This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identificatio...Loe edasi...
(Ilmumisaeg: 06-Oct-2006, Hardback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783540245025)
In todays unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology no...Loe edasi...
This proceedings volume is a collection of 35 chapters presented at the Second International Conference on Artificial Intelligence, Machine Learning and Intelligent Systems (ICAMS-2025), held at the National Institute of Technology Hamirpur, Himac...Loe edasi...
Blockchain Sharding: Theory and Practice provides a comprehensive exploration of one of the most promising scalability solutions for blockchain systems. This book bridges the gap between foundational theories and real-world implementations, offering...Loe edasi...
In a digital world saturated with synthetic media and AI-shaped narratives, the quest for trustworthy public information has never been more urgent. Governing Public Information in the Age of AI explores how blockchain can strengthen the integrity o...Loe edasi...
This book integrates innovative theoretical research with practical application, providing a comprehensive and in-depth guide for practitioners, researchers in the field of intelligent manufacturing, and readers from all walks of life who are curiou...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book outlines a practical framework for implementing a resilient circular economy principle across ten major industries in a developed country. It focuses on integrating circular thinking into supply chain management and applying digital transf...Loe edasi...
This volume gathers selected, peer-reviewed papers presented at the Sixth Scientific Days of the Doctoral School of Mathematics and Computer Sciences (S2DSMCS), held from December 1719, 2024, at Cheikh Anta Diop University in Dakar, Senegal. The wor...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
Explore the full scope of blockchain technology and its relationship with cybersecurity Cybersecurity Implications in Blockchain Architecture delves into the transformative power of blockchain technology and its intricate relation...Loe edasi...
The purpose of this book is to connect the three domains of (1) ESG investment, (2) Industrie 4.0, and (3) blockchain technology through the common concept of data, and to illustrate how these elements are transforming modern industrial structures a...Loe edasi...
This book presents a proof of concept architecture to detect and prevent Sybil attacks in automated Machine-to-Machine networks. Designed in regards to low-powered Internet of Things devices, the proposed layered defence balances security with compu...Loe edasi...
Agri-Chain Innovation: Leveraging Blockchain for Sustainable Food Systems is intended as a useful resource for researchers, practitioners, and policymakers interested in the intersection of blockchain technology and the agri-food sector. It provides...Loe edasi...
The Student Solutions Manual to Introduction to Modern Cryptography, Revised Third Edition, is available for the first time for the author. This contains solutions to all the even-numbered exercises in the book. ...Loe edasi...
Máire O'Neill, Francesco Regazzoni, Tim Güneysu, Adrian Waller
Sari: Information Security and Cryptography
(Ilmumisaeg: 13-May-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031599170)
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from future quantum computers. This book will introduce the theoretical mathematics that underpins lattice-based cryptography, such as...Loe edasi...
Learn the basics of blockchain technology in 25 concise steps. Featuring five additional steps, this updated version explores new developments within blockchain, such as...Loe edasi...
Secure computation allows any number of mutually distrustful parties to jointly run anarbitrary computation on their combined inputs without compromising their privacy. Securecomputation offers a theoretical solution to a vast array of pro...Loe edasi...
Cybersecurity for Healthcare Systems in the Internet of Medical Things Era is driven by the imperative to address the intricate convergence of healthcare, technology, and security. In response to the burgeoning challenges presented by the Inte...Loe edasi...
Equips cybersecurity professionals with advanced strategies to anticipate, mitigate, and respond to evolving digital threats In Cyber Defense: Advanced Strategies and Techniques to Stay Ahead of the Cyber Threats Curve, acclaimed cybersec...Loe edasi...
Quantum Cryptography and Annealing for Securing Industrial IoT explores cutting-edge quantum security strategies designed to protect Industrial Internet of Things (IIoT) platforms. Focusing on the convergence between quantum and post-quantum c...Loe edasi...
This research examines the adoption of blockchain technology in pharmaceutical supply chains, focusing on the barriers that prevent most initiatives from moving beyond the pilot stage. Drawing on expert perspectives and the Technology Acceptance Mod...Loe edasi...
(Ilmumisaeg: 19-Feb-2026, Hardback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394402038)
Enables readers to understand the full lifecycle of adversarial machine learning (AML) and how AI models can be compromised Adversarial Machine Learning is a definitive guide to one of the most urgent challenges in artificial inte...Loe edasi...
This book presents the best papers from the 6th International Conference on Mathematical Research for Blockchain Economy (MARBLE) 2025, held in Athens, Greece. While most blockchain conferences and forums are dedicated to business applications, prod...Loe edasi...
