Головна Спрощенний режим Опис Шлюз Z39.50
Авторизація
Прізвище
Пароль
 

Бази даних


Доступ до повнотекстових книг Springer Nature (через IP-адреси БДМУ) - результати пошуку

Вид пошуку

Зона пошуку
у знайденому
Формат представлення знайдених документів:
повнийінформаційнийкороткий
Відсортувати знайдені документи за:
авторомназвоюроком виданнятипом документа
Пошуковий запит: (<.>S=Coding and Information Theory.<.>)
Загальна кiлькiсть документiв : 42
Показанi документи с 1 за 20
 1-20    21-40   41-42 
1.


    Reznikova, Zhanna.
    Studying Animal Languages Without Translation: An Insight from Ants [[electronic resource] /] : монография / Zhanna. Reznikova ; . - 1st ed. 2017. - [S. l. : s. n.]. - VIII, 92 p. 25 illus., 15 illus. in color. - Б. ц.
    Зміст:
Communication, speech and language in human- and non-human animals. The complexity of communication systems and intelligence in animals --
Intelligent communication: can animals exchange meaningful messages? --
Cracking animals codes --
Direct dialogs with animals by means of intermediary languages --
Ants and Bits --
Why bits? Information Theory as a tool for studying natural communication systems --
Why ants? Reliable agents for information transmission --
Ants on the Binary Tree --
The entropy – based approach --
The Kolmogorov Complexity-based approach --
Ants can compress information --
Numerical competence in animals with an insight from ant “language” --
Criteria of numerical competence for comparative studies --
Quantitative judgments in animals --
Advanced numerical abilities --
Information Theory as a tool for studying wild arithmetic on the base of their own communications --
An insight from ant “language”: flexibility of communication as a basis for arithmetic skills.
Рубрики: Animal physiology.
   Animal models in research.

   Coding theory.

   Information theory.

   Invertebrates.

   Neurobiology.

   Animal Physiology.

   Animal Models.

   Coding and Information Theory.

   Invertebrates.

   Neurobiology.

Анотація: The Author of this new volume on ant communication demonstrates that information theory is a valuable tool for studying the natural communication of animals. To do so, she pursues a fundamentally new approach to studying animal communication and “linguistic” capacities on the basis of measuring the rate of information transmission and the complexity of transmitted messages. Animals’ communication systems and cognitive abilities have long-since been a topic of particular interest to biologists, psychologists, linguists, and many others, including researchers in the fields of robotics and artificial intelligence. The main difficulties in the analysis of animal language have to date been predominantly methodological in nature. Addressing this perennial problem, the elaborated experimental paradigm presented here has been applied to ants, and can be extended to other social species of animals that have the need to memorize and relay complex “messages”. Accordingly, the method opens exciting new dimensions in the study of natural communications in the wild.

Перейти: https://doi.org/10.1007/978-3-319-44918-0

Дод.точки доступу:
Reznikova, Zhanna. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

2.


    Dasgupta, Dipankar.
    Advances in User Authentication [[electronic resource] /] : монография / Dipankar. Dasgupta, Roy, Arunava., Nag, Abhijit. ; . - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 360 p. 165 illus., 128 illus. in color. - Б. ц.
    Зміст:
Authentication Basics --
Biometric Authentication --
Negative Authentication Systems --
Pseudo-Passwords and Non-Textual Approaches --
Multi-Factor Authentication --
Continuous Authentication --
Adaptive Multi-Factor Authentication.
Рубрики: Coding theory.
   Information theory.

   Computer security.

   Data structures (Computer science).

   Biometrics (Biology).

   Coding and Information Theory.

   Systems and Data Security.

   Data Storage Representation.

   Biometrics.

Анотація: This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of these modalities in a time-varying operating environment, including factors such as devices, media and surrounding conditions, like light, noise, etc. The book is divided into several parts that cover descriptions of several biometric and non-biometric authentication modalities, single factor and multi-factor authentication systems (mainly, adaptive), negative authentication system, etc. Adaptive strategy ensures the incorporation of the existing environmental conditions on the selection of authentication factors and provides significant diversity in the selection process. The contents of this book will prove useful to practitioners, researchers and students. The book is suited to be used a text in advanced/graduate courses on User Authentication Modalities. It can also be used as a textbook for professional development and certification coursework for practicing engineers and computer scientists. .

