Subcategories
Tags
Language
Tags

Public-Key Cryptography – PKC 2018 (Repost)

Posted By: AvaxGenius
Public-Key Cryptography – PKC 2018 (Repost)

Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I By Michel Abdalla
English | PDF | 2018 | 716 Pages | ISBN : 3319765779 | 26.22 MB

The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018.

Number-Theoretic Methods in Cryptology (Repost)

Posted By: AvaxGenius
Number-Theoretic Methods in Cryptology (Repost)

Number-Theoretic Methods in Cryptology: First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers By Jerzy Kaczorowski
English | PDF | 2018 | 287 Pages | ISBN : 3319766198