This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers.
With the development of big data, data sharing has become increasingly popular and important in optimizing resource allocation and improving information utilization.
This book constitutes the refereed proceedings of the 8th European Lean Educator Conference ELEC 2022, which took place in Galway, Ireland, in November 2022; the event was sponsored by IFIP WG 5.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2023, CT-RSA 2023, held in San Francisco, CA, USA, in April 2023.
This reference text presents the important components for grasping the potential of social computing with an emphasis on concerns, challenges, and benefits of the social platform in depth.
This reference text presents the important components for grasping the potential of social computing with an emphasis on concerns, challenges, and benefits of the social platform in depth.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2023, CT-RSA 2023, held in San Francisco, CA, USA, in April 2023.
This book constitutes the refereed proceedings of the 8th Iberoamerican Workshop on Human-Computer Interaction, HCI-COLLAB 2022, which took place in Havana, Cuba, in October 2022.
This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection.
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data.
Demystify one of the most disruptive modern technologies and gain a deeper understanding of distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, and more.
This book constitutes the revised selected proceedings of Second International Symposium on Biomedical and Computational Biology, BECB 2022, held as a virtual event in August 2022.
This book examines the latest developments in Artificial Intelligence (AI)-based metaheuristics algorithms with applications in information security for digital media.
This book examines the latest developments in Artificial Intelligence (AI)-based metaheuristics algorithms with applications in information security for digital media.
This book addresses various electronics supply-chain vulnerabilities, attack methods that exploit these vulnerabilities, and design techniques to mitigate the vulnerabilities while defending against the attacks.
Decision support systems are developed for integrated pest and disease management and nutrition management using open-source technologies as java, android, and low-cost hardware devices like Arduino micro controller.
Decision support systems are developed for integrated pest and disease management and nutrition management using open-source technologies as java, android, and low-cost hardware devices like Arduino micro controller.
This book constitutes the refereed proceedings of the 15th International Baltic Conference on Digital Business and Intelligent Systems, Baltic DB&IS 2022, held in Riga, Latvia, in July 2022.
This book constitutes the refereed proceedings of the Third International Conference on Next Generation Arithmetic, CoNGA 2022, which was held in Singapore, during March 1-3, 2022.
In diesem Buch werden die wichtigsten kryptographischen Verfahren, Protokolle und Algorithmen der letzten Jahrzehnte erläutert und mathematisch-logisch begründet.
This book constitutes the proceedings of the 9th International Workshop on Code-Based Cryptography, CBCrypto 2021, which was held during June 21-22, 2021.
This book constitutes the refereed proceedings of the 18th International Conference on Cryptology in India, INDOCRYPT 2017, held in Chennai, India, in December 2017.
This book constitutes the refereed proceedings of the 7th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2017, held in Goa, India, in December 2017.
This book constitutes the refereed proceedings of the 8th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2019, held in Linz, Austria, in August 2019.
Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM).