1 - 20
Next
- Cham, Switzerland : Springer, [2017]
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Introduction.- Lattices and Applications.- Lattices from Codes.- Ideal Lattices.- Lattices and Spherical Codes.- Lattice and Index Coding.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
2. Cyber denial, deception and counter deception : a framework for supporting active cyber defense [2015]
- Heckman, Kristin E., author.
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (xv, 251 pages) : illustrations Digital: text file; PDF.
- Summary
-
- Introduction.- Bridging the Classical D&D and Cyber Security Domains.- Intrusions, Deceptions, and Campaigns.- Cyber D&D Case Studies.- Exercising Cyber-D&D.- Considerations, Adaptation, and Sharing.- Countering Denial & Deception.- Capability Maturity Model.- Cyber-D&D Lifecycle Management.- Looking to the future.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- CARDIS (Conference) (16th : 2017 : Lugano, Switzerland)
- Cham, Switzerland : Springer, 2018.
- Description
- Book — 1 online resource (xvi, 249 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices.- Optimal First-Order Boolean Masking for Embedded IoT Devices.- A first-order chosen plaintext DPA attack on the third round of DES.- A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks.- A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.- Leakage Bounds for Gaussian Side Channels.- Towards Sound and Optimal Leakage Detection Procedure.- Connecting and Improving Direct Sum Masking and Inner Product Masking.- May The Force Be With You: Force-Based Relay Attack Detection.- Instruction Duplication: Leaky and Not Too Fault-Tolerant!.- An EM Fault Injection Susceptibility Criterion and its application to the localization of hotspots.- Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers.- Horizontal clustering side-channel attacks on embedded ECC implementations.- Trace Augmentation: What Can Be Done Even Before Preprocessing in a Pro led SCA?
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Codage universel et identification d'ordre par sélection de modèles. English
- Gassiat, Élisabeth, author.
- Cham, Switzerland : Springer, 2018.
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- 1. Lossless Coding
- 2. Universal Coding on Finite Alphabets
- 3. Universal Coding on Infinite Alphabets
- 4. Model Order Estimation
- Notation
- Index.
- Firer, Marcelo, author.
- Cham, Switzerland : Springer, [2018]
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Chapter 01- Introduction.-
- Chapter 02- Basic concepts of coding theory.-
- Chapter 03- Poset metrics.-
- Chapter 04- Hierarquical posets.-
- Chapter 05- Disjoint chains with equal length.-
- Chapter 06- The general case: Coding invariants.-
- Chapter 07- Duality.-
- Chapter 08- Generalizations.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Donaldson, Scott E., author.
- New York, NY : Apress, [2018]
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Preface.- Introduction.- Part I: The Cybersecurity Challenge.-
- Chapter 1: Defining the Cybersecurity Challenge.-
- Chapter 2: Meeting the Cybersecurity Challenge.-
- Part II: A New Enterprise Cybersecurity Architecture.-
- Chapter 3: Enterprise Cybersecurity Architecture.-
- Chapter 4: Implementing Enterprise Cybersecurity.-
- Chapter 5: Operating Enterprise Cybersecurity.-
- Chapter 6: Enterprise Cybersecurity and the Cloud.-
- Chapter 7: Enterprise Cybersecurity for Mobile and BYOD.-
- Part III: The Art of Cyber Defense.-
- Chapter 8: Building an Effective Defense.-
- Chapter 9: Responding to Incidents.-
- Chapter 10: Managing a Cybersecurity Crisis.-
- Part IV: Enterprise Cyber Defense Assessment.-
- Chapter 11: Assessing Enterprise Cybersecurity.-
- Chapter 12: Measuring a Cybersecurity Program.-
- Chapter 13: Mapping Against Cybersecurity Frameworks.-
- Part V: Enterprise Cybersecurity Program.-
- Chapter 14: Managing an Enterprise Cybersecurity Program.-
- Chapter 15: Looking to the Future.-
- Part VI: Appendices.-
- Appendix A: Sample Cybersecurity Policy.-
- Appendix B: Cybersecurity Operational Processes.-
- Appendix C: Object Measurement.-
- Appendix D: Cybersecurity Sample Assessment.-
- Appendix E: Cybersecurity Capability Value Scales.-.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Mehboob Ahmed Khan, Ovais.
- Birmingham : Packt Publishing Ltd, 2019.
