Computer Science & Engineering

Cryptography & Coding Theory

Per Page:
Sort:

Multiple-Base Number System: Theory and Applications

Vassil Dimitrov, Graham Jullien, Roberto Muscedere
April 06, 2017

Computer arithmetic has become so fundamentally embedded into digital design that many engineers are unaware of the many research advances in the area. As a result, they are losing out on emerging opportunities to optimize its use in targeted applications and technologies. In many cases, easily...

Visual Cryptography and Secret Image Sharing

Stelvio Cimato, Ching-Nung Yang
March 29, 2017

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a...

Distributed Networks: Intelligence, Security, and Applications

Qurban A. Memon
March 29, 2017

For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence,...

Elements of Quasigroup Theory and Applications

Victor Shcherbacov
March 17, 2017

This book provides an introduction to quasigroup theory along with new structural results on some of the quasigroup classes. Many results are presented with some of them from mathematicians of the former USSR. These included results have not been published before in the western mathematical...

Guide to Pairing-Based Cryptography

Nadia El Mrabet, Marc Joye
December 08, 2016

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite...

Security for Wireless Sensor Networks using Identity-Based Cryptography

Harsh Kupwade Patil, Stephen A. Szygenda
December 01, 2016

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack...

Noiseless Steganography: The Key to Covert Communications

Abdelrahman Desoky
November 16, 2016

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the...

Introduction to Coding Theory, Second Edition

Jurgen Bierbrauer
October 10, 2016

This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary...

Electromagnetic Compatibility: Methods, Analysis, Circuits, and Measurement, Third Edition

David A. Weston
September 29, 2016

Shelving Guide: Electrical Engineering Revised, updated, and expanded, Electromagnetic Compatibility: Methods, Analysis, Circuits, and Measurement, Third Edition provides comprehensive practical coverage of the design, problem solving, and testing of electromagnetic compatibility (EMC) in...

Introduction to Certificateless Cryptography

Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
August 23, 2016

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications...

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance

Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
May 13, 2016

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with...

Mathematical Foundations of Public Key Cryptography

Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng
October 21, 2015

In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and...

Conferences

Year: