Cryptography & Coding Theory

65 Results


Subject


Status


Type

Cryptography & Coding Theory

Per Page:
Sort:
Hardware Security: Design, Threats, and Safeguards

Hardware Security: Design, Threats, and Safeguards

Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

October 29, 2014

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with...

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

David Kahn

January 17, 2014

Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking...

Managing Trust in Cyberspace

Managing Trust in Cyberspace

Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey

December 14, 2013

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between...

Introduction to Computer and Network Security: Navigating Shades of Gray

Introduction to Computer and Network Security: Navigating Shades of Gray

Richard R. Brooks

August 19, 2013

Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical...

Distributed Networks: Intelligence, Security, and Applications

Distributed Networks: Intelligence, Security, and Applications

Qurban A. Memon

July 22, 2013

For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence,...

Unauthorized Access: The Crisis in Online Privacy and Security

Unauthorized Access: The Crisis in Online Privacy and Security

Robert H. Sloan, Richard Warner

July 15, 2013

Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in...

Network Anomaly Detection: A Machine Learning Perspective

Network Anomaly Detection: A Machine Learning Perspective

Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

June 18, 2013

With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important. Anomaly-based network intrusion detection refers to finding exceptional or nonconforming...

Handbook of Finite Fields

Handbook of Finite Fields

Gary L. Mullen, Daniel Panario

June 17, 2013

Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors compile state-of-the-art research in this definitive handbook. Edited by two renowned researchers, the...

Algebraic Curves in Cryptography

Algebraic Curves in Cryptography

San Ling, Huaxiong Wang, Chaoping Xing

June 13, 2013

The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a...

Discrete Dynamical Systems and Chaotic Machines: Theory and Applications

Discrete Dynamical Systems and Chaotic Machines: Theory and Applications

Jacques M. Bahi, Christophe Guyeux

June 07, 2013

For computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts. Discrete Dynamical Systems and Chaotic Machines:...

Iris Biometric Model for Secured Network Access

Iris Biometric Model for Secured Network Access

Franjieh El Khoury

May 08, 2013

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured...

Optical Coding Theory with Prime

Optical Coding Theory with Prime

Wing C. Kwong, Guu-Chang Yang

May 02, 2013

Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory—until now. Written by renowned authorities in the field, Optical Coding Theory with Prime...