Are you ready for the day your encryption fails silently? Quantum Ready is not just a warning; it’s a field guide for the era of quantum disruption. As quantum computing accelerates toward the threshold where...Loe edasi...
Are you ready for the day your encryption fails silently? Quantum Ready is not just a warning, its a field guide for the era of quantum disruption. As quantum computing accelerates toward the threshold where todays encryption becomes obsolete, org...Loe edasi...
This edited book presents detailed exploration of adaptions of blockchain in business use case applications. It proposes that blockchain tech is the best choice for modern businesses that require agility, secure, efficient and transparent...Loe edasi...
This book offers a comprehensive roadmap for securing modern digital supply chains by weaving together foundational theory, organizational strategy, and advanced technologies. Beginning with a rigorous taxonomy of attack vectors and endtoend securit...Loe edasi...
Cybersecurity attacks grow more complex every day. The second edition of Wilsons COMPTIA PENTEST+ GUIDE TO PENETRATION TESTING helps students gain the knowledge and skills to analyze systems in the same way hackers do, to identify vulnerabilities an...Loe edasi...
Edge Intelligence: Advanced Deep Transfer Learning for IoT Security presents a comprehensive exploration into the critical intersection of cybersecurity, edge computing, and deep learning, offering practitioners, researchers, and cybersecurity...Loe edasi...
This proceedings volume is a collection of 35 chapters presented at the Second International Conference on Artificial Intelligence, Machine Learning and Intelligent Systems (ICAMS-2025), held at the National Institute of Technology Hamirpur, Himac...Loe edasi...
Blockchain Sharding: Theory and Practice provides a comprehensive exploration of one of the most promising scalability solutions for blockchain systems. This book bridges the gap between foundational theories and real-world implementations, offering...Loe edasi...
In a digital world saturated with synthetic media and AI-shaped narratives, the quest for trustworthy public information has never been more urgent. Governing Public Information in the Age of AI explores how blockchain can strengthen the integrity o...Loe edasi...
This book integrates innovative theoretical research with practical application, providing a comprehensive and in-depth guide for practitioners, researchers in the field of intelligent manufacturing, and readers from all walks of life who are curiou...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book outlines a practical framework for implementing a resilient circular economy principle across ten major industries in a developed country. It focuses on integrating circular thinking into supply chain management and applying digital transf...Loe edasi...
This volume gathers selected, peer-reviewed papers presented at the Sixth Scientific Days of the Doctoral School of Mathematics and Computer Sciences (S2DSMCS), held from December 1719, 2024, at Cheikh Anta Diop University in Dakar, Senegal. The wor...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
Explore the full scope of blockchain technology and its relationship with cybersecurity Cybersecurity Implications in Blockchain Architecture delves into the transformative power of blockchain technology and its intricate relation...Loe edasi...
The purpose of this book is to connect the three domains of (1) ESG investment, (2) Industrie 4.0, and (3) blockchain technology through the common concept of data, and to illustrate how these elements are transforming modern industrial structures a...Loe edasi...
This book presents a proof of concept architecture to detect and prevent Sybil attacks in automated Machine-to-Machine networks. Designed in regards to low-powered Internet of Things devices, the proposed layered defence balances security with compu...Loe edasi...
Agri-Chain Innovation: Leveraging Blockchain for Sustainable Food Systems is intended as a useful resource for researchers, practitioners, and policymakers interested in the intersection of blockchain technology and the agri-food sector. It provides...Loe edasi...
The Student Solutions Manual to Introduction to Modern Cryptography, Revised Third Edition, is available for the first time for the author. This contains solutions to all the even-numbered exercises in the book. ...Loe edasi...
Máire O'Neill, Francesco Regazzoni, Tim Güneysu, Adrian Waller
Sari: Information Security and Cryptography
(Ilmumisaeg: 13-May-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031599170)
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from future quantum computers. This book will introduce the theoretical mathematics that underpins lattice-based cryptography, such as...Loe edasi...
Learn the basics of blockchain technology in 25 concise steps. Featuring five additional steps, this updated version explores new developments within blockchain, such as...Loe edasi...
Secure computation allows any number of mutually distrustful parties to jointly run anarbitrary computation on their combined inputs without compromising their privacy. Securecomputation offers a theoretical solution to a vast array of pro...Loe edasi...
The cybersecurity architect is not just a technician they are a tactician in the ever-present war in cyberspace. The Cybersecurity Architects Handbook, 2nd Edition takes you from foundational security principles through Zero Trust, AI security, cl...Loe edasi...
Cybersecurity for Healthcare Systems in the Internet of Medical Things Era is driven by the imperative to address the intricate convergence of healthcare, technology, and security. In response to the burgeoning challenges presented by the Inte...Loe edasi...