Machine Intelligence and Big Data Analytics for Cybersecurity Applications [E-Book] /
Table of Contents: ...-Malware Detection Engine -- Classifying Common Vulnerabilities and Exposures Database Using Text Mining and Graph Theoretical Analysis -- Robust Cryptographical Applications for a Secure Wireless Network Protocol....

Full text 
Blockchain Technology: Applications and Challenges [E-Book] /
Innovative Systems for Intelligent Health Informatics [E-Book] : Data Science, Health Informatics, Intelligent Systems, Smart Computing /
Table of Contents: ... Cryptographically-based Securing Applica-tive Protocols MQTT and CoAP to Optimize Medical-IOT Supervis-ing Platforms -- Pulmonary Nodule Classification Based on Three Convolutional Neural Networks Models....

Full text 
13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) [E-Book] /
Artificial Intelligence in Intelligent Systems [E-Book] : Proceedings of 10th Computer Science On-line Conference 2021, Vol. 2 /
Table of Contents: ... on Stability of Oum Rabiâ estuary (Morocco) using SWAN Model -- New method of verifying cryptographic protocols, based on the process model -- A Method of Search Space Adaptation in the False Pseudonyms Detection Procedure -- Analytical Studies of Behavior of Users...

Full text 
Quantum Random Number Generation [E-Book] : Theory and Practice /
Multimedia Communications, Services and Security [E-Book] : 10th International Conference, MCSS 2020, Kraków, Poland, October 8-9, 2020, Proceedings /
Table of Contents: ... on Security and Efficiency of SecaaS Services -- Analysis of available microcontroller computing resources for the application of some cryptographic hash functions on different Internet of Things platforms -- Workflow Management System with Automatic Correction...

Full text 
Nanoscale Quantum Optics : Lectures from the International School of Physics Enrico Fermi on Nanoscale Quantum Optics, held in Varenna, Italy, from 23 - 28 July 2018 [E-Book] /
Optical encryption and decryption [E-Book] /
Providing Sound Foundations for Cryptography : On the Work of Shafi Goldwasser and Silvio Micali [E-Book]
Table of Contents: ... of Silvio Micali -- 3. An Interview with Shafi Goldwasser -- 4. An Interview with Silvio Micali -- 5. The Cryptographic Lens: Shafi Goldwasser'sTuring Lecture -- 6. Proofs, According to Silvio: Silvio Micali's Turing Lecture -- PART II. ORIGINAL PAPERS -- 7...

Full text 
VLSI Design: Circuits, Systems and Applications [E-Book] : Select Proceedings of ICNETS2, Volume V /
Table of Contents: ... -- Implementation of Dual-Hysteresis Mode Flip-Flop Multivibrator    Using Differential Voltage Current Conveyor -- High Performance Domino Logic Circuit Design By Contention Reduction -- Differential Power Analysis (Dpa) Resistant Cryptographic S-Box -- Implementation...

Full text 
High-Rate, High-Dimensional Quantum Key Distribution Systems [E-Book] /
Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linux, third edition [E-Book] /
Table of Contents: ...) Vulnerabilities -- 7. Cross-Site Request Forgery, Identification, and Exploitation -- 8. Attacking Flaws in Cryptographic Implementations -- 9. AJAX, HTML5, and Client-Side Attacks -- 10. Other Common Security Flaws in Web Applications -- 11. Using Automated Scanners...

Full text 
Mastering blockchain : distributed ledger technology, decentralization, and smart contracts explained [E-Book] /
Learn python programming : a beginner's guide to learning the fundamentals of python language to write efficient, high-quality code [E-Book] /
Practical internet of things security : design a security framework for an internet connected ecosystem, 2nd edition [E-Book] /
Table of Contents: ..., and Countermeasures -- Chapter 3: Approaches to Secure Development -- Chapter 4: Secure Design of IoT Devices -- Chapter 5: Operational Security Life Cycle -- Chapter 6: Cryptographic Fundamentals for IoT Security Engineering -- Chapter 7: Identity and Access Management...

Full text 
Blockchain quick start guide : a beginner's guide to developing enterprise-grade decentralized applications [E-Book] /
Cryptographic agility and interoperability : proceedings of a workshop [E-Book] /
Deep Learning for Biometrics [E-Book] /
Bhanu, Bir
Table of Contents: ... Networks (DCGAN) -- Gender Classification from NIR Iris Images Using Deep Learning -- Deep Learning for Tattoo Recognition -- Part IV: Deep Learning for Biometric Security and Protection -- Learning Representations for Cryptographic Hash Based Face Template...

Full text 
Theory of Cryptography [E-Book] : 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I /