You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition 5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography and Security provides easy, intuitive access to information on all aspects of cryptography and security. As ...
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not deny later on that the document was signed by him/her. Cryptology addresses the above issues. It is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical of nature. This book serves as an introduc...
Electronic commerce is here to stay. No matter how big the dot-com crisis was or how far the e-entrepreneurs' shares fell in the market, the fact remains that there is still confidence in electronic trading. At least it would appear that investors are confident in e-companies again. However, not only trust of venture capitalists is of importance -- consumers also have to have faith in on-line business. After all, without consumers there is no e-business. Interacting lawyers, technicians and economists are needed to create a trustworthy electronic commerce environment. To achieve this environment, thorough and inter-disciplinary research is required and that is exactly what this book is about. Researchers of the project Enabling Electronic Commerce from the Dutch universities of Tilburg and Eindhoven have chosen a number of e-topics to elaborate on trust from their point of view. This volume makes clear that the various disciplines can and will play a role in developing conditions for trust and thus contribute to a successful electronic market.
Speech coding has been an ongoing area of research for several decades, yet the level of activity and interest in this area has expanded dramatically in the last several years. Important advances in algorithmic techniques for speech coding have recently emerged and excellent progress has been achieved in producing high quality speech at bit rates as low as 4.8 kb/s. Although the complexity of the newer more sophisticated algorithms greatly exceeds that of older methods (such as ADPCM), today's powerful programmable signal processor chips allow rapid technology transfer from research to product development and permit many new cost-effective applications of speech coding. In particular, low bit rate voice technology is converging with the needs of the rapidly evolving digital telecom munication networks. The IEEE Workshop on Speech Coding for Telecommunications was held in Vancouver, British Columbia, Canada, from September 5 to 8, 1989. The objective of the workshop was to provide a forum for discussion of recent developments and future directions in speech coding. The workshop attracted over 130 researchers from several countries and its technical program included 51 papers.
Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM). The conference gathered research communities across disciplines to share ideas and problems in their fields and formed small research groups made up of graduate students, postdoctoral researchers, junior faculty, and group leaders who designed and led the projects. Peer reviewed and revised, each of this volume's five papers achieves the conference’s goal of using algebraic geometry to address a problem in either coding theory or cryptography. Proposed variants of the McEliece cryptosystem based on different constructions of codes, constructions of locally recoverable codes from algebraic curves and surfaces, and algebraic approaches to the multicast network coding problem are only some of the topics covered in this volume. Researchers and graduate-level students interested in the interactions between algebraic geometry and both coding theory and cryptography will find this volume valuable.
MIMO Processing for 4G and Beyond: Fundamentals and Evolution offers a cutting-edge look at multiple-input multiple-output (MIMO) signal processing, namely its detection (in both time and frequency domains) and precoding. It examines its integration with OFDM, UWB, and CDMA, along with the impact of these combinations at the system level. Massive M
This book constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000. The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a total of 81 submissions. The book offers topical sections on network security, public key cryptography, cryptographic implementation issues, electronic commerce, key recovery, public key infrastructure, Boolean functions, intrusion detection, codes, digital signatures, secret sharing, and protocols.
Speech and Audio Coding for Wireless and Network Applications contains 34 chapters, loosely grouped into six topical areas. The chapters in this volume reflect the progress and present the state of the art in low-bit-rate speech coding, primarily at bit rates from 2.4 kbit/s to 16 kbit/s. Together they represent important contributions from leading researchers in the speech coding community. Speech and Audio Coding for Wireless and Network Applications contains contributions describing technologies that are under consideration as standards for such applications as digital cellular communications (the half-rate American and European coding standards). A brief Introduction is followed by a sec...
This volume contains the proceedings of the 11th International Conference on Finite Fields and their Applications (Fq11), held July 22-26, 2013, in Magdeburg, Germany. Finite Fields are fundamental structures in mathematics. They lead to interesting deep problems in number theory, play a major role in combinatorics and finite geometry, and have a vast amount of applications in computer science. Papers in this volume cover these aspects of finite fields as well as applications in coding theory and cryptography.