- Description
- Book — 1 online resource (589 pages)
- Summary
-
- Table of Contents What's New in .NET Core 2 and C# 7? Understanding .NET Core Internals and Measuring Performance Multithreading and Asynchronous Programming in .NET Core Securing and Implementing Resilience in .NET Core Applications Why TDD is Important Setting Up the .NET Test Environment Setting Up a JavaScript Environment What to Know Before Getting Started Tabula Rasa Testing JavaScript Applications Exploring Integrations Changes in Requirements The Legacy Problem Unraveling a Mess Geometry Randomization Files and Directories Advanced C# and .NET Features Cryptography.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- IMA International Conference (16th : 2017 : Oxford, England)
- Cham, Switzerland : Springer, 2017.
- Description
- Book — 1 online resource (x, 393 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Authentication.- Cryptography.- Multi-party computation.- Cryptanalysis.- Coding Theory.- Digital Signatures.- Homomorphic Encryption.- Homomorphic Signatures.- Post-quantum cryptography.- Lattie-based cryptography.- Order Revealing Encryption.- Bilinear maps.- Multi-linear maps.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- INFOSCALE (Conference) (5th : 2014 : Seoul, South Korea)
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (ix, 107 pages) : illustrations
- Summary
-
- Scalable Similarity Search for Big Data
- Challenges and Research Objectives
- Content-based analytics of Diffusion on Social Big Data: a Case Study on Korean Telecommunication Companies
- Multi-modal Similarity Retrieval with a Shared Distributed Data Store
- An Efficient Approach for Complex Data Summarization
- A Novel Approach for Network Traffic Summarization
- Heart Disease Diagnosis Using Co-Clustering
- An Investigation of Scalable Anomaly Detection Techniques for a Large Network of Wi-Fi Hotspots
- Link Scheduling for Data Collection in Multichannel Wireless Sensor Networks A Design of Sensor Data Ontology for a Large Scale Crop Growth Environment System
- Real-Time Data Flow Language Processing System for Handling Streams of Data.
- Theory of Cryptography Conference (15th : 2017 : Baltimore, Md.)
- Cham, Switzerland : Springer, 2017.
- Description
- Book — 1 online resource (xvii, 778 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Impossibilities and Barriers.- Obfuscation.- Functional Encryption.- Constrained PRFs.- Encryption.- Moderately Hard Functions.- Blockchains.- Multiparty Computation.- Garbled Circuits and Oblivious RAM.- Zero-Knowledge and Non-Malleability.- Leakage and Tampering.- Delegation.- Non-Malleable Codes.- Secret Sharing.- OT Combiners.- Signatures.- Verifiable Random Functions.- Fully Homomorphic Encryption.- Database Privacy.- Assumptions.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Svensson, Robert, author.
- [United States] : Apress, 2016. New York, NY : Distributed to the Book trade worldwide by Springer
- Description
- Book — 1 online resource (xxii, 190 pages) : illustrations (some color) Digital: text file.PDF.
- Summary
-
- Chapter 1: Introduction.-
- Chapter 2: Security Testing Basics.-
- Chapter 3: The Security Testing Process.-
- Chapter 4: Technical Preparations.-
- Chapter 5: Security Test Execution.-
- Chapter 6: Identifying Vulnerabilities.-
- Chapter 7: Exploiting Vulnerabilities.-
- Chapter 8: Reporting Vulnerabilities.-
- Chapter 9: Example Reports.-
- Chapter 10: 10 Tips to Become a Better Security Tester.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Hill, Brenn.
- Birmingham : Packt Publishing Ltd, 2018.
- Description
- Book — 1 online resource (546 pages)
- Summary
-
- Table of Contents Blockchain 101 Components and Structure of Blockchain Decentralization Versus Distributed Systems Cryptography and Mechanics Behind Blockchain Bitcoin Altcoins Achieving Consensus Advanced Blockchain Concepts Cryptocurrency Wallets Alternate Blockchains Hyperledger and Enterprise Blockchains Ethereum 101 Solidity 101 Smart Contracts Ethereum Accounts and Ether Tokens Decentralized Applications Mining ICO 101 Creating Your Own Currency Scalability and Other Challenges Future of Blockchain Understanding Decentralized Applications Understanding How Ethereum Works Writing Smart Contracts Getting Started with web3.js Building a Wallet Service Building a Smart Contract Deployment Platform Building a Betting App Building Enterprise Level Smart Contracts Building a Consortium Blockchain.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Mukhopadhyay, Mayukh.
- Birmingham : Packt Publishing, 2018.
