The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use.
Cutting-edge social engineering testing techniques"e;Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic.
Build real-world projects like a smart contract deployment platform, betting apps, wallet services, and much more using blockchainKey FeaturesApply blockchain principles and features for making your life and business betterUnderstand Ethereum for smart contracts and DApp deploymentTackle current and future challenges and problems relating to blockchainBook DescriptionBlockchain applications provide a single-shared ledger to eliminate trust issues involving multiple stakeholders.
This book constitutes the refereed post-conference proceedings of the Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy, DETIPS 2020; the First International Workshop on Dependability and Safety of Emerging Cloud and Fog Systems, DeSECSys 2020; Third International Workshop on Multimedia Privacy and Security, MPS 2020; and the Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2020; held in Guildford, UK, in September 2020, in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020.
Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure.
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations.
An expert guide to implementing fast, secure, and scalable decentralized applications that work with thousands of users in real timeKey FeaturesImplement advanced features of the Ethereum network to build powerful decentralized applicationsBuild smart contracts on different domains using the programming techniques of Solidity and VyperExplore the architecture of Ethereum network to understand advanced use cases of blockchain development Book DescriptionEthereum is one of the commonly used platforms for building blockchain applications.
This book studies the link between differential beamforming and differential equations which in turn enables the study of fundamental theory and methods of beamforming from a different perspective, leading to new insights into the problem and new methods to solve the problem.
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy.
This book constitutes selected papers of the Second International Conference on Advanced Communication Systems and Information Security, ACOSIS 2019, held in Marrakesh, Morocco, in November 2019.
This book constitutes the refereed proceedings of the 18th International Conference on Ad-Hoc, Mobile, and Wireless Networks, ADHOC-NOW 2019, held in Luxembourg, in October 2019.
This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020.
Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005).
Explore distributed ledger technology, decentralization, and smart contracts and develop real-time decentralized applications with Ethereum and SolidityKey FeaturesGet to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsGain advanced insights into cryptography and cryptocurrenciesBook DescriptionBlockchain technology is a distributed ledger with applications in industries such as finance, government, and media.
This two-volume set LNICST 357-358 constitutes the post-conference proceedings of the 11th EAI International Conference on Wireless and Satellite Services, WiSATS 2020, held in Nanjing, China, in September 2020.
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market request, but also because this science has created possibilities for people of investigation and solved many problems that some time ago seemed to be insolvable.
Introduction The International Federation for Information Processing (IFIP) is a non-profit umbrella organization for national societies working in the field of information processing.
This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, held in St.
Explore distributed ledger technology, decentralization, and smart contracts and develop real-time decentralized applications with Ethereum and SolidityKey FeaturesGet to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsGain advanced insights into cryptography and cryptocurrenciesBook DescriptionBlockchain technology is a distributed ledger with applications in industries such as finance, government, and media.
Data Analytics using Machine Learning Techniques on Cloud Platforms examines how machine learning (ML) and cloud computing combine to drive data-driven decision-making across industries.
This book constitutes the joint refereed proceedings of the 20th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2020, and the 13th Conference on Internet of Things and Smart Spaces, ruSMART 2020.
The two-volume set LNCS 12765-12766 constitutes the refereed proceedings of the thematic area Human Interface and the Management of Information, HIMI 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.