Applied Cryptography and Network Security

  • Type: Book
  • -
  • Published: 2019-05-28
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques.

Secure Multiparty Computation
  • Language: en
  • Pages: 385

Secure Multiparty Computation

This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating relationship between the two concepts.

Cybersecurity
  • Language: en
  • Pages: 383

Cybersecurity

  • Type: Book
  • -
  • Published: 2022-04-27
  • -
  • Publisher: CRC Press

Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification of the solutions as well as their efficiency. The process follows an engineering process model. Each module builds on a subset of the risks, discussing the knowledge necessary to approach a solution, followed by the security control architecture design and the implementation. The modular approach allows students to focus on more manageable problems, making the learning process simpler and more attractive.

Public-Key Cryptography -- PKC 2015
  • Language: en
  • Pages: 820

Public-Key Cryptography -- PKC 2015

  • Type: Book
  • -
  • Published: 2015-03-16
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.

Post-Quantum Cryptography
  • Language: en
  • Pages: 268

Post-Quantum Cryptography

  • Type: Book
  • -
  • Published: 2013-06-04
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations.

Applied Cryptography and Network Security Workshops
  • Language: en
  • Pages: 200

Applied Cryptography and Network Security Workshops

  • Type: Book
  • -
  • Published: 2019-08-13
  • -
  • Publisher: Springer

This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. They stem from the following workshops: AIBlock 2019: First International Workshop on Application Intelligence and Blockchain SecurityAIoTS 2019:First International Workshop on Articial Intelligence and Industrial Internet-of-Things SecurityCloud S&P 2019:First International Workshop on Cloud Security and PrivacyPriDA 2019:First InternationalWorkshop on Privacy-preserving Distributed Data AnalysisSiMLA 2019: First International Workshop on Security in Machine Learning and its Applications

Algebraic Geometry for Coding Theory and Cryptography
  • Language: en
  • Pages: 160

Algebraic Geometry for Coding Theory and Cryptography

  • Type: Book
  • -
  • Published: 2017-11-15
  • -
  • Publisher: Springer

Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM). The conference gathered research communities across disciplines to share ideas and problems in their fields and formed small research groups made up of graduate students, postdoctoral researchers, junior faculty, and group leaders who designed and led the projects. Peer reviewed and revised, each of this volume's five papers achieves the conference’s goal of using algebraic geometry to address a problem in either coding theory or cryptography. Proposed variants of the McEliece cryptosystem based on different constructions of codes, constructions of locally recoverable codes from algebraic curves and surfaces, and algebraic approaches to the multicast network coding problem are only some of the topics covered in this volume. Researchers and graduate-level students interested in the interactions between algebraic geometry and both coding theory and cryptography will find this volume valuable.

Advances in Cryptology - ASIACRYPT 2010
  • Language: en
  • Pages: 646

Advances in Cryptology - ASIACRYPT 2010

  • Type: Book
  • -
  • Published: 2010-12-02
  • -
  • Publisher: Springer

Annotation. This book constitutes the refereed proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2010, held in Singapore, in December 2010. The 35 revised full papers presented were carefully reviewed and selected from 216 submissions. The papers are organized in topical sections on hash attacks; symmetric-key cryptosystems; block and stream ciphers; protocols; key exchange; foundation; zero-knowledge; lattice-based cryptography; secure communication and computation; models, notions, and assumptions; and public-key encryption.

Voces diversas y disruptivas en tiempos de Revolución 4.0
  • Language: es
  • Pages: 232

Voces diversas y disruptivas en tiempos de Revolución 4.0

Voces diversas y disruptivas en tiempos de Revolución 4.0 es una recopilación de reflexiones de distintas voces, provenientes de diferentes sectores (académicos, empresariales y gubernamentales) y áreas de conocimiento. Propone enriquecer la discusión actual, desde la propia lectura de los autores, sobrecómo entender los retos y oportunidades de esta revolución de pensamiento y, así, transformar Colombia en la era digital para ser un país más justo, incluyente y competitivo.

Transformación digital en las organizaciones
  • Language: es
  • Pages: 249

Transformación digital en las organizaciones

Este libro aborda aspectos fundamentales de la transformación digital en las organizaciones, y a través de estas, en la sociedad en general. Especialistas de diversos campos disciplinares y contextos, así como líderes con experiencia en la realización de este tipo de iniciativas en organizaciones de diversos tipos y tamaños, abordan los orígenes, los fundamentos y las implicaciones de esta importante transformación. La transformación digital conduce a las organizaciones a considerar la implementación de múltiples iniciativas tecnológicas, pero también, a la realización de diversas acciones en lo social, lo cultural, lo político, lo económico, lo ecológico y lo normativo, en ...