Secure Volunteer Computing for Distributed Cryptanalysis
Author : Nils Kopal
Publisher : kassel university press GmbH
Page : 263 pages
File Size : 45,66 MB
Release : 2018-01-05
Category :
ISBN : 3737604266
Author : Nils Kopal
Publisher : kassel university press GmbH
Page : 263 pages
File Size : 45,66 MB
Release : 2018-01-05
Category :
ISBN : 3737604266
Author : Martine Diepenbroek
Publisher : Bloomsbury Publishing
Page : 265 pages
File Size : 24,60 MB
Release : 2023-11-16
Category : Literary Criticism
ISBN : 135028128X
This book offers a comprehensive review and reassessment of the classical sources describing the cryptographic Spartan device known as the scytale. Challenging the view promoted by modern historians of cryptography which look at the scytale as a simple and impractical 'stick', Diepenbroek argues for the scytale's deserved status as a vehicle for secret communication in the ancient world. By way of comparison, Diepenbroek demonstrates that the cryptographic principles employed in the Spartan scytale show an encryption and coding system that is no less complex than some 20th-century transposition ciphers. The result is that, contrary to the accepted point of view, scytale encryption is as complex and secure as other known ancient ciphers. Drawing on salient comparisons with a selection of modern transposition ciphers (and their historical predecessors), the reader is provided with a detailed overview and analysis of the surviving classical sources that similarly reveal the potential of the scytale as an actual cryptographic and steganographic tool in ancient Sparta in order to illustrate the relative sophistication of the Spartan scytale as a practical device for secret communication. This helps to establish the conceptual basis that the scytale would, in theory, have offered its ancient users a secure method for secret communication over long distances.
Author : Xingming Sun
Publisher : Springer
Page : 667 pages
File Size : 27,13 MB
Release : 2019-07-18
Category : Computers
ISBN : 3030242684
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.
Author : Kokula Krishna Hari K
Publisher : TECHNO FORUM R&D CENTRE
Page : 213 pages
File Size : 11,17 MB
Release :
Category :
ISBN : 8192057593
Author : Robert Douglass
Publisher : John Wiley & Sons
Page : 532 pages
File Size : 35,35 MB
Release : 2023-01-19
Category : Political Science
ISBN : 1119892147
IoT for Defense and National Security Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses challenges in converting defense industrial operations to IoT and summarizes policy recommendations for regulating government use of IoT in free societies. As a modern reference, this book covers multiple technologies in IoT including survivable tactical IoT using content-based routing, mobile ad-hoc networks, and electronically formed beams. Examples of IoT architectures include using KepServerEX for edge connectivity and AWS IoT Core and Amazon S3 for IoT data. To aid in reader comprehension, the text uses case studies illustrating the challenges and solutions for using robotic devices in defense applications, plus case studies on using IoT for a defense industrial base. Written by leading researchers and practitioners of IoT technology for defense and national security, IoT for Defense and National Security also includes information on: Changes in warfare driven by IoT weapons, logistics, and systems IoT resource allocation (monitoring existing resources and reallocating them in response to adversarial actions) Principles of AI-enabled processing for Internet of Battlefield Things, including machine learning and inference Vulnerabilities in tactical IoT communications, networks, servers and architectures, and strategies for securing them Adapting rapidly expanding commercial IoT to power IoT for defense For application engineers from defense-related companies as well as managers, policy makers, and academics, IoT for Defense and National Security is a one-of-a-kind resource, providing expansive coverage of an important yet sensitive topic that is often shielded from the public due to classified or restricted distributions.
Author : Yoshifumi Masunaga
Publisher : Springer Science & Business Media
Page : 504 pages
File Size : 32,15 MB
Release : 1998-02-16
Category : Computers
ISBN : 9783540642169
This book constitutes the refereed proceedings of the Second International Conference on Worldwide Computing and Its Applications, WWCA'98, held in Tsukuba, Japan, in March 1998. This volume presents 14 invited and survey papers together with 20 papers selected by the conference committee. The volume is divided into topical sections on distributed objects, distributed componentware, distributed systems platforms, Internet technology, mobile computing, interculture technology, collaborative media, collaborative support, information discovery and retrieval, novel network applications.
Author : Radu Sion
Publisher : Springer Science & Business Media
Page : 442 pages
File Size : 33,44 MB
Release : 2010-07-15
Category : Computers
ISBN : 3642145760
This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Financial Cryptography and Data Security, FC 2010, held in Tenerife, Canary Islands, Spain in January 2010. The 19 revised full papers and 15 revised short papers presented together with 1 panel report and 7 poster papers were carefully reviewed and selected from 130 submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security.
Author : Paul F. Syverson
Publisher : Springer
Page : 388 pages
File Size : 28,49 MB
Release : 2003-08-01
Category : Computers
ISBN : 3540460888
This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Financial Cryptography, FC 2001, held in Grand Cayman, British West Indies, in February 2001. The 20 revised full papers presented together with various panel statements and one invited paper were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on managing payment transaction costs, trust and risk management, groups and anonymity, certificates and authentication, credit card security, markets and multiparty computation, digital signatures and financial cryptography, and auctions.
Author : Leonard Barolli
Publisher : Springer
Page : 1396 pages
File Size : 12,43 MB
Release : 2019-03-14
Category : Technology & Engineering
ISBN : 3030150321
The aim of the book is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications. Networks of today are going through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low cost and high volume applications. Several of such applications have been difficult to realize because of many interconnections problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next generation wireless systems should be integrated in order to develop high performance computing solutions to problems arising from the complexities of these networks. This book covers the theory, design and applications of computer networks, distributed computing and information systems.
Author : Nemati, Hamid R.
Publisher : IGI Global
Page : 407 pages
File Size : 39,16 MB
Release : 2010-08-31
Category : Computers
ISBN : 1615207848
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses' information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.