(Išleidimo metai: 09-Aug-2024, Hardback, Leidėjas: Springer-Verlag New York Inc., ISBN-13: 9780387271590)
Public Key Infrastructures (PKI) are a trust management technology for public keys, consisting of several interconnected Certifying Authorities (CAs). The CAs issue certificates that establish ownership of public keys, which can be used to support...Daugiau...
(Išleidimo metai: 08-Jul-2024, Hardback, Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783540713739)
Zero-knowledge interactive proofs play a central role in the design and study of cryptographic protocols and are rich objects for complexity-theoretic study. Statistical zero-knowledge (SZK) proofs achieve strong information-theoretic "securi...Daugiau...
This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer scienc...Daugiau...
See a Mesos-based big data stack created and the components used. You will use currently available Apache full and incubating systems. The components are introduced by example and you learn how they work together.In the Complete Guid...Daugiau...
This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-...Daugiau...
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously prese...Daugiau...
David Förster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems – motivated by the large number of recent security incidents and revelations about mass surveil...Daugiau...
This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment car...Daugiau...
Miguel Heredia Conde aims at finding novel ways to fit the valuable mathematical results of the Compressive Sensing (CS) theory to the specific case of the Photonic Mixer Device (PMD).To this end, methods are presented that take profit of the sparsit...Daugiau...
This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography, pseudorandom functions, one-way functions, homo...Daugiau...
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and hig...Daugiau...
With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and network...Daugiau...
The book focuses on the state-of-the-art technologies pertaining to advances in soft computing, intelligent system and applications. The Proceedings of ASISA 2016 presents novel and original work in soft computing, intelligent system and applicati...Daugiau...
This guide for practicing statisticians, data scientists, and R users and programmers will teach the essentials of preprocessing: data leveraging the R programming language to easily and quickly turn noisy data into usable pieces of information. Data...Daugiau...
This book explains various commercial and open source products that perform SQL on Hadoop and big data. It equips the reader with an understanding of the various architectures being used and how the tools work internally in terms of execution, dat...Daugiau...
Learn the fundamental foundations and concepts of the Apache HBase (NoSQL) open source database. It covers the HBase data model, architecture, schema design, API, and administration.Apache HBase is the database for the Apache Hadoop fr...Daugiau...
Philipp Meisen introduces a model, a query language, and a similarity measure enabling users to analyze time interval data. The introduced tools are combined to design and realize an information system. The presented system is capable of performing a...Daugiau...
Internet of things (IoT) represents a growing sophistication among devices to communicate. Examples of internet of things include mobile handsets, refrigerators, cars, Fitbit, watches, ebooks, vending machines, parking meters, etc . and the lis...Daugiau...
Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Serija: Undergraduate Texts in Mathematics
(Išleidimo metai: 10-Sep-2016, Paperback / softback, Leidėjas: Springer-Verlag New York Inc., ISBN-13: 9781493939381)
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for...Daugiau...
Do you know how banking and money will look like in the new digital age?This book collects the voices of leading scholars, entrepreneurs, policy makers and consultants who, through their expertise and keen analytical sk...Daugiau...