Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications.
De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.
Автор: Banday Mohammad Tariq Название: Cryptographic Security Solutions for the Internet of Things ISBN: 1522586296 ISBN-13(EAN): 9781522586296 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 125400.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Discusses novel designs and developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. Coverage includes cryptographic algorithms, encryption techniques, and authentication procedures.
Автор: Gupta Brij, Agrawal Dharma P., Yamaguchi Shingo Название: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security ISBN: 1522501053 ISBN-13(EAN): 9781522501053 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 296610.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments.The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.
Автор: Mohammad Tariq Banday Название: Cryptographic Security Solutions for the Internet of Things ISBN: 1522557423 ISBN-13(EAN): 9781522557425 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 189420.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks.Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.
Автор: Krzewinski Basil Название: Cryptographic Attacks: Computer Security Exploits ISBN: 153002529X ISBN-13(EAN): 9781530025299 Издательство: Неизвестно Цена: 68970.00 T Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Cetin K. Koc; Christof Paar Название: Cryptographic Hardware and Embedded Systems - CHES 2000 ISBN: 354041455X ISBN-13(EAN): 9783540414551 Издательство: Springer Рейтинг: Цена: 74530.00 T Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Cetin K. Koc; Christof Paar Название: Cryptographic Hardware and Embedded Systems ISBN: 354066646X ISBN-13(EAN): 9783540666462 Издательство: Springer Рейтинг: Цена: 74530.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The refereed proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems (CHES `99). Papers cover topics including hardware architectures, smartcards and embedded systems, arithmetic algorithms, power attacks, and true random numbers.
Автор: Wieland Fischer; Naofumi Homma Название: Cryptographic Hardware and Embedded Systems – CHES 2017 ISBN: 3319667866 ISBN-13(EAN): 9783319667867 Издательство: Springer Рейтинг: Цена: 93160.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations.
Автор: Igor Shparlinski Название: Cryptographic Applications of Analytic Number Theory ISBN: 3034894155 ISBN-13(EAN): 9783034894159 Издательство: Springer Рейтинг: Цена: 93160.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The book introduces new techniques that imply rigorous lower bounds on the com- plexity of some number-theoretic and cryptographic problems. These functions are considered over the residue ring modulo p and over the residue ring modulo an arbitrary divisor d of p - 1.
Автор: Canteaut Anne, Ishai Yuval Название: Advances in Cryptology - Eurocrypt 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa ISBN: 3030457206 ISBN-13(EAN): 9783030457204 Издательство: Springer Рейтинг: Цена: 93160.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.
Автор: Jakub Breier; Xiaolu Hou; Shivam Bhasin Название: Automated Methods in Cryptographic Fault Analysis ISBN: 3030113329 ISBN-13(EAN): 9783030113322 Издательство: Springer Рейтинг: Цена: 93160.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book presents a collection of automated methods that are useful for different aspects of fault analysis in cryptography. The first part focuses on automated analysis of symmetric cipher design specifications, software implementations, and hardware circuits. The second part provides automated deployment of countermeasures. The third part provides automated evaluation of countermeasures against fault attacks. Finally, the fourth part focuses on automating fault attack experiments. The presented methods enable software developers, circuit designers, and cryptographers to test and harden their products.
Originally published in 1996. In The Cryptographic Imagination, Shawn Rosenheim uses the writings of Edgar Allan Poe to pose a set of questions pertaining to literary genre, cultural modernity, and technology. Rosenheim argues that Poe's cryptographic writing--his essays on cryptography and the short stories that grew out of them--requires that we rethink the relation of poststructural criticism to Poe's texts and, more generally, reconsider the relation of literature to communication. Cryptography serves not only as a template for the language, character, and themes of much of Poe's late fiction (including his creation, the detective story) but also as a secret history of literary modernity itself. Both postwar fiction and literary criticism, the author writes, are deeply indebted to the rise of cryptography in World War II.
Still more surprising, in Rosenheim's view, Poe is not merely a source for such literary instances of cryptography as the codes in Conan Doyle's The Dancing-Men or in Jules Verne, but, through his effect on real cryptographers, Poe's writing influenced the outcome of World War II and the development of the Cold War. However unlikely such ideas sound, The Cryptographic Imagination offers compelling evidence that Poe's cryptographic writing clarifies one important avenue by which the twentieth century called itself into being.
The strength of Rosenheim's work extends to a revisionistic understanding of the entirety of literary history (as a repression of cryptography) and then, in a breathtaking shift of register, interlinks Poe's exercises in cryptography with the hyperreality of the CIA, the Cold War, and the Internet. What enables this extensive range of applications is the stipulated tension Rosenheim discerns in the relationship between the forms of the literary imagination and the condition of its mode of production. Cryptography, in this account, names the technology of literary production--the diacritical relationship between decoding and encoding--that the literary imagination dissimulates as hieroglyphics--the hermeneutic relationship between a sign and its content.--Donald E. Pease, Dartmouth College
--Donald E. Pease, Dartmouth College "Errol Morris, director of The Thin Blue Line and A Brief History of Time"
Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2) ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz