This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identificatio...Daugiau...
(Išleidimo metai: 06-Oct-2006, Hardback, Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783540245025)
In todays unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology no...Daugiau...
This book highlights the intersection of quantum computing and blockchain technology, addressing the urgent need for enhanced security measures in a post-quantum world. This book provides a comprehensive overview of fundamental quantum concepts, t...Daugiau...
Internet of Things Security: Attacks, Tools, Techniques and Challenges delves into the essential aspects of safeguarding devices within the IoT ecosystem. This book provides a comprehensive overview of the IoT architecture, its vast applicatio...Daugiau...
George Dimitoglou, Leonidas Deligiannidis, Hamid R. Arabnia
Serija: Intelligent Computing
(Išleidimo metai: 20-Oct-2025, Hardback, Leidėjas: De Gruyter, ISBN-13: 9783111436418)
The depth of our dependence on technology in our interconnected world underscores the critical role of cyber security. This book provides essential insights into the latest research and best practices and techniques for protecting against cyber thre...Daugiau...
This book highlights how AI agents and Large Language Models (LLMs) are set to revolutionize the finance and trading sectors in unprecedented ways. These technologies bring a new level of sophistication to data analysis and decision-making, enabli...Daugiau...
This book provides a comprehensive introduction to blockchain and distributed ledger technology (DLT). Intended as an applied guide for hands-on practitioners, this book includes detailed examples and...Daugiau...
This book strives to comprehensively explain Web 3.0 and tokenization technologies from theory to practice, from concepts to cases, and from opportunities to challenges. Chapter 1 systematically introduces...Daugiau...
(Išleidimo metai: 01-Oct-2025, Hardback, Leidėjas: Institution of Engineering and Technology, ISBN-13: 9781837240319)
This book explores how AI and Explainable AI-based cybersecurity algorithms and methods are used to tackle cybersecurity challenges such as threats, intrusions and attacks to preserve data privacy and ensure trust, accountability, transparency and c...Daugiau...
This book offers a comprehensive exploration of the transformative potential of Web 3.0 and the metaverse, enabling entrepreneurs to harness the p...Daugiau...
This book provides current state of the art along with an insight of recent research trends and open issues, challenges, and future research direction for the academician, analyzer, researcher, writers, and authors. It also provides an opportunity...Daugiau...
In this smart era, business innovation and industrial intelligence are making the way for a smart future in which smart factories, intelligent machines, networked processes, edge computing, blockchain technology, and Big Data (including Data Science...Daugiau...
Explore practical cryptographic methods using Python to secure data, encrypt communications, and implement real-world security techniques for modern applications Key Features Learn cryptographic techniques with Python for real-...Daugiau...
Feistel networks are one of the easiest ways to build pseudorandom permutations. Thanks to this property, many secret key algorithms (symmetric ciphers) have been designed as Feistel networks, and it is possible to design many others. The most fam...Daugiau...
Cryptographic protocols are the backbone of secure digital interactions, but achieving both security and efficiency is a challenging balancing act. The challenge is how to minimize computational costs and reduce interaction while maintaining prov...Daugiau...
Can Cryptocurrencies and Crypto-protocols be rigorously analyzed?Over the past decade the world has witnessed the rapid rise of Cryptocurrencies and Crypto-assets. Yet many financial professionals and students still struggle to confidently...Daugiau...
This book guides readers from the foundations of quantum mechanics through advanced quantum algorithms (such as Shors and Grovers) and state-of-the-art machine learning methods. By illustrating how these concepts apply to everyday engineering ch...Daugiau...
This book presents a case study of the development of a smart contract, from the analysis of the legal contract to the structural design of the smart contract and implementation on the Ethereum blockchain. It identifies approaches to avoid or less...Daugiau...
The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the desired security properties, Tamarin either verifies the protocol or provides counter examples...Daugiau...
The hands-on exercises and practical examples in the guide helps to get a better understanding in Hederas core services. The focus on each core chapter is to get a deeper understanding and the its usage in decentralized applications Key...Daugiau...
Introduction to Modern Cryptography is the most relied-upon source in the field. The book provides a mathematically rigorous yet accessible treatment of this fascinating subject. This is an updated edition of the most widely used introduction to cry...Daugiau...