Data fusion, the ability to combine data derived fromseveral sources to provide a coherent, informative, anduseful characterization of a situation,is a challengingtask.
For four decades, information theory has been viewed almost exclusively as a theory based upon the Shannon measure of uncertainty and information, usually referred to as Shannon entropy.
The objective of the present edition of this monograph is the same as that of earlier editions, namely, to provide readers with some mathemati- cal maturity a rigorous and modern introduction to the ideas and principal theorems of probabilistic information theory.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012.
This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011.
Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel te- nology.
The CRYPTO '93 conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom), in co-operation with the IEEE Computer Society Technical Committee.
The CRYPTO '94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy.
A series of workshops devoted to modern cryptography beganin Santa Barbara,California in 1981 and was followed in1982 by a European counterpart in Burg Feuerstein, Germany.
This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992.
'I'he int,ernational Association for Cryptologic Research (IACK) organizes two inter- tioilill coiifcrcnces every year, one in Europe and one in the United States.
Eurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the International Association for Cryptologic Research (IACR).
A series of open workshops devoted to modem cryptology began in Santa Barbara, California in 1981 and was followed in 1982 by a European counterpart in Burg Feurstein, Germany.
One of the most remarkable and beautiful theorems in coding theory is Gleason's 1970 theorem about the weight enumerators of self-dual codes and their connections with invariant theory.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This two-volume set LNAI 14692-14693 constitutes the thoroughly refereed proceedings of the 21st International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2024, held as part of HCI International 2024,held in Washington, DC, USA, during June 29 - July 4, 2024.
This two-volume set LNAI 14692-14693 constitutes the thoroughly refereed proceedings of the 21st International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2024, held as part of HCI International 2024,held in Washington, DC, USA, during June 29 - July 4, 2024.
This book constitutes the refereed post proceedings of the 22nd International Workshop on Digital Forensics and Watermarking, IWDW 2023, held in Jinan, China,during November 25 26, 2023.
An introductory course on Software Engineering remains one of the hardest subjects to teach largely because of the wide range of topics the area enc- passes.
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes.