Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

Security and Privacy
  • Language: en
  • Pages: 155

Security and Privacy

This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: ​Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.

Mathematical Analysis and Applications
  • Language: en
  • Pages: 328

Mathematical Analysis and Applications

This book collects original peer-reviewed contributions presented at the "International Conference on Mathematical Analysis and Applications (MAA 2020)" organized by the Department of Mathematics, National Institute of Technology Jamshedpur, India, from 2–4 November 2020. This book presents peer-reviewed research and survey papers in mathematical analysis that cover a broad range of areas including approximation theory, operator theory, fixed-point theory, function spaces, complex analysis, geometric and univalent function theory, control theory, fractional calculus, special functions, operation research, theory of inequalities, equilibrium problem, Fourier and wavelet analysis, mathematical physics, graph theory, stochastic orders and numerical analysis. Some chapters of the book discuss the applications to real-life situations. This book will be of value to researchers and students associated with the field of pure and applied mathematics.

Cryptographic Security Solutions for the Internet of Things
  • Language: en
  • Pages: 392

Cryptographic Security Solutions for the Internet of Things

  • Type: Book
  • -
  • Published: 2019-01-18
  • -
  • Publisher: IGI Global

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

Information Security
  • Language: en
  • Pages: 570

Information Security

  • Type: Book
  • -
  • Published: 2015-08-27
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.

Provable and Practical Security
  • Language: en
  • Pages: 397

Provable and Practical Security

This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols.

Information Security and Cryptology - ICISC 2014
  • Language: en
  • Pages: 444

Information Security and Cryptology - ICISC 2014

  • Type: Book
  • -
  • Published: 2015-03-16
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.

Information Security and Cryptology – ICISC 2016
  • Language: en
  • Pages: 355

Information Security and Cryptology – ICISC 2016

  • Type: Book
  • -
  • Published: 2017-02-08
  • -
  • Publisher: Springer

This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis.

Information and Communications Security
  • Language: en
  • Pages: 475

Information and Communications Security

  • Type: Book
  • -
  • Published: 2016-11-23
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016. The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.

Advances in Pure and Applied Algebra
  • Language: en
  • Pages: 170

Advances in Pure and Applied Algebra

This proceedings volume documents the contributions presented at the CONIAPS XXVII International Conference on Recent Advances in Pure and Applied Algebra. The entries focus on modern trends and techniques in various branches of pure and applied Algebra and highlight their applications in coding, cryptography, graph, and fuzzy theory. The book comprised a total of eighteen chapters, among which the first fourteen chapters are devoted to Algebra and related topics, and the last four chapters are included applied mathematics parts. The chapters present the latest research work being done on the frontiers of the various branches of algebra as well as showcase the cross-fertilization of the idea...

Information Security and Privacy
  • Language: en
  • Pages: 715

Information Security and Privacy

This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021. The 35 full papers presented were carefully revised and selected from 157 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.