## Home > Tags: cryptography (Total 292 Records)

### Disappearing Cryptography, Third Edition: Information Hiding: Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming)

Cryptography By:Peter Wayner 2008-12-17 00:00:00

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passw Cryptography

Tags:
*programming*
*software*
*information*
*engineering*
*series*
*cryptography*
*hiding*
*watermarking*
*steganography*
*disappearing*

### Security Solutions and Applied Cryptography in Smart Grid Communications (Advances in Information Security, Privacy, and Ethics)

Algorithms By:Mohamed Amine Ferrag 2016-11-29 00:00:00

by Mohamed Amine Ferrag (Editor), Ahmed Ahmim (Editor) "This book is a pivotal reference source for the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat dete Algorithms

Tags:
*solution*
*security*
*grid*
*information*
*communication*
*cryptography*
*privacy*
*ethics*

### Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings (Lecture Notes in Computer Science)

Security By:Shlomi Dolev 2017-06-03 00:00:00

This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security secure software development methodologies, formal methods semant Security

Tags:
*computer*
*security*
*cryptography*
*learning*
*lecture*
*science*
*machine*
*cyber*
*proceedings*
*conference*
*israel*
*cscml*

### Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings (Lecture Notes in Computer Science)

Security By:Tanja Lange 2017-06-05 00:00:00

This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in t Security

Tags:
*computer*
*cryptography*
*lecture*
*science*
*proceedings*
*netherlands*
*pqcrypto*
*utrecht*

### Cryptography: An Introduction (Student Mathematical Library, Vol. 18) (Student Mathematical Library, V. 18)

Cryptography By:V. V. Yashchenko 2002-11-21 00:00:00

Learning about cryptography requires examining fundamental issues about information security. Questions abound, ranging from 'From whom are we protecting ourselves?' and 'How can we measure levels of security?' to 'What are our opponent's capabilities?' and 'What are their goals?' Answering these qu Cryptography

### Everyday Cryptography: Fundamental Principles and Applications.

Security By:Keith Martin 2017-06-08 00:00:00

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, pay Security

### Coding Theory and Cryptography: The Essentials, Second Edition (Chapman & Hall/CRC Pure and Applied Mathematics)

Security By:D.C. Hankerson 2000-08-04 00:00:00

Containing data on number theory, encryption schemes, and cyclic codes, this highly successful textbook, proven by the authors in a popular two-quarter course, presents coding theory, construction, encoding, and decoding of specific code families in an "easy-to-use" manner appropriate for students w Security

Tags:
*essentials*
*coding*
*theory*
*cryptography*
*mathematics*
*pure*
*chapman*

### Selected Areas in Cryptography SAC 2013: 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers (Lecture Notes in Computer Science)

Cryptography By:Tanja Lange 2014-05-21 00:00:00

This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013. The 26 papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections nam 20th international conference, cryptography sac, crypto block ciphers, lecture notes, selected papers

Tags:
*computer*
*cryptography*
*area*
*lecture*
*science*
*conference*
*papers*
*burnaby*
*sac*

### Error-correcting Codes, Finite Geometries and Cryptography (Contemporary Mathematics)

Cryptography By:Aiden A. Bruen 2010-09-03 00:00:00

The volume features cutting-edge theoretical results on the Reed-Muller and Reed-Solomon codes, classical linear codes, codes from nets and block designs, LDPC codes, perfect quantum and orthogonal codes, iterative decoding, magnetic storage and digital memory devices, and MIMO channels. There are n finite geometries, finite geometries concerns, cutting-edge theoretical results, classical linear codes, affine planes.error-correcting codes

Tags:
*cryptography*
*mathematics*
*codes*
*contemporary*
*finite*
*geometries*

### Introduction To Cryptography With Java Applets (Jones & Bartlett Learning)

Cryptography By:David Bishop 2002-12-26 00:00:00

Introduction to Cryptography with Java Applets covers the mathematical basis of cryptography and cryptanalysis, like linear diophantine equations, linear congruences, systems of linear congruences, quadratic congruences, and exponential congruences. The chapters present theorems and proofs, and many java applets, linear congruences, linear diophantine equations, bartlett learning, pseudo-random bit generation