Перейти: https://doi.org/10.1007/978-3-319-58808-7

Дод.точки доступу:
Roy, Arunava.; Nag, Abhijit.; Dasgupta, Dipankar. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

3.


    Giard, Pascal.
    High-Speed Decoders for Polar Codes [[electronic resource] /] : монография / Pascal. Giard, Thibeault, Claude., Gross, Warren J. ; . - 1st ed. 2017. - [S. l. : s. n.]. - XVIII, 98 p. 34 illus., 29 illus. in color. - Б. ц.
    Зміст:
1 Polar Codes --
2 Fast Low-Complexity Hardware Decoders for Low-Rate Polar Codes --
3 Low-Latency Software Polar Decoders --
4 Unrolled Hardware Architectures for Polar Decoders --
5 Multi-mode Unrolled Polar Decoding --
6 Conclusion and Future Work --
References --
Index.
Рубрики: Coding theory.
   Information theory.

   Electrical engineering.

   Electronic circuits.

   Signal processing.

   Image processing.

   Speech processing systems.

   Coding and Information Theory.

   Communications Engineering, Networks.

   Circuits and Systems.

   Signal, Image and Speech Processing.

Анотація: A new class of provably capacity achieving error-correction codes, polar codes are suitable for many problems, such as lossless and lossy source coding, problems with side information, multiple access channel, etc. The first comprehensive book on the implementation of decoders for polar codes, the authors take a tutorial approach to explain the practical decoder implementation challenges and trade-offs in either software or hardware. They also demonstrate new trade-offs in latency, throughput, and complexity in software implementations for high-performance computing and GPGPUs, and hardware implementations using custom processing elements, full-custom application-specific integrated circuits (ASICs), and field-programmable-gate arrays (FPGAs). Presenting a good overview of this research area and future directions, High-Speed Decoders for Polar Codes is perfect for any researcher or SDR practitioner looking into implementing efficient decoders for polar codes, as well as students and professors in a modern error correction class. As polar codes have been accepted to protect the control channel in the next-generation mobile communication standard (5G) developed by the 3GPP, the audience includes engineers who will have to implement decoders for such codes and hardware engineers designing the backbone of communication networks.

Перейти: https://doi.org/10.1007/978-3-319-59782-9

Дод.точки доступу:
Thibeault, Claude.; Gross, Warren J.; Giard, Pascal. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

4.


   
    Understanding Information [[electronic resource] :] : from the Big Bang to Big Data / / ed. Schuster, Alfons Josef. - 1st ed. 2017. - [S. l. : s. n.]. - XVIII, 237 p. 27 illus. - Б. ц.
    Зміст:
Part I Introduction --
From the Tannh?auser Gate to z8 GND 5296: A day trip on the life-cycle of information --
Part II The World of Large and Small Systems --
Expanding Beyond the Solar System: Current Observation and Theory --
Information in Quantum Theory --
Part III The World of Living Things --
The Potential of Plants and Seeds in DNA-based Information Storage --
Memory Processing in the Nervous System --
From Computing Machines to Learning Intelligent Machines:Chronological Development of Alan Turing’s Thought on Machines --
Finite Information Agency --
Part V The World of Networks, Clouds, and Big Data Processing --
Distributed and Connected Information in the Internet --
Custom Hardware Versus Cloud Computing in Big Data --
Part VI The World of Society and Philosophy --
Information Overload in a Data-intensive World --
Causal/Informational Theories of Mental Content --
Index.
Рубрики: Application software.
   Computers and civilization.

   Coding theory.

   Information theory.

   Information Systems Applications (incl. Internet).

   Computers and Society.

   Coding and Information Theory.

