Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Innovative Security Solutions for Information Technology and Communications
  • Language: en
  • Pages: 257

Innovative Security Solutions for Information Technology and Communications

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Security for Information Technology and Communications, SecITC 2019, held in Bucharest, Romania, in November 2019. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 34 submissions. The papers present a wide range from cryptographic algorithms, to digital forensic and cyber security.

Information Security Theory and Practice
  • Language: en
  • Pages: 254

Information Security Theory and Practice

This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019. The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things.

Electronic Voting
  • Language: en
  • Pages: 197

Electronic Voting

This open access book LNCS 13353 constitutes the proceedings of the 7th International Conference on Electronic Voting, E-Vote-ID 2022, held in Bregenz, Austria, in October 2022. The 10 full papers presented were carefully reviewed and selected from 39 submissions. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others.

Computing and Combinatorics
  • Language: en
  • Pages: 678

Computing and Combinatorics

This book constitutes the proceedings of the 26th International Conference on Computing and Combinatorics, COCOON 2020, held in Atlanta, GA, USA, in August 2020. Due to the COVID-19 pandemic COCOON 2020 was organized as a fully online conference. The 54 papers presented in this volume were carefully reviewed and selected from 126 submissions. The papers cover various topics, including algorithm design, approximation algorithm, graph theory, complexity theory, problem solving, optimization, computational biology, computational learning, communication network, logic, and game theory.

Learning and Experiencing Cryptography with CrypTool and SageMath
  • Language: en
  • Pages: 665

Learning and Experiencing Cryptography with CrypTool and SageMath

  • Type: Book
  • -
  • Published: 2023-12-31
  • -
  • Publisher: Artech House

This book provides a broad overview of cryptography and enables cryptography for trying out. It emphasizes the connections between theory and practice, focuses on RSA for introducing number theory and PKI, and links the theory to the most current recommendations from NIST and BSI. The book also enables readers to directly try out the results with existing tools available as open source. It is different from all existing books because it shows very concretely how to execute many procedures with different tools. The target group could be self-learners, pupils and students, but also developers and users in companies. All code written with these open-source tools is available. The appendix describes in detail how to use these tools. The main chapters are independent from one another. At the end of most chapters, you will find references and web links. The sections have been enriched with many footnotes. Within the footnotes you can see where the described functions can be called and tried within the different CrypTool versions, within SageMath or within OpenSSL.

Innovative Security Solutions for Information Technology and Communications
  • Language: en
  • Pages: 312

Innovative Security Solutions for Information Technology and Communications

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020. The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more.

Innovative Security Solutions for Information Technology and Communications
  • Language: en
  • Pages: 228

Innovative Security Solutions for Information Technology and Communications

This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2023, held in Bucharest, Romania, in November 2023. The 14 full papers included in the book were carefully reviewed and selected from 57 submissions. They focus on all theoretical and practical aspects related to information technology and communications security.

Les guerres de l'information à l'ère numérique
  • Language: fr
  • Pages: 422

Les guerres de l'information à l'ère numérique

  • Type: Book
  • -
  • Published: 2021-01-13T00:00:00+01:00
  • -
  • Publisher: PUF

Depuis la révolution numérique, les conflits géopolitiques se déploient dans des espaces virtuels dont la nature est en constante évolution. Qu’ils soient démocratiques ou autoritaires, les États adaptent leur stratégie de puissance de façon à mieux maîtriser les effets de la propagation instantanée de l’information, ainsi que ses nouvelles possibilités de manipulation. Certains utilisent le cyber et les médias pour porter atteinte à la souveraineté de leurs adversaires et perturber le fonctionnement de leur société et de leurs infrastructures de défense. Cet ouvrage étudie les trois dimensions qui caractérisent les guerres de l’information. Il explore le fonctionn...

Trustworthy Hardware Design: Combinational Logic Locking Techniques
  • Language: en
  • Pages: 142

Trustworthy Hardware Design: Combinational Logic Locking Techniques

With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book have contributed to this field significantly through numerous fundamental papers.

A Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics
  • Language: en
  • Pages: 249

A Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics

Cryptography, the art and science of creating secret codes, and cryptanalysis, the art and science of breaking secret codes, underwent a similar and parallel course during history. Both fields evolved from manual encryption methods and manual codebreaking techniques, to cipher machines and codebreaking machines in the first half of the 20th century, and finally to computerbased encryption and cryptanalysis from the second half of the 20th century. However, despite the advent of modern computing technology, some of the more challenging classical cipher systems and machines have not yet been successfully cryptanalyzed. For others, cryptanalytic methods exist, but only for special and advantage...