- Description
- Book — 1 online resource (278 pages)
- Summary
-
- Table of Contents Blockchain Basics Grokking Ethereum Hello World" of Ethereum Smart Contract Noob's Guide for DApps and DAOs Deep-diving to Smart Contracts Solidity in Depth Primer on Web3.js Developing a crypto currency from Scratch Enterprise Use-Cases Blockchain-as-a-Service and Dark Web Marketplace Appendix: Advanced Topics and the road ahead.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Reznikova, Zh. I. (Zhanna Ilʹinichna), author.
- Cham, Switzerland : Springer, [2017]
- Description
- Book — 1 online resource
- Summary
-
- Communication, speech and language in human- and non-human animals. The complexity of communication systems and intelligence in animals.- Intelligent communication: can animals exchange meaningful messages?.- Cracking animals codes.- Direct dialogs with animals by means of intermediary languages.- Ants and Bits.- Why bits? Information Theory as a tool for studying natural communication systems.- Why ants? Reliable agents for information transmission.- Ants on the Binary Tree.- The entropy - based approach.- The Kolmogorov Complexity-based approach.- Ants can compress information.- Numerical competence in animals with an insight from ant "language".- Criteria of numerical competence for comparative studies.- Quantitative judgments in animals.- Advanced numerical abilities.- Information Theory as a tool for studying wild arithmetic on the base of their own communications.- An insight from ant "language": flexibility of communication as a basis for arithmetic skills.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- CARDIS (Conference) (13th : 2014 : Paris, France)
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (x, 261 pages) : illustrations
- Summary
-
- Java cards
- Software countermeasures
- Side-channel analysis
- Embedded implementations
- Public-key cryptography
- Leakage and fault attacks.
- International Workshop on Security Protocols (24th : 2016 : Brno, Czech Republic)
- Cham : Springer, 2017.
- Description
- Book — 1 online resource (x, 233 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Evolving Security.- Considering that security protocols evolve.- Changing requirements.- Changing mechanisms.- Attackers' changing agendas and capabilities.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- ICISC (Conference) (20th : 2017 : Seoul, Korea)
- Cham, Switzerland : Springer, 2018.
- Description
- Book — 1 online resource (xiii, 369 pages) : illustrations Digital: text file.PDF.
- Summary
-
- SYMMETRIC KEY ENCRYPTION.- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices.- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik.- Security of Stateful Order-Preserving Encryption.- HOMOMORPHIC ENCRYPTION.- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption.- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings.- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme.- SIDE CHANNEL ANALYSIS AND IMPLEMENTATION.- Novel Leakage against Realistic Masking and Shuffling Countermeasures - case study on PRINCE and SEED.- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers.- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.- BROADCAST ENCRYPTION.- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles.- Recipient Revocable Broadcast Encryption with Dealership.- ELLIPTIC CURVE.- Solving 114-bit ECDLP for a Barreto-Naehrig Curve.- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus.- SIGNATURE AND PROTOCOL.- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems.- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices.- Security Analysis of Improved Cubic UOV Signature Schemes.- NETWORK AND SYSTEM SECURITY.- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments.- Reading Network Packets as a Natural Language for Intrusion Detection.- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- SPACE (Conference : Applied cryptography engineering) (7th : 2017 : Goa, India)
- Cham : Springer, 2017.