Анотація: The motivation of this edited book is to generate an understanding about information, related concepts and the roles they play in the modern, technology permeated world. In order to achieve our goal, we observe how information is understood in domains, such as cosmology, physics, biology, neuroscience, computer science, artificial intelligence, the Internet, big data, information society, or philosophy. Together, these observations form an integrated view so that readers can better understand this exciting building-block of modern-day society. On the surface, information is a relatively straightforward and intuitive concept. Underneath, however, information is a relatively versatile and mysterious entity. For instance, the way a physicist looks at information is not necessarily the same way as that of a biologist, a neuroscientist, a computer scientist, or a philosopher. Actually, when it comes to information, it is common that each field has its domain specific views, motivations, interpretations, definitions, methods, technologies, and challenges. With contributions by authors from a wide range of backgrounds, Understanding Information: From the Big Bang to Big Data will appeal to readers interested in the impact of ‘information’ on modern- day life from a variety of perspectives.

Перейти: https://doi.org/10.1007/978-3-319-59090-5

Дод.точки доступу:
Schuster, Alfons Josef. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

5.


   
    Wireless and Satellite Systems [[electronic resource] :] : 8th International Conference, WiSATS 2016, Cardiff, UK, September 19-20, 2016, Proceedings / / ed. Otung, Ifiok. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 236 p. 132 illus. - Б. ц.
    Зміст:
A Compact CSRR Loaded Monopole Antenna with Defected Ground Structure for Mobile WLAN and WiMAX Applications --
Development Status of Small-sized Ka-band Mobile Terminal for Maritime Broadband Communications --
New and Less Complex Approach to Estimate the Angles of Arrival --
MIMO Based Multi Band Antenna for Wireless Communication in C-band, X-Band, K-Band and Ku Band --
A Staircase-shaped DGS Structure Monopole Antenna for UWB Operations --
Implementation of a Low-Rate Linear Step FM Transceiver on a Software Defined Radio Platform --
High Reliability Light Weight Multi-Mission Amplifier System --
Examination of power consumption reduction and sampling behavior of envelope detection based wake-up-receiver with duty cycling scheme --
Bit Synchronization and Delayed Decision Feedback Equalization for EDGE BTS - Hardware Implementation on TMS320C6424 TI DSP --
Precoding of Correlated Symbols for STBC Systems Design --
Communication Applications in Smart Grid (CASG) Special Session --
Optimization of Community Based Virtual Power Plant with Embedded Storage and Renewable Generation --
Assessment of effective radiated power of the partial discharge emulator source Wireless, Computing and Satellite Systems Security (WCSSS) Special Session --
Experimental Privacy Analysis and Characterization for Disconnected VANETs --
A Mobility-Aware Trust Management Scheme for Emergency Communication Networks --
Effective Doppler Mitigation in Critical Satellite Communications --
Interference Mitigation for Multi Spot Beam Satellite Communication Systems Incorporating Spread Spectrum --
Specific Rain Attenuation derived from a Gaussian Mixture Model for Rainfall Drop Size Distribution --
Cognitive Interference Management Techniques for the Spectral Co-existence of GSO and NGSO Satellites --
A 15.5W Si-LDMOS Balanced Power Amplifier With 53% Ultimate PAE for High Speed LTE --
Energy Efficient Adaptive Network Coding Schemes for Satellite Communications --
Distribution of HDTV using VLC Techniques for Domestic Applications --
On the Energy Minimization of Heterogeneous Cloud Radio access Networks. .
Рубрики: Computer communication systems.
   Application software.

   Coding theory.

   Information theory.

   Computer Communication Networks.

   Information Systems Applications (incl. Internet).

   Coding and Information Theory.

Анотація: This book constitutes the proceedings of the 8th International Conference on Wireless and Satellite Services, WiSATS 2016, held in Cardiff, UK, in September 2016. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. As the scope of the conference widened to include wireless systems, the conference was renamed WiSATS. The 22 revised papers were selected from 32 submissions and cover a broad range of related state-of-the-art topics in antennas and mobile terminals, symbol precoding and network coding schemes, energy efficient strategies in satellite communication and cloud radio access networks, smart grid communication and optimization, security issues in vehicular ad-hoc networks (VANET) and delay tolerant net-works (DTN), interference mitigation in high throughput geostationary and non-geostationary satellite systems.

Перейти: https://doi.org/10.1007/978-3-319-53850-1

Дод.точки доступу:
Otung, Ifiok. \ed.\; Pillai, Prashant. \ed.\; Eleftherakis, George. \ed.\; Giambene, Giovanni. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

6.


