Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform).
Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic SteganographyThe first to comprehensively cover Graph SteganographyThe first to comprehensively cover Game SteganographyAlthough the goal of steganography is to prevent adversaries from suspe
Applicable to any problem that requires a finite number of solutions, finite state-based models (also called finite state machines or finite state automata) have found wide use in various areas of computer science and engineering.
Starting with the most basic notions, Universal Algebra: Fundamentals and Selected Topics introduces all the key elements needed to read and understand current research in this field.
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems.
Computer arithmetic has become so fundamentally embedded into digital design that many engineers are unaware of the many research advances in the area.
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications.
Methods Used to Solve Discrete Math ProblemsInteresting examples highlight the interdisciplinary nature of this areaPearls of Discrete Mathematics presents methods for solving counting problems and other types of problems that involve discrete structures.
First developed in the early 1980s by Lenstra, Lenstra, and Lovasz, the LLL algorithm was originally used to provide a polynomial-time algorithm for factoring polynomials with rational coefficients.
This book makes a significant inroad into the unexpectedly difficult question of existence of Frechet derivatives of Lipschitz maps of Banach spaces into higher dimensional spaces.
Best-selling guide for over 20 years, filled with essential elements of mathematics from properties of real numbers to beginning algebra in just 6 laminated pages.
Parents and teachers can use this laminated 6-page guide with their kindergartener to hit specific learning requirements of The Common Core State Standards for Mathematics.
Best-selling guide for over 20 years, filled with essential elements of mathematics from properties of real numbers to beginning algebra in just six pages.
Calculations, formulas, measurements, conversions, dosages, rates, equivalents and more are expertly organized in this 6 page laminated reference guide with clear color coded sections and easy to read layout.
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature.
Like its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second Edition develops the theory of elliptic curves to provide a basis for both number theoretic and cryptographic applications.
A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems.
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography.
Introduction to Fuzzy Systems provides students with a self-contained introduction that requires no preliminary knowledge of fuzzy mathematics and fuzzy control systems theory.
The Most Progressive and Complete Guide to DDO-Based CiphersDevelopers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs).
Although much literature exists on the subject of RSA and public-key cryptography, until now there has been no single source that reveals recent developments in the area at an accessible level.
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems.
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field.
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field.
Unlike data communications of the past, today's networks consist of numerous devices that handle the data as it passes from the sender to the receiver.
The study of random sets is a large and rapidly growing area with connections to many areas of mathematics and applications in widely varying disciplines, from economics and decision theory to biostatistics and image analysis.
Researchers and practitioners of cryptography and information security are constantly challenged to respond to new attacks and threats to information systems.
Introduction to Modern Cryptography, the most relied-upon textbook in the field, provides a mathematically rigorous yet accessible treatment of this fascinating subject.