Computer Science & Engineering

Cryptography & Coding Theory

Per Page:

Beauty of Mathematics

Jun Wu
June 15, 2018

A series of essays introducing the applications of machine learning and statistics in natural language processing, speech recognition and web search for non-technical readers...

Handbook of Image-based Security Techniques

Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri
May 22, 2018

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking...

An Introduction to Number Theory with Cryptography, Second Edition

James Kraft, Lawrence Washington
January 31, 2018

Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating it with traditional topics in number theory. The authors have written the text in an engaging style...

Iris Biometric Model for Secured Network Access

Franjieh El Khoury
October 23, 2017

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured...

Multilevel Modeling of Secure Systems in QoP-ML

Bogdan Księżopolski
August 01, 2017

In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and...

Multiple-Base Number System: Theory and Applications

Vassil Dimitrov, Graham Jullien, Roberto Muscedere
April 06, 2017

Computer arithmetic has become so fundamentally embedded into digital design that many engineers are unaware of the many research advances in the area. As a result, they are losing out on emerging opportunities to optimize its use in targeted applications and technologies. In many cases, easily...

Visual Cryptography and Secret Image Sharing

Stelvio Cimato, Ching-Nung Yang
March 29, 2017

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a...

Distributed Networks: Intelligence, Security, and Applications

Qurban A. Memon
March 29, 2017

For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence,...

Elements of Quasigroup Theory and Applications

Victor Shcherbacov
March 17, 2017

This book provides an introduction to quasigroup theory along with new structural results on some of the quasigroup classes. Many results are presented with some of them from mathematicians of the former USSR. These included results have not been published before in the western mathematical...

Guide to Pairing-Based Cryptography

Nadia El Mrabet, Marc Joye
December 08, 2016

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite...

Security for Wireless Sensor Networks using Identity-Based Cryptography

Harsh Kupwade Patil, Stephen A. Szygenda
December 01, 2016

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack...

Noiseless Steganography: The Key to Covert Communications

Abdelrahman Desoky
November 16, 2016

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the...