    Watson, Des.
    A Practical Approach to Compiler Construction [[electronic resource] /] : монография / Des. Watson ; . - 1st ed. 2017. - [S. l. : s. n.]. - XV, 254 p. 26 illus. - Б. ц.
    Зміст:
Preface --
List of Figures --
Introduction --
Compilers and Interpreters --
Lexical Analysis --
Approaches to Syntax Analysis --
Practicalities of Syntax Analysis --
Semantic Analysis and Intermediate Code --
Optimisation --
Code Generation --
Implementation Issues --
Appendix: The DL Language --
Index .
Рубрики: Programming languages (Electronic computers).
   Coding theory.

   Information theory.

   Programming Languages, Compilers, Interpreters.

   Coding and Information Theory.

Анотація: This book provides a practically-oriented introduction to high-level programming language implementation. It demystifies what goes on within a compiler and stimulates the reader's interest in compiler design, an essential subject of computer science. Programming language analysis and translation techniques are used in many software application areas. A Practical Approach to Compiler Construction covers the fundamental principles of the subject in an accessible way. It presents the necessary background theory and shows how how it can be applied to implement complete compilers. A step-by-step approach, based on a standard compiler structure is adopted, presenting up-to-date techniques and examples. Strategies and designs are described in detail to guide the reader in implementing a translator for a programming language. A simple high-level language, loosely based on C, is used to illustrate aspects of the compilation process. Code examples in C are included, together with discussion and illustration of how this code can be extended to cover the compilation of more complex languages. Examples are also given of the use of the flex and bison compiler construction tools. Lexical and syntax analysis is covered in detail together with a comprehensive coverage of semantic analysis, intermediate representations, optimisation and code generation. Introductory material on parallelisation is also included. Designed for personal study as well as for use in introductory undergraduate and postgraduate courses in compiler design, the author assumes that readers have a reasonable competence in programming in any high-level language. .

Перейти: https://doi.org/10.1007/978-3-319-52789-5

Дод.точки доступу:
Watson, Des. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

7.


   
    Artificial General Intelligence [[electronic resource] :] : 10th International Conference, AGI 2017, Melbourne, VIC, Australia, August 15-18, 2017, Proceedings / / ed.: Everitt, Tom., Goertzel, Ben., Potapov, Alexey. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 275 p. 38 illus. - Б. ц.
    Зміст:
Architectures --
Mathematical foundations --
Algorithms --
Safety --
Understanding --
Human cognition --
Philosophy.
Рубрики: Artificial intelligence.
   Application software.

   Mathematical logic.

   Special purpose computers.

   Coding theory.

   Information theory.

   Artificial Intelligence.

   Computer Appl. in Administrative Data Processing.

   Mathematical Logic and Formal Languages.

   Special Purpose and Application-Based Systems.

   Coding and Information Theory.

Анотація: This book constitutes the proceedings of the 10th International Conference on Artificial General Intelligence, AGI 2017, held in Melbourne, VIC, Australia, in August 2017. The 24 regular papers presented in this book together with 1 short paper were carefully reviewed and selected from 35 submissions. They cover topics such as architectures; mathematical foundations; algorithms; safety; understanding; human cognition; and philosophy.

Перейти: https://doi.org/10.1007/978-3-319-63703-7

Дод.точки доступу:
Everitt, Tom. \ed.\; Goertzel, Ben. \ed.\; Potapov, Alexey. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

8.


   
    Digital Forensics and Watermarking [[electronic resource] :] : 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings / / ed. Kraetzer, Christian. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 422 p. 174 illus. - Б. ц.
    Зміст:
Digital watermarking --
Steganography and steganalysis --
Forensics and anti-forensics --
Visual cryptography,- Other multimedia-related security issues. Biometric image tampering detection --
Emerging threats of criminal use of information hiding --
Usage, scenarios and detection approaches.
Рубрики: Data encryption (Computer science).
   Computer security.

   Algorithms.

   Optical data processing.

   Computers and civilization.

   Coding theory.

   Information theory.

   Cryptology.

   Systems and Data Security.

   Algorithm Analysis and Problem Complexity.

   Image Processing and Computer Vision.

   Computers and Society.

