You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Information Hiding, IH 2004, held in Toronto, Canada in August 2004. The 25 revised full papers presented were carefully selected during two rounds of reviewing and revision from 70 papers submitted. The papers are organized in topical sections on digital media watermarking, steganalysis, forensic applications, steganography, software watermarking, security and privacy, anonymity, and data hiding in unusual content.
Examines the governance challenges of cybersecurity through twelve, real-world case studies Through twelve detailed case studies, this superb collection provides an overview of the ways in which government officials and corporate leaders across the globe are responding to the challenges of cybersecurity. Drawing perspectives from industry, government, and academia, the book incisively analyzes the actual issues, and provides a guide to the continually evolving cybersecurity ecosystem. It charts the role that corporations, policymakers, and technologists are playing in defining the contours of our digital world. Rewired: Cybersecurity Governance places great emphasis on the interconnection of...
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.
This book presents a collection of research papers that address the challenge of how to develop software in a principled way that, in particular, enables reasoning. The individual papers approach this challenge from various perspectives including programming languages, program verification, and the systematic variation of software. Topics covered include programming abstractions for concurrent and distributed software, specification and verification techniques for imperative programs, and development techniques for software product lines. With this book the editors and authors wish to acknowledge – on the occasion of his 60th birthday – the work of Arnd Poetzsch-Heffter, who has made maj...
th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19–21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applicatio...
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
Blockchain technology is bringing together concepts and operations from several fields, including computing, communications networks, cryptography, and has broad implications and consequences thus encompassing a wide variety of domains and issues, including Network Science, computer science, economics, law, geography, etc. The aim of the paper is to provide a synthetic sketch of issues raised by the development of Blockchains and Cryptocurrencies, these issues are mainly presented through the link between on one hand the technological aspects, i.e. involved technologies and networks structures, and on the other hand the issues raised from applications to implications. We believe the link is a two-sided one. The goal is that it may contribute facilitating bridges between research areas.
In recent decades, the culture, society, politics, and economics of Bahrain have been transformed, driving its global ambitions while retaining to a degree the rule of law and cosmopolitanism. Islam and Capitalism in the Making of Modern Bahrain examines the transformation of Bahrain from the 1930s, from a regional trading port and then an important oil producer into the financial hub for the Gulf and into a global centre of Islamic finance. It focuses on the changes and tensions that transformation brought to Bahrain's political, legal, economic, religious, and social structures. In this book, Rajeswary Brown explores the rising force of youth populism driven by the persistence of poverty and unemployment, notably among rural Shi'ite communities and unemployed middle-class youth, as well as examining Bahrain's skillful reconciliation of the demands of Islamic faith, expressed in the Sharia, to the requirements of modern financial capitalism. In this, Bahrain's experience can be set against the modern history of much of the rest of the Middle East, most strikingly with respect to the position of Islamic charities, notably in Syria, comparisons of which are fully explored here.
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such examp...
In this thesis we study device-independent quantum key distribution based on energy-time entanglement. This is a method for cryptography that promises not only perfect secrecy, but also to be a practical method for quantum key distribution thanks to the reduced complexity when compared to other quantum key distribution protocols. However, there still exist a number of loopholes that must be understood and eliminated in order to rule out eavesdroppers. We study several relevant loopholes and show how they can be used to break the security of energy-time entangled systems. Attack strategies are reviewed as well as their countermeasures, and we show how full security can be re-established. Quan...