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- On the (in)Security of ChaCha20 Against Physical Attacks.- An Industrial Outlook on Challenges of Hardware Security in Digital Economy.- How to Digitally Construct and Validate TRNG and PUF Primitives Which Are Based on Physical Phenomenon.- Cache Attacks: From Cloud to Mobile.- May the Fourth Be with You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.- The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions.- Parameter Choices for LWE.- Efficient Side Channel Testing of Cryptographic Devices Using TVLA.- IoT Insecurity - Innovation and Incentives in Industry.- Hardware enabled cryptography: Physically Unclonable Functions and Random Numbers as Roots of Trust.- Tackling the Time-Defence: An Instruction Count Based Microarchitectural Side-channel Attack on Block Ciphers.- Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era.- Efficient Software Implementation of Laddering Algorithms over Binary Elliptic Curves.- Analysis of Diagonal Constants in Salsa.- Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults.- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices.- Similarity Based Interactive Private Information Retrieval.- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA).- Variable-Length Bit Mapping and Error Correcting Codes for Higher-Order Alphabet PUFs.- Mutual Friend Attack Prevention in Social Network Data Publishing.- Short Integrated PKE+PEKS in Standard Model.- Differential Fault Attack on Grain v1, ACORN v3 and Lizard.- Certain observations on ACORN v3 and the Implications to TMDTO Attacks.- Efficient Implementation of Private License Plate Matching Protocols. .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Multi-Agent Programming Contest (14th : 2019)
- Cham, Switzerland : Springer, [2020]
- Description
- Book — 1 online resource
- Summary
-
- Intro
- Preface
- Organization
- Contents
- Overview
- The Multi-Agent Programming Contest: A Résumé*5pt
- 1 Introduction
- 1.1 Structure of This Work
- 1.2 Agents
- 1.3 Goals and Purpose of the MAPC
- 1.4 Related Work
- 2 The MASSim Framework
- 2.1 From 2006: The Early Days
- 2.2 2017 Until Today: Simply Going Forward
- 3 History and Evolution of the Contest
- 3.1 Early Phase
- 3.2 Agents on Mars
- 3.3 The City Scenario
- 4 2019: Agents Assemble
- 4.1 Scenario
- 4.2 Participants
- 4.3 Tournament and Results
- 4.4 Interesting Simulations
- 4.5 Survey Results
- 5 Lessons Learned
- 5.1 Agents Assemble Scenario
- 5.2 General
- 6 Challenges and Outlook
- References
- Contest Entries
- LFC: Combining Autonomous Agents and Automated Planning in the Multi-Agent Programming Contest
- 1 Introduction
- 2 Software Architecture
- 2.1 JaCaMo
- 2.2 Fast Downward
- 3 Strategies and Behaviours
- 3.1 Exploration
- 3.2 Agent Identification
- 3.3 Goal Evaluation
- 3.4 Building a Map
- 3.5 From Exploration to Tasks
- 3.6 Optimal In-Vision Planning
- 3.7 Achieving Tasks
- 4 Match Analysis
- 4.1 LFC vs FIT BUT
- 4.2 LFC vs TRG
- 4.3 LFC vs GOAL-DTU
- 5 Team Overview: Short Answers
- 5.1 Participants and Their Background
- 5.2 Statistics
- 5.3 Agent System Details
- 5.4 Scenario and Strategy
- 5.5 And the Moral of It Is ...
- 6 Conclusion
- References
- Multi-Agent Programming Contest 2019 FIT BUT Team Solution
- 1 Introduction
- 1.1 MAPC 2019 Environment
- 1.2 DeSouches and FIT BUT Team at MAPC 2019
- 2 deSouches Multi-agent System
- 2.1 General deSouches and His Soldiers
- 2.2 Agent Level Architecture
- 2.3 Goals
- 2.4 Synchronization of Agent Groups
- 2.5 Scenarios
- 3 FIT BUT System
- 3.1 Design
- 3.2 Synchronization
- 3.3 FIT BUT Agent Reasoning Cycle
- 3.4 Options Analysis
- 3.5 Plan Selection
- 3.6 Action Reservation System
- 3.7 Task Possibilities Commutations
- 4 Limitations and Possible Improvements
- 4.1 Size Control
- 4.2 Hoarding
- 5 Conclusion
- A Team Overview: Short Answers
- A.1 Participants and Their Background
- A.2 Statistics
- A.3 Agent System Details
- A.4 Scenario and Strategy
- A.5 And the Moral of It Is ...
- References
- GOAL-DTU: Development of Distributed Intelligence for the Multi-Agent Programming Contest
- 1 Introduction
- 2 Agent Programming in GOAL
- 2.1 The GOAL Execution Loop
- 2.2 Action Selection
- 3 Strategy
- 4 Agent Knowledge
- 4.1 The Current Position
- 4.2 Visited Positions
- 4.3 Positions of Goal Cells
- 4.4 Blocks, Dispensers and Obstacles
- 4.5 Attached Blocks
- 5 Agent Communication and Shared Knowledge
- 5.1 Encountering Other Agents
- 5.2 Goal Cells and Agent Positions
- 5.3 Attached Blocks
- 6 Agent Movement
- 6.1 Evaluation Functions
- 7 Solving Tasks
- 7.1 Collecting Blocks
- 7.2 Task Planning
- 7.3 Executing Task Plans
- 8 Evaluation of Matches
- 9 Discussion
- 9.1 Changes Since the Contest
(source: Nielsen Book Data)
20. Visual cryptography for image processing and security : theory, methods, and applications [2015]
- Liu, Feng, author.
- Second edition. - Cham : Springer, [2015]
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Introduction
- Various Problems in Visual Cryptography
- Cheating Prevention of Visual Cryptography
- Various Visual Cryptography Schemes
- Various Color Schemes of Visual Cryptography
- Various Applications of Visual Cryptography.
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.