Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945.
Bemærk: Kan ikke leveres før jul.
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are... Læs mere
Bemærk: Kan ikke leveres før jul.
Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography.
Bemærk: Kan ikke leveres før jul.
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions.
Bemærk: Kan ikke leveres før jul.
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key.
Bemærk: Kan ikke leveres før jul.
"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component.
Bemærk: Kan ikke leveres før jul.
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers,... Læs mere
Bemærk: Kan ikke leveres før jul.
The author discusses quantum algorithms for solving the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP), and the Elliptic Curve Discrete Logarithm Problem (ECDLP) and for attacking IFP, DLP and ECDLP based cryptographic systems.
Bemærk: Kan ikke leveres før jul.
This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general.
Bemærk: Kan ikke leveres før jul.
Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary... Læs mere