You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Security for Information Technology and Communications, SecITC 2019, held in Bucharest, Romania, in November 2019. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 34 submissions. The papers present a wide range from cryptographic algorithms, to digital forensic and cyber security.
This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019. The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things.
This open access book LNCS 13353 constitutes the proceedings of the 7th International Conference on Electronic Voting, E-Vote-ID 2022, held in Bregenz, Austria, in October 2022. The 10 full papers presented were carefully reviewed and selected from 39 submissions. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others.
This book constitutes the proceedings of the 26th International Conference on Computing and Combinatorics, COCOON 2020, held in Atlanta, GA, USA, in August 2020. Due to the COVID-19 pandemic COCOON 2020 was organized as a fully online conference. The 54 papers presented in this volume were carefully reviewed and selected from 126 submissions. The papers cover various topics, including algorithm design, approximation algorithm, graph theory, complexity theory, problem solving, optimization, computational biology, computational learning, communication network, logic, and game theory.
This book provides a broad overview of cryptography and enables cryptography for trying out. It emphasizes the connections between theory and practice, focuses on RSA for introducing number theory and PKI, and links the theory to the most current recommendations from NIST and BSI. The book also enables readers to directly try out the results with existing tools available as open source. It is different from all existing books because it shows very concretely how to execute many procedures with different tools. The target group could be self-learners, pupils and students, but also developers and users in companies. All code written with these open-source tools is available. The appendix describes in detail how to use these tools. The main chapters are independent from one another. At the end of most chapters, you will find references and web links. The sections have been enriched with many footnotes. Within the footnotes you can see where the described functions can be called and tried within the different CrypTool versions, within SageMath or within OpenSSL.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020. The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2023, held in Bucharest, Romania, in November 2023. The 14 full papers included in the book were carefully reviewed and selected from 57 submissions. They focus on all theoretical and practical aspects related to information technology and communications security.
Kryptografie: Die unsichtbare Macht hinter unserer digitalen Welt Seit Jahrhunderten schützen Könige, Feldherren und Geheimdienste ihre Nachrichten durch Kryptografie. Heute sichert sie den Alltag von uns allen – ob in Browsern, Smartphones, Herzschrittmachern, Bankautomaten, Autos oder der Cloud – unsichtbar, aber unverzichtbar. Dieses Buch bietet eine umfassende und aktuelle Einführung in Kryptografie und Kryptoanalyse. Es beleuchtet sowohl die wissenschaftlichen Grundlagen als auch praxisrelevante Anwendungen (Risikomanagement, Empfehlungen BSI und NIST). Kostenlose Open-Source Lern-Software wie CrypTool wird benutzt, um auch komplexe Themen greifbar und spielerisch-interaktiv erfahrbar zu machen. Viele Aussagen werden anhand von lauffähigen SageMath-Beispielen durchgerechnet. Diese einzigartige Kombination macht das Buch besonders wertvoll. Die Themen wurden gemeinsam mit Experten entwickelt und erscheinen erstmals in dieser Form auf Deutsch. Für historisch Interessierte, autodidaktisch Lernende, Studierende und Lehrende, aber auch Praktiker bietet dieses Werk einen besonderen Zugang zur Welt der Kryptografie.
Depuis la révolution numérique, les conflits géopolitiques se déploient dans des espaces virtuels dont la nature est en constante évolution. Qu’ils soient démocratiques ou autoritaires, les États adaptent leur stratégie de puissance de façon à mieux maîtriser les effets de la propagation instantanée de l’information, ainsi que ses nouvelles possibilités de manipulation. Certains utilisent le cyber et les médias pour porter atteinte à la souveraineté de leurs adversaires et perturber le fonctionnement de leur société et de leurs infrastructures de défense. Cet ouvrage étudie les trois dimensions qui caractérisent les guerres de l’information. Il explore le fonctionn...
With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book have contributed to this field significantly through numerous fundamental papers.