   Coding and Information Theory.

Анотація: This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches.

Перейти: https://doi.org/10.1007/978-3-319-64185-0

Дод.точки доступу:
Kraetzer, Christian. \ed.\; Shi, Yun-Qing. \ed.\; Dittmann, Jana. \ed.\; Kim, Hyoung Joong. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

9.


   
    Digital Nations – Smart Cities, Innovation, and Sustainability [[electronic resource] :] : 16th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2017, Delhi, India, November 21–23, 2017, Proceedings / / ed. Kar, Arpan Kumar. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XX, 526 p. 120 illus. - Б. ц.
    Зміст:
Adoption of Smart Services --
Assessment of ICT Enabled Smart Initiatives --
Analytics for Smart Governance --
Social Media and Web 3.0 for Smartness --
Smart Solutions for the Future.
Рубрики: E-commerce.
   Computer security.

   Application software.

   Coding theory.

   Information theory.

   e-Commerce/e-business.

   Systems and Data Security.

   Information Systems Applications (incl. Internet).

   Computer Appl. in Social and Behavioral Sciences.

   Coding and Information Theory.

Анотація: This book constitutes the refereed conference proceedings of the 16th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2017, held in Delhi, India, in November 2017. The 45 revised full papers presented were carefully reviewed and selected from 92 submissions. They are organized in the following topical sections: Adoption of Smart Services; Assessment of ICT Enabled Smart Initiatives; Analytics for Smart Governance; Social Media and Web 3.0 for Smartness; and Smart Solutions for the Future.

Перейти: https://doi.org/10.1007/978-3-319-68557-1

Дод.точки доступу:
Kar, Arpan Kumar. \ed.\; Ilavarasan, P. Vigneswara. \ed.\; Gupta, M.P. \ed.\; Dwivedi, Yogesh K. \ed.\; Mantymaki, Matti. \ed.\; Janssen, Marijn. \ed.\; Simintiras, Antonis. \ed.\; Al-Sharhan, Salah. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

10.


   
    Foundations and Practice of Security [[electronic resource] :] : 9th International Symposium, FPS 2016, Quebec City, QC, Canada, October 24-25, 2016, Revised Selected Papers / / ed. Cuppens, Frederic. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 361 p. 83 illus. - Б. ц.
    Зміст:
Malware and Anomaly Detection --
Intrusion Response --
Vulnerability Analysis and Security Metrics --
Privacy and Verification --
Crypto and Communication Security --
Malware and Antivirus --
Web, Cloud, and Delegation --
Physical Security.
Рубрики: Data encryption (Computer science).
   Data protection.

   Coding theory.

   Information theory.

   Computer communication systems.

   Biometrics (Biology).

   Algorithms.

   Cryptology.

   Security.

   Coding and Information Theory.

   Computer Communication Networks.

   Biometrics.

   Algorithm Analysis and Problem Complexity.

Анотація: This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in October 2016. The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected from 34 submissions. The accepted papers cover diverse research themes, ranging from classic topics, such as malware, anomaly detection, and privacy, to emerging issues, such as security and privacy in mobile computing and cloud.

Перейти: https://doi.org/10.1007/978-3-319-51966-1

Дод.точки доступу:
Cuppens, Frederic. \ed.\; Wang, Lingyu. \ed.\; Cuppens-Boulahia, Nora. \ed.\; Tawbi, Nadia. \ed.\; Garcia-Alfaro, Joaquin. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

11.


   
    Codes, Cryptology and Information Security [[electronic resource] :] : second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carlet / / ed.: El Hajji, Said., Nitaj, Abderrahmane., Souidi, El Mamoun. - 1st ed. 2017. - [S. l. : s. n.]. - XII, 384 p. 46 illus. - Б. ц.
Рубрики: Computer security.
   Data encryption (Computer science).

   Coding theory.

   Information theory.

   Computer communication systems.

   Numerical analysis.

   Systems and Data Security.

   Cryptology.

   Coding and Information Theory.

   Computer Communication Networks.

   Numeric Computing.

Анотація: This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017. The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 72 submissions. The first aim of this conference is to pay homage to Claude Carlet for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography worldwide, especially in Africa. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.

