1
Cover Image
Table of Contents: ... Wave Quantum Cryptography -- Development of a Method for Assessing of the Oxygen Supply of Tissues Based on a Multi-Channel Spectrum Analyzer -- Possibilities of Using Optical Solitons in High-Speed Systems -- Fluorescence Quenching of Tetraphenylporphyrin...

Full text 
2
Cover Image
3
Cover Image
4
Cover Image
Table of Contents: ... on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image...

Full text 
5
Cover Image
Table of Contents: ... -- Efficient and Secure Statistical Port Scan Detection Scheme -- Fast and Flexible Elliptic Curve Cryptography for Dining Cryptographers Networks -- Efficient and Lightweight Polynomial-based Key Management Scheme for Dynamic Networks -- Parallel Applications...

Full text 
6
Cover Image
Table of Contents: ... -- Defending Web Servers Against Flash Crowd Attacks -- Cryptography and its Applications -- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures -- Cryptanalysis of the Binary Permuted Kernel Problem -- Security Comparisons and Performance...

Full text 
7
Cover Image
Table of Contents: ...Security Models -- Cryptography in Quantum Computer Age -- Constructions and Designs -- Efficient Implementations -- Security Analysis -- Artificial Intelligence and Cryptocurrency -- Fault and Side-Channel Attack....

Full text 
8
Cover Image
9
Cover Image
Table of Contents: ...Elements of Quantum Information Theory -- Introducing Quantum Key Distribution -- Quantum Conference Key Agreement -- Quantum Key Distribution with Imperfect Devices -- Beyond Point-to-point Quantum Key Distribution -- Device-independent Cryptography....

Full text 
10
Cover Image
11
Cover Image
Table of Contents: ...Introduction -- Genesis of Ransomware -- Evolution of Applied Cryptography -- Ransomware Economics -- Ransomware Case Studies -- Dangerous Convergences -- Auxiliary Impacts -- Failed Translations -- The Sociology of Ransomware -- Conclusion....

Full text 
12
Cover Image
Table of Contents: ... Generation Using Modified RSA -- Efficient Random Grid Visual Cryptographic Schemes having Essential Members -- Further results on bent-negabent Boolean functions -- Generalization of Lattice Based Cryptography on Hypercomplex Algebras -- Health Monitoring...

Full text 
13
Cover Image
Table of Contents: ... Tolerant Networks -- Opportunistic Networks -- Cognitive Radio Networks -- Satellite Communication -- Cryptography & Data Security -- Cyber-Physical Systems -- Cloud & Fog Computing -- Grid & Cluster Computing -- Part II: Advanced Computing -- AI & Machine...

Full text 
14
Cover Image
15
Cover Image
Table of Contents: ... Cryptography -- Access Control Encryption from Group Encryption -- Password Protected Secret Sharing from Lattices -- Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts....

Full text 
16
Cover Image
Table of Contents: ... on Identifiers -- A Scalable Simulation of the BB84 Protocol Involving Eavesdropping -- Approach to Cryptography from Di erential Geometry with Example -- On using zk-SNARKs and zk-STARKs inblockchain-based identity management -- Manager asks: Which vulnerability must...

Full text 
17
Cover Image
Table of Contents: ...Contents -- 1 Introduction to Superposition -- 2 What is a Qubit? -- 3 Creating Superposition: The Beam Splitter -- 4 Creating Superposition: Stern-Gerlach -- 5 Quantum Cryptography -- 6 Quantum Gates -- 7 Entanglement -- 8 Quantum Teleportation -- 9...

Full text 
18
Cover Image
Table of Contents: ... cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms...

Full text 
19
Cover Image
Book
Subject (ZB): ...cryptography...
Table of Contents 
20
Cover Image
Table of Contents: ...Theory and Cryptography -- A Cellular Automaton that computes Shortest Paths in Grid Graph -- Strengthening of ACORN Authenticated Cipher by using Cellular Automata -- Prevention of Fault Attacks in ASCON Authenticated Cipher using Cellular Automata...

Full text