This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identificatio...Loe edasi...
(Ilmumisaeg: 06-Oct-2006, Hardback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783540245025)
In todays unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology no...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
This book integrates innovative theoretical research with practical application, providing a comprehensive and in-depth guide for practitioners, researchers in the field of intelligent manufacturing, and readers from all walks of life who are curiou...Loe edasi...
This volume gathers selected, peer-reviewed papers presented at the Sixth Scientific Days of the Doctoral School of Mathematics and Computer Sciences (S2DSMCS), held from December 1719, 2024, at Cheikh Anta Diop University in Dakar, Senegal. The wor...Loe edasi...
This book provides a comprehensive guide to integrating Artificial Intelligence (AI), Large Language Models (LLMs), and quantum-safe security mechanisms into modern cybersecurity practices. It begins by examining the evolving cyber threat landscape...Loe edasi...
Explore the full scope of blockchain technology and its relationship with cybersecurity Cybersecurity Implications in Blockchain Architecture delves into the transformative power of blockchain technology and its intricate relation...Loe edasi...
This book outlines a practical framework for implementing a resilient circular economy principle across ten major industries in a developed country. It focuses on integrating circular thinking into supply chain management and applying digital transf...Loe edasi...
The purpose of this book is to connect the three domains of (1) ESG investment, (2) Industrie 4.0, and (3) blockchain technology through the common concept of data, and to illustrate how these elements are transforming modern industrial structures a...Loe edasi...
This book presents a proof of concept architecture to detect and prevent Sybil attacks in automated Machine-to-Machine networks. Designed in regards to low-powered Internet of Things devices, the proposed layered defence balances security with compu...Loe edasi...
Agri-Chain Innovation: Leveraging Blockchain for Sustainable Food Systems is intended as a useful resource for researchers, practitioners, and policymakers interested in the intersection of blockchain technology and the agri-food sector. It provides...Loe edasi...
Máire O'Neill, Francesco Regazzoni, Tim Güneysu, Adrian Waller
Sari: Information Security and Cryptography
(Ilmumisaeg: 13-May-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031599170)
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from future quantum computers. This book will introduce the theoretical mathematics that underpins lattice-based cryptography, such as...Loe edasi...
Learn the basics of blockchain technology in 25 concise steps. Featuring five additional steps, this updated version explores new developments within blockchain, such as...Loe edasi...
Secure computation allows any number of mutually distrustful parties to jointly run anarbitrary computation on their combined inputs without compromising their privacy. Securecomputation offers a theoretical solution to a vast array of pro...Loe edasi...
This proceedings volume is a collection of 35 chapters presented at the Second International Conference on Artificial Intelligence, Machine Learning and Intelligent Systems (ICAMS-2025), held at the National Institute of Technology Hamirpur, Himac...Loe edasi...
The cybersecurity architect is not just a technician they are a tactician in the ever-present war in cyberspace. The Cybersecurity Architects Handbook, 2nd Edition takes you from foundational security principles through Zero Trust, AI security, cl...Loe edasi...
Cybersecurity for Healthcare Systems in the Internet of Medical Things Era is driven by the imperative to address the intricate convergence of healthcare, technology, and security. In response to the burgeoning challenges presented by the Inte...Loe edasi...
Equips cybersecurity professionals with advanced strategies to anticipate, mitigate, and respond to evolving digital threats In Cyber Defense: Advanced Strategies and Techniques to Stay Ahead of the Cyber Threats Curve, acclaimed cybersec...Loe edasi...
Quantum Cryptography and Annealing for Securing Industrial IoT explores cutting-edge quantum security strategies designed to protect Industrial Internet of Things (IIoT) platforms. Focusing on the convergence between quantum and post-quantum c...Loe edasi...