Das Lehrbuch gibt einen systematischen Einstieg in die Signaltheorie und behandelt sowohl die in der Ingenieur-Literatur üblichen Werkzeuge zur Signal- und Systembeschreibung als auch die grundlegenden mathematischen Konzepte zur Interpretation von Signalen als Elemente von Vektorräumen und zur Signal-Approximation.
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery.
Since publication of the initial papers in 2006, compressed sensing has captured the imagination of the international signal processing community, and the mathematical foundations are nowadays quite well understood.
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023.
This comprehensive exam guide offers 100% coverage of every topic on the CompTIA PenTest+ examGet complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-001 from this comprehensive resource.
This two-volume set LNCS 14017 - 14018 constitutes the thoroughly refereed proceedings of the 20th International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2023, held as part of HCI International 2023 which took place in Copenhagen, Denmark, during July 23-28, 2023.
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021.
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15-17, 2024.
This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2020, held in Lisbon, Portugal, in September 2020.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025.
Introduction to the Theory of Quantum Information Processing provides the material for a one-semester graduate level course on quantum information theory and quantum computing for students who have had a one-year graduate course in quantum mechanics.
In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management.
This book constitutes the proceedings of the 18th International Conference on Passive and Active Measurement, PAM 2017, held in Sydney, Australia, in March 2017.
Focuses mainly on communications and communication standards with emphasis also on risk analysis, ITSEC, EFT and EDI with numerous named viruses described.
A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables.
The three-volume set LNCS 13302, 13303 and 13304 constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 24th International Conference on Human-Computer Interaction, HCII 2022, which took place virtually in June-July 2022.
Dieses Kryptographiebuch ist geschrieben für Studierende der Mathematik, Informatik, Physik, Elektrotechnik oder andere Leser mit mathematischer Grundbildung und wurde in vielen Vorlesungen erfolgreich eingesetzt.
The imminent exhaustion of the first printing of this monograph and the kind willingness of the publishers have presented me with the opportunity to correct a few minor misprints and to make a number of additions to the first edition.
This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021.
The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P).
This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a variety of contexts arising out of several separate but intersecting story lines, some only implicit in the GRT.
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.
This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and Privacy for Big Data, TrustData 2016; the 6th International Symposium on Trust, Security and Privacy for Emerging Applications, TSP 2016; the 4th International Workshop on Network Optimization and Performance Evaluation, NOPE 2016; the Second International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys 2016; the Annual Big Data Security, Privacy and Trust Workshop, BigDataSPT 2016; and the First International Workshop on Cloud Storage Service and Computing, WCSSC 2016.
This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers.
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles.
This book focuses on how to apply network coding at different layers in wireless networks - including MAC, routing, and TCP - with special focus on cognitive radio networks.
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.
This volume, the 36th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains eight revised, extended papers selected from the 3rd International Conference on Future Data and Security Engineering, FDSE 2016, and the 10th International Conference on Advanced Computing and Applications, ACOMP 2016, which were held in Can Tho City, Vietnam, in November 2016.
The three-volume set LNCS 15338, 15339 and 15340 constitutes the refereed proceedings from the 41st Computer Graphics International Conference, CGI 2024, held during July 1-5, 2024, in Geneva, Switzerland.
This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020.
This book constitutes the refereed proceedings of the 14th International Conference on Virtual Reality and Augmented Reality, EuroVR 2017, held in Laval, France, in December 2017.