Communication Systems is as an introductory textbook, presenting Fourier transform, convolution, and definitions of autocorrelation and power spectral density.
This book constitutes the refereed proceedings of the 9th Iberoamerican Conference on Applications and Usability of Interactive Television, jAUTI 2020, in Aveiro, Portugal, in December 2020.
This two-volume set constitutes the refereed proceedings of the 7th International Conference on Human Aspects of IT for the Aged Population, ITAP 2021, held as part of the 23rd International Conference, HCI International 2021, held as a virtual event, in July 2021.
A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.
Learn advanced C# concepts and techniques such as building caches, cryptography, and parallel programming by solving interesting programming challengesKey FeaturesGain useful insights on advanced C# programming topics and APIsUse locking and cached values to solve parallel problemsTake advantage of .
Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market.
This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.
Foreword by Dieter Jungnickel Finite Commutative Rings and their Applications answers a need for an introductory reference in finite commutative ring theory as applied to information and communication theory.
In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road.
This book constitutes the refereed proceedings of the 22nd International Conference on Distributed and Computer and Communication Networks, DCCN 2019, held in Moscow, Russia, in September 2019.
This book presents refereed proceedings of the First International Conference on Algebra, Codes and Cryptology, A2C 2019, held in Dakar, Senegal, in December 2019.
High performance computing consumes and generates vast amounts of data, and the storage, retrieval, and transmission of this data are major obstacles to effective use of computing power.
This new edition of a well-received textbook provides a concise introduction to both the theoretical and experimental aspects of quantum information at the graduate level.
Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacksKey FeaturesExplore blockchain concepts such as cryptography, consensus algorithms, and security assumptionsArchitect network security for mission-critical decentralized apps (Dapps) using design security considerationsConsider various deployment and operational aspects while building a blockchain networkBook DescriptionBlockchain adoption has extended from niche research to everyday usage.
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises.
Explore the blockchain-based decentralized platform and understand how Ethereum works with Dapps examplesKey FeaturesExplore the Ethereum ecosystem and understand the latest research on the platformBuild decentralized apps (Dapps) using smart contracts and Ethereum with the help of practical examplesLearn to make your decentralized applications fast and highly secureBook DescriptionEthereum is a blockchain-based, decentralized computing platform that allows running smart contracts.
The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.
This monograph offers a new foundation for information theory that is based on the notion of information-as-distinctions, being directly measured by logical entropy, and on the re-quantification as Shannon entropy, which is the fundamental concept for the theory of coding and communications.
This new book discusses the concepts while also highlighting the challenges in thefield of quantum cryptography and also covering cryptographic techniques and cybersecurity techniques, in a single volume.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
YUNMIN ZHU In the past two decades, multi sensor or multi-source information fusion tech- niques have attracted more and more attention in practice, where observations are processed in a distributed manner and decisions or estimates are made at the individual processors, and processed data (or compressed observations) are then transmitted to a fusion center where the final global decision or estimate is made.
This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.
This volume constitutes the refereed proceedings of the Third International Conference on Computational Intelligence, Security and Internet of Things, ICCISIoT 2020, held in Agartala, India, in December 2020.
This book looks at the integration of blockchain technology in healthcare settings, focusing on its potential to address security and privacy concerns of medical applications.
A practical blockchain handbook designed to take you through implementing and re-engineering banking and financial solutions and workflows using eight step-by-step projectsKey FeaturesImplement various end-to-end blockchain projects and learn to enhance present-day financial solutionsUse Ethereum, Hyperledger, and Stellar to build public and private decentralized applicationsAddress complex challenges faced in the BFSI domain using different blockchain platform servicesBook DescriptionBlockchain technology will continue to play an integral role in the banking and finance sector in the coming years.
Data structures and algorithms are presented at the college level in a highly accessible format that presents material with one-page displays in a way that will appeal to both teachers and students.
The study of signal transmission and deterioration in signal characteristics as the signal propagates through wireless channels is of great significance.
This practical guide offers all important digital television, sound radio, and multimedia standards such as MPEG, DVB, DVD, DAB, ATSC, T-DMB, DMB-T, DRM and ISDB-T.
This book constitutes selected papers from the 20th International Conference on Transport Systems Telematics, TST 2020, held in Krakow, Poland, in October 2020.