Advances in Networked-Based Information Systems [E-Book] : The 24th International Conference on Network-Based Information Systems (NBiS-2021) /
Table of Contents: ... of Intrusion Detection for Safeguarding Electronic Health Record System -- Personalized Cryptographic Protocols - Obfuscation Technique Based on the Qualities of the Individual -- Personalized Cryptographic Protocolsfor Advanced Data Protection -- Antilock Braking...

Full text 
Internet of Things [E-Book] : Security and Privacy in Cyberspace /
Table of Contents: ...Pre-requisite concepts for Security and Privacy -- Basic concepts of Cloud and Fog Computing -- Access Control and Authentication in IoT -- Lightweight Cryptographic Techniques and Protocols for IoT -- Communication Security in IoT -- Intrusion Detection...

Full text 
International Conference on Computing, Communication, Electrical and Biomedical Systems [E-Book] /
Table of Contents: ... -- An Implementation of Mobile Shareable Content Oject Reference Model for Online Assessment using Virtal Learning Environment -- A Finest Secured Routing Techniques With Transmision Of Data In Mobile Adhoc Newtorks -- Evaluation of Various Cryptographic Techniques Based...

Full text 
Proceedings of the Seventh International Conference on Mathematics and Computing [E-Book] : ICMC 2021 /
Table of Contents: ... on randomness used in signature generation of UOV -- On The Inadequacy of Multimodal Maps for Cryptographic Hash Applications with Phase-Space Modulation. ....

Full text 
Privacy-Preserving Deep Learning [E-Book] : A Comprehensive Survey /
Side-Channel Analysis of Embedded Systems [E-Book] : An Efficient Algorithmic Approach  /
Distributed Applications and Interoperable Systems [E-Book] : 21st IFIP WG 6.1 International Conference, DAIS 2021, Held as Part of the 16th International Federated Conference on Distributed Computing Techniques, DisCoTec 2021, Valletta, Malta, June 14-18, 2021, Proceedings /
Table of Contents: ... Systems -- Portable Intermediate Representation for Efficient Big Data Analytics -- Shared-Dining: Broadcasting Secret Shares Using Dining Cryptographers Groups -- UCBFed: Using Reinforcement Learning Method to Tackle the Federated Optimization Problem...

Full text 
Combinatorial Algorithms [E-Book] : 32nd International Workshop, IWOCA 2021, Ottawa, ON, Canada, July 5-7, 2021, Proceedings /
Table of Contents: ... Eccentricity Shortest Path Problem with Respect to Structural Parameters -- Non-preemptive tree packing -- Card-based Cryptographic Protocols for Three-input Functions Using Private Operations -- Königsberg Sightseeing: Eulerian Walks in Temporal Graphs...

Full text 
Quantum Cryptography [E-Book] : From Key Distribution to Conference Key Agreement /
The Theory of Hash Functions and Random Oracles [E-Book] : An Approach to Modern Cryptography /
Table of Contents: ...Introduction -- Preliminaries: Cryptographic Foundations -- Part I: Foundations -- Computational Security -- Pseudorandomness and Computational Indistinguishability -- Collision Resistance -- Encryption Schemes -- Signature Schemes -- Non-cryptographic...

Full text 
Computational Intelligence in Communications and Business Analytics [E-Book] : Third International Conference, CICBA 2021, Santiniketan, India, January 7-8, 2021, Revised Selected Papers /
Table of Contents: ...+T-group -- Recurrent Neural Network and Metaheuristics Search: A New Approach for Encryption Key Generation in Cryptographic Engineering -- Computational Intelligence -- Modeling and prediction of COVID-19 in India using machine learning -- Exploring Hand...

Full text 
Computer Aided Verification [E-Book] : 33rd International Conference, CAV 2021, Virtual Event, July 20-23, 2021, Proceedings, Part I /
Table of Contents: ... Monte Carlo Tree Search Guided by QB-Robustness -- Fast zone-based algorithms for reachability in pushdown timed automata -- Security -- Verified Cryptographic Code for Everybody -- Not All Bugs Are Created Equal, But Robust Reachability Can Tell...

Full text 
Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography [E-Book] : Efficient Modular Exponential Techniques /
Table of Contents: ...Chapter 1. Introduction -- Chapter 2. Public-Key Cryptographic Algorithms and Techniques -- Chapter 3. Modular Exponentiations and Modular Multiplication -- Chapter 4. Improving the Performance of Public-Key Techniques -- Chapter 5. Hardware...

Full text 
Security and Privacy [E-Book] : Select Proceedings of ICSP 2020 /
Table of Contents: ... Generation Using Modified RSA -- Efficient Random Grid Visual Cryptographic Schemes having Essential Members -- Further results on bent-negabent Boolean functions -- Generalization of Lattice Based Cryptography on Hypercomplex Algebras -- Health Monitoring...

Full text 
Computer Security and the Internet [E-Book] : Tools and Jewels from Malware to Bitcoin /
Table of Contents: ...1. Security Concepts and Principles -- 2. Cryptographic Building Blocks -- 3. User Authentication-Passwords, Biometrics and Alternatives -- 4. Authentication Protocols and Key Establishment.-5. Operating System Security and Access Control -- 6. Software...

Full text 
Mobile, Secure, and Programmable Networking [E-Book] : 6th International Conference, MSPN 2020, Paris, France, October 28-29, 2020, Revised Selected Papers /
Table of Contents: ... -- Efficient and Secure Statistical Port Scan Detection Scheme -- Fast and Flexible Elliptic Curve Cryptography for Dining Cryptographers Networks -- Efficient and Lightweight Polynomial-based Key Management Scheme for Dynamic Networks -- Parallel Applications...

Full text 
Fundamentals of Cryptography [E-Book] : Introducing Mathematical and Algorithmic Foundations /
Cryptography 101 : From Theory to Practice [E-Book]
Table of Contents: ...Intro -- Cryptography 101: From Theory to Practice -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 CRYPTOLOGY -- 1.2 CRYPTOGRAPHIC SYSTEMS -- 1.2.1 Classes of Cryptographic Systems -- 1.2.2 Secure...

Full text 
Conversations about Physics. Volume 1 [E-Book]
Table of Contents: .... Beginnings -- II. Cryptographic Essentials -- III. Public Key Cryptosystems -- IV. Harnessing Interference -- V. Quantum Sociology -- VI. Quantum Metaphysics -- VII. The Joy of Questioning -- The Physics of Banjos -- A conversation with David Politzer...

Full text 
Provenance and Annotation of Data and Processes [E-Book] : 8th and 9th International Provenance and Annotation Workshop, IPAW 2020 + IPAW 2021, Virtual Event, July 19-22, 2021, Proceedings /
Table of Contents: ... Transparent and FAIR Computation, with Defeasible Reasoning on Data, Methods and Results -- The PROV-JSONLD Serialization -- Security -- Proactive Provenance Policies for Automatic Cryptographic Data Centric Security -- Provenance-based Security Audits and its...

Full text