Перейти: https://doi.org/10.1007/978-3-319-55589-8

Дод.точки доступу:
El Hajji, Said. \ed.\; Nitaj, Abderrahmane. \ed.\; Souidi, El Mamoun. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

12.


   
    Machine Learning and Knowledge Extraction [[electronic resource] :] : first IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio, Italy, August 29 – September 1, 2017, Proceedings / / ed. Holzinger, Andreas. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XV, 376 p. 129 illus. - Б. ц.
Рубрики: Application software.
   Artificial intelligence.

   Coding theory.

   Information theory.

   Computer communication systems.

   Computer security.

   Computers and civilization.

   Information Systems Applications (incl. Internet).

   Artificial Intelligence.

   Coding and Information Theory.

   Computer Communication Networks.

   Systems and Data Security.

   Computers and Society.

Анотація: This book constitutes the refereed proceedings of the IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference for Machine Learning and Knowledge Extraction, CD-MAKE 2017, held in Reggio, Italy, in August/September 2017. The 24 revised full papers presented were carefully reviewed and selected for inclusion in this volume. The papers deal with fundamental questions and theoretical aspects and cover a wide range of topics in the field of machine learning and knowledge extraction. They are organized in the following topical sections: MAKE topology; MAKE smart factory; MAKE privacy; MAKE VIS; MAKE AAL; and MAKE semantics.

Перейти: https://doi.org/10.1007/978-3-319-66808-6

Дод.точки доступу:
Holzinger, Andreas. \ed.\; Kieseberg, Peter. \ed.\; Tjoa, A Min. \ed.\; Weippl, Edgar. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

13.


   
    Progress in Cryptology - AFRICACRYPT 2017 [[electronic resource] :] : 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings / / ed.: Joye, Marc., Nitaj, Abderrahmane. - 1st ed. 2017. - [S. l. : s. n.]. - X, 231 p. 42 illus. - Б. ц.
Рубрики: Computer security.
   Data encryption (Computer science).

   Coding theory.

   Information theory.

   Numerical analysis.

   Computers.

   Management information systems.

   Computer science.

   Systems and Data Security.

   Cryptology.

   Coding and Information Theory.

   Numeric Computing.

   Computation by Abstract Devices.

   Management of Computing and Information Systems.

Анотація: This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017. The 13 papers presented in this book were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on cryptographic schemes, side-channel analysis, differential cryptanalysis, applications, and number theory.

Перейти: https://doi.org/10.1007/978-3-319-57339-7

Дод.точки доступу:
Joye, Marc. \ed.\; Nitaj, Abderrahmane. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

14.


   
    Advances in Cryptology – ASIACRYPT 2017 [[electronic resource] :] : 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II / / ed.: Takagi, Tsuyoshi., Peyrin, Thomas. - 1st ed. 2017. - [S. l. : s. n.]. - XIX, 701 p. 98 illus. - Б. ц.
    Зміст:
Pairing-based Protocols --
Quantum Algorithms --
Elliptic Curves --
Block Chains --
Multi-Party Protocols.-Operating Modes Security Proofs.
Рубрики: Data encryption (Computer science).
   Computer security.

   Coding theory.

   Information theory.

   Management information systems.

   Computer science.

   Computers.

   Computer science—Mathematics.

   Cryptology.

   Systems and Data Security.

   Coding and Information Theory.

   Management of Computing and Information Systems.

   Theory of Computation.

   Mathematics of Computing.

Анотація: The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017. The 65 revised full papers  were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Перейти: https://doi.org/10.1007/978-3-319-70697-9

Дод.точки доступу:
Takagi, Tsuyoshi. \ed.\; Peyrin, Thomas. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

15.


   
    Advances in Cryptology – ASIACRYPT 2017 [[electronic resource] :] : 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III / / ed.: Takagi, Tsuyoshi., Peyrin, Thomas. - 1st ed. 2017. - [S. l. : s. n.]. - XVIII, 473 p. 57 illus. - Б. ц.
    Зміст:
Cryptographic Protocols --
Foundations --
Zero-Knowledge Proofs --
Symmetric Key Designs.
Рубрики: Data encryption (Computer science).
   Computer security.

   Coding theory.

