Information Security and Cryptology – ICISC 2023
Author : Hwajeong Seo
Publisher : Springer Nature
Page : 317 pages
File Size : 16,41 MB
Release :
Category :
ISBN : 9819712386
Author : Hwajeong Seo
Publisher : Springer Nature
Page : 317 pages
File Size : 16,41 MB
Release :
Category :
ISBN : 9819712386
Author : Hwajeong Seo
Publisher : Springer Nature
Page : 335 pages
File Size : 29,90 MB
Release :
Category :
ISBN : 9819712351
Author :
Publisher :
Page : 1280 pages
File Size : 35,49 MB
Release : 2003
Category : Mathematics
ISBN :
Author : John F. Dooley
Publisher : Springer
Page : 307 pages
File Size : 50,1 MB
Release : 2018-08-23
Category : Computers
ISBN : 3319904434
This accessible textbook presents a fascinating review of cryptography and cryptanalysis across history. The text relates the earliest use of the monoalphabetic cipher in the ancient world, the development of the “unbreakable” Vigenère cipher, and an account of how cryptology entered the arsenal of military intelligence during the American Revolutionary War. Moving on to the American Civil War, the book explains how the Union solved the Vigenère ciphers used by the Confederates, before investigating the development of cipher machines throughout World War I and II. This is then followed by an exploration of cryptology in the computer age, from public-key cryptography and web security, to criminal cyber-attacks and cyber-warfare. Looking to the future, the role of cryptography in the Internet of Things is also discussed, along with the potential impact of quantum computing. Topics and features: presents a history of cryptology from ancient Rome to the present day, with a focus on cryptology in the 20th and 21st centuries; reviews the different types of cryptographic algorithms used to create secret messages, and the various methods for breaking such secret messages; provides engaging examples throughout the book illustrating the use of cryptographic algorithms in different historical periods; describes the notable contributions to cryptology of Herbert Yardley, William and Elizebeth Smith Friedman, Lester Hill, Agnes Meyer Driscoll, and Claude Shannon; concludes with a review of tantalizing unsolved mysteries in cryptology, such as the Voynich Manuscript, the Beale Ciphers, and the Kryptos sculpture. This engaging work is ideal as both a primary text for courses on the history of cryptology, and as a supplementary text for advanced undergraduate courses on computer security. No prior background in mathematics is assumed, beyond what would be encountered in an introductory course on discrete mathematics.
Author : Indrajit Ray
Publisher :
Page : pages
File Size : 10,41 MB
Release : 2015-10-12
Category : Computer science
ISBN : 9781450338325
CCS'15: The 22nd ACM Conference on Computer and Communications Security Oct 12, 2015-Oct 16, 2015 Denver, USA. You can view more information about this proceeding and all of ACM�s other published conference proceedings from the ACM Digital Library: http://www.acm.org/dl.
Author : Ioana Boureanu
Publisher : Springer Nature
Page : 349 pages
File Size : 45,94 MB
Release : 2020-12-23
Category : Computers
ISBN : 3030665046
This book constitutes the refereed post-conference proceedings of the Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy, DETIPS 2020; the First International Workshop on Dependability and Safety of Emerging Cloud and Fog Systems, DeSECSys 2020; Third International Workshop on Multimedia Privacy and Security, MPS 2020; and the Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2020; held in Guildford, UK, in September 2020, in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. A total of 42 papers was submitted. For the DETIPS Workshop 8 regular papers were selected for presentation. Topics of interest address various aspect of the core areas in relation to digital economy. For the DeSECSys Workshop 4 regular papers are included. The workshop had the objective of fostering collaboration and discussion among cyber-security researchers and practitioners to discuss the various facets and trade-o s of cyber security. In particular, applications, opportunities and possible shortcomings of novel security technologies and their integration in emerging application domains. For the MPS Workshop 4 regular papers are presented which cover topics related to the security and privacy of multimedia systems of Internet-based video conferencing systems (e.g., Zoom, Microsoft Teams, Google Meet), online chatrooms (e.g., Slack), as well as other services to support telework capabilities. For the SPOSE Workshop 3 full papers were accepted for publication. They reflect the discussion, exchange, and development of ideas and questions regarding the design and engineering of technical security and privacy mechanisms with particular reference to organizational contexts.
Author : Jaideep Vaidya
Publisher : Springer Science & Business Media
Page : 124 pages
File Size : 14,20 MB
Release : 2006-09-28
Category : Computers
ISBN : 0387294899
Privacy preserving data mining implies the "mining" of knowledge from distributed data without violating the privacy of the individual/corporations involved in contributing the data. This volume provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. Crystallizing much of the underlying foundation, the book aims to inspire further research in this new and growing area. Privacy Preserving Data Mining is intended to be accessible to industry practitioners and policy makers, to help inform future decision making and legislation, and to serve as a useful technical reference.
Author : Charles P. Pfleeger
Publisher : Pearson Education India
Page : 904 pages
File Size : 41,33 MB
Release : 2009
Category : Computer security
ISBN : 9788131727256
Author : Karthikeyan Bhargavan
Publisher : Springer
Page : 906 pages
File Size : 48,52 MB
Release : 2020-12-08
Category : Computers
ISBN : 9783030652760
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology in India, INDOCRYPT 2020, held in Bangalore, India, in December 2020.The 39 full papers presented together with 3 invited abstracts in this book were carefully reviewed and selected from 84 submissions. Apart from its traditional focus on areas in applied and theoretical cryptology, this year INDOCRYPT solicited papers in the area of Formal Methods for Cryptographic Systems as well and much more.
Author : Ding Wang
Publisher : Springer Nature
Page : 773 pages
File Size : 26,67 MB
Release : 2023-11-20
Category : Computers
ISBN : 9819973562
This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on Information and Communications Security, ICICS 2023, held in Tianjin, China, during November 18–20, 2023. The 38 full papers presented together with 6 short papers were carefully reviewed and selected from 181 submissions. The conference focuses on: Symmetric-Key Cryptography; Public-Key Cryptography; Applied Cryptography; Authentication and Authorization; Privacy and Anonymity; Security and Privacy of AI; Blockchain and Cryptocurrencies; and System and Network Security.