A Pragmatic Introduction to Secure Multi-Party Computation


Book Description

Practitioners and researchers seeking a concise, accessible introduction to secure multi-party computation which quickly enables them to build practical systems or conduct further research will find this essential reading.




Exploring the Boundaries of Big Data


Book Description

In the investigation Exploring the Boundaries of Big Data The Netherlands Scientific Council for Government Policy (WRR) offers building blocks for developing a regulatory approach to Big Data.




Security, Privacy and Reliability in Computer Communications and Networks


Book Description

Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication networks to address the numerous threat and privacy concerns. New research technologies are essential to preserve privacy, prevent attacks, and achieve the requisite reliability. Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols. Technical topics discussed in the book include: Vulnerabilities and Intrusion DetectionCryptographic Algorithms and EvaluationPrivacy Reliable Routing Protocols This book is ideal for personnel in computer communication and networking industries as well as academic staff and collegial, master, Ph.D. students in computer science, computer engineering, cyber security, information insurance and telecommunication systems.




Pro Functional PHP Programming


Book Description

Bring the power of functional programming to your PHP applications. From performance optimizations to concurrency, improved testability to code brevity, functional programming has a host of benefits when compared to traditional imperative programming. Part one of Pro Functional PHP Programming takes you through the basics of functional programming, outlining the key concepts and how they translate into standard PHP functions and code. Part two takes this theory and shows you the strategies for implementing it to solve real problems in your new or existing PHP applications. Functional programming is popular in languages such as Lisp, Scheme and Clojure, but PHP also contains all you need to write functional code. This book will show you how to take advantage of functional programming in your own projects, utilizing the PHP programming language that you already know. What You'll Learn Discover functional programming in PHP Work with functional programming functions Design strategies for high-performance applications Manage business logic with functions Use functional programming in object-oriented and procedural applications Employ helper libraries in your application Process big data with functional PHP Who This Book Is For Programmers and web developers with experience of PHP who are looking to get more out of their PHP coding and be able to do more with PHP.




Wireless Communications, Networking and Applications


Book Description

This book is based on a series of conferences on Wireless Communications, Networking and Applications that have been held on December 27-28, 2014 in Shenzhen, China. The meetings themselves were a response to technological developments in the areas of wireless communications, networking and applications and facilitate researchers, engineers and students to share the latest research results and the advanced research methods of the field. The broad variety of disciplines involved in this research and the differences in approaching the basic problems are probably typical of a developing field of interdisciplinary research. However, some main areas of research and development in the emerging areas of wireless communication technology can now be identified. The contributions to this book are mainly selected from the papers of the conference on wireless communications, networking and applications and reflect the main areas of interest: Section 1 - Emerging Topics in Wireless and Mobile Computing and Communications; Section 2 - Internet of Things and Long Term Evolution Engineering; Section 3 - Resource Allocation and Interference Management; Section 4 - Communication Architecture, Algorithms, Modeling and Evaluation; Section 5 - Security, Privacy, and Trust; and Section 6 - Routing, Position Management and Network Topologies.




FME 2003: Formal Methods


Book Description

This book constitutes the refereed proceedings of the International Symposium of Formal Methods Europe, FME 2003, held in Pisa, Italy in September 2003. The 44 revised full papers presented together with 5 invited papers were carefully reviewed and selected from 144 submissions. The papers are organized in topical sections on industrial issues, control systems and applications, communication system verfication, co-specification and compilers, composition, Java, object-orientation and modularity, model checking, parallel processes, program checking and testing, B method, and security.




Self-aware Computing Systems


Book Description

Taking inspiration from self-awareness in humans, this book introduces the new notion of computational self-awareness as a fundamental concept for designing and operating computing systems. The basic ability of such self-aware computing systems is to collect information about their state and progress, learning and maintaining models containing knowledge that enables them to reason about their behaviour. Self-aware computing systems will have the ability to utilise this knowledge to effectively and autonomously adapt and explain their behaviour, in changing conditions. This book addresses these fundamental concepts from an engineering perspective, aiming at developing primitives for building systems and applications. It will be of value to researchers, professionals and graduate students in computer science and engineering.




Critical Infrastructures at Risk


Book Description

Europe witnessed in the last years a number of significant power contingencies. Some of them revealed the potentiality of vast impact on the welfare of society and triggered pressing questions on the reliability of electric power systems. Society has incorporated electricity as an inherent component, indispensable for achieving the expected level of quality of life. Therefore, any impingement on the continuity of the electricity service would be able to distress society as a whole, affecting individuals, social and economic activities, other infrastructures and essential government functions. It would be possible to hypothesize that in extreme situations this could even upset national security. This book explores the potential risks and vulnerabilities of the European electricity infrastructure, other infrastructures and our society as whole increasingly depend on. The work was initiated by the need to verify the potential effects of the ongoing market and technical transformation of the infrastructure, which is fundamentally changing its operation and performance. The final aim is to set the basis for an appropriate industrial and political European-wide response to the risk challenges.




Secure Multiparty Computation


Book Description

This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating relationship between the two concepts.




Banking Beyond Banks and Money


Book Description

Do you know how banking and money will look like in the new digital age? This book collects the voices of leading scholars, entrepreneurs, policy makers and consultants who, through their expertise and keen analytical skills, are best positioned to picture from various angles the ongoing technological revolution in banking and finance. You will learn how lending and borrowing can exist without banks; how new forms of money can compete to better serve different society needs; how new technologies are banking the unbanked communities in the poorest parts of the world, and how ideas and small projects can be financed by the crowds without the need to rely upon banks. You will learn how, in the new digital age, we will interact with new self-organised and autonomous companies that operate without any human involvement, based on a set of programmed and incorruptible rules. You will learn that new business models will emerge thanks to technology-enabled platforms, upon which one can build new forms of non-hierarchical cooperation between strangers. And you will also learn that new forms of risks and threats are emerging that will destabilise our systems and jeopardise the stability of our financial order.