   Information theory.

   Management information systems.

   Computer science.

   Computers.

   Computer science—Mathematics.

   Cryptology.

   Systems and Data Security.

   Coding and Information Theory.

   Management of Computing and Information Systems.

   Theory of Computation.

   Mathematics of Computing.

Анотація: The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017. The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Перейти: https://doi.org/10.1007/978-3-319-70700-6

Дод.точки доступу:
Takagi, Tsuyoshi. \ed.\; Peyrin, Thomas. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

16.


   
    Security, Privacy, and Applied Cryptography Engineering [[electronic resource] :] : 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings / / ed.: Ali, Sk Subidh., Danger, Jean-Luc., Eisenbarth, Thomas. - 1st ed. 2017. - [S. l. : s. n.]. - XXIV, 295 p. 55 illus. - Б. ц.
    Зміст:
On the (in)Security of ChaCha20 Against Physical Attacks --
An Industrial Outlook on Challenges of Hardware Security in Digital Economy --
How to Digitally Construct and Validate TRNG and PUF Primitives Which Are Based on Physical Phenomenon --
Cache Attacks: From Cloud to Mobile --
May the Fourth Be with You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 --
The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions --
Parameter Choices for LWE --
Efficient Side Channel Testing of Cryptographic Devices Using TVLA --
IoT Insecurity - Innovation and Incentives in Industry --
Hardware enabled cryptography: Physically Unclonable Functions and Random Numbers as Roots of Trust --
Tackling the Time-Defence: An Instruction Count Based Microarchitectural Side-channel Attack on Block Ciphers --
Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era --
Efficient Software Implementation of Laddering Algorithms over Binary Elliptic Curves --
Analysis of Diagonal Constants in Salsa --
Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults --
eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices --
Similarity Based Interactive Private Information Retrieval --
A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA) --
Variable-Length Bit Mapping and Error Correcting Codes for Higher-Order Alphabet PUFs --
Mutual Friend Attack Prevention in Social Network Data Publishing --
Short Integrated PKE+PEKS in Standard Model --
Differential Fault Attack on Grain v1, ACORN v3 and Lizard --
Certain observations on ACORN v3 and the Implications to TMDTO Attacks --
Efficient Implementation of Private License Plate Matching Protocols. .
Рубрики: Data protection.
   Computer security.

   Data encryption (Computer science).

   Coding theory.

   Information theory.

   Computer communication systems.

   Security.

   Systems and Data Security.

   Cryptology.

   Coding and Information Theory.

   Computer Communication Networks.

Анотація: This book constitutes the refereed proceedings of the 7th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2017, held in Goa, India, in December 2017. The 13 revised full papers presented together with 1 short paper, 7 invited talks, and 4 tutorials were carefully reviewed and selected from 49 initial submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Перейти: https://doi.org/10.1007/978-3-319-71501-8

Дод.точки доступу:
Ali, Sk Subidh. \ed.\; Danger, Jean-Luc. \ed.\; Eisenbarth, Thomas. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

17.


   
    Public-Key Cryptography – PKC 2017 [[electronic resource] :] : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II / / ed. Fehr, Serge. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 556 p. 81 illus. - Б. ц.
    Зміст:
Cryptanalysis, Protocols --
Encryption Schemes --
Leakage-Resilient and Non-Malleable Codes --
Number Theory and Die-Hellman --
Encryption with Access Control --
Special Signatures --
Fully Homomorphic Encryption --
Real-World Schemes --
Multiparty Computation --
Primitives.
Рубрики: Data encryption (Computer science).
   Computer security.

   Coding theory.

   Information theory.

   Computer communication systems.

   Algorithms.

   Management information systems.

   Computer science.

   Cryptology.

   Systems and Data Security.

   Coding and Information Theory.

   Computer Communication Networks.

   Algorithm Analysis and Problem Complexity.

   Management of Computing and Information Systems.

Анотація: The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

Перейти: https://doi.org/10.1007/978-3-662-54388-7

Дод.точки доступу:
Fehr, Serge. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

18.


   
    Lightweight Cryptography for Security and Privacy [[electronic resource] :] : 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers / / ed. Bogdanov, Andrey. - 1st ed. 2017. - [S. l. : s. n.]. - VII, 149 p. 34 illus. - Б. ц.
    Зміст:
Cryptanalysis --
Lightweight designs --
Implementation challenges.
Рубрики: Data encryption (Computer science).
   Computer security.

   Coding theory.

   Information theory.

   Computer memory systems.

   Artificial intelligence.

   Cryptology.

   Systems and Data Security.

   Coding and Information Theory.

   Memory Structures.

   Artificial Intelligence.

Анотація: This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016. The 9 full papers presented were carefully reviewed and selected from 18 submissions. The papers are organized in the following topical sections: cryptanalysis, lightweight designs, implementation challenges.

Перейти: https://doi.org/10.1007/978-3-319-55714-4

Дод.точки доступу:
Bogdanov, Andrey. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

19.


   
    Coding Theory and Applications [[electronic resource] :] : 5th International Castle Meeting, ICMCTA 2017, Vihula, Estonia, August 28-31, 2017, Proceedings / / ed.: Barbero, Angela I., Skachek, Vitaly., Ytrehus, Oyvind. - 1st ed. 2017. - [S. l. : s. n.]. - X, 297 p. 29 illus. - Б. ц.
Рубрики: Coding theory.
   Information theory.

   Computer science—Mathematics.

   Mathematical statistics.

   Numerical analysis.

   Computer communication systems.

   Software engineering.

   Coding and Information Theory.

   Symbolic and Algebraic Manipulation.

   Probability and Statistics in Computer Science.

   Numeric Computing.

   Computer Communication Networks.

   Software Engineering.

Анотація: This book constitutes the refereed proceedings of the 5th International Castle Meeting on Coding Theory and Applications, ICMCTA 2017, held in Vihula, Estonia, in August 2017. The 24 full papers presented were carefully reviewed and selected for inclusion in this volume. The papers cover relevant research areas in modern coding theory, including codes and combinatorial structures, algebraic geometric codes, group codes, convolutional codes, network coding, other applications to communications, and applications of coding theory in cryptography.  .

Перейти: https://doi.org/10.1007/978-3-319-66278-7

Дод.точки доступу:
Barbero, Angela I. \ed.\; Skachek, Vitaly. \ed.\; Ytrehus, Oyvind. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

20.


   
    Economics of Grids, Clouds, Systems, and Services [[electronic resource] :] : 14th International Conference, GECON 2017, Biarritz, France, September 19-21, 2017, Proceedings / / ed.: Pham, Congduc., Altmann, Jorn., Banares, Jose Angel. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 302 p. 85 illus. - Б. ц.
    Зміст:
Pricing in Cloud and Quality of Service --
Work in Progress on Service Management --
Work in Progress on Business Models and Community Cooperation --
Work in Progress on Energy Efficiency and Resource Management --
Edge Computing.
Рубрики: Computer communication systems.
   Computer system failures.

   Application software.

   E-commerce.

   Coding theory.

   Information theory.

   Programming languages (Electronic computers).

   Computer Communication Networks.

   System Performance and Evaluation.

   Information Systems Applications (incl. Internet).

   e-Commerce/e-business.

   Coding and Information Theory.

   Programming Languages, Compilers, Interpreters.

Анотація: This book constitutes the refereed proceedings of the 14th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2017, held in Biarritz, France, in September 2017. The 10 full papers and 10 short papers presented together with 3 invited talks were carefully reviewed and selected from 38 submissions. This volume of the GECON 2017 proceedings has been structured in sections following the sessions that comprised the conference program: Pricing in Cloud and Quality of Service, Work in Progress on Service Management, Work in Progress on Business models and Community Cooperation, Work in Progress on Energy Efficiency and Resource Management, Resource Management, Edge Computing, Cloud Federation; and Work in Progress on Service Selection and Coordination.

Перейти: https://doi.org/10.1007/978-3-319-68066-8

Дод.точки доступу:
Pham, Congduc. \ed.\; Altmann, Jorn. \ed.\; Banares, Jose Angel. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

 1-20    21-40   41-42 
 
© Міжнародна Асоціація користувачів і розробників електронних бібліотек і нових інформаційних технологій
(Асоціація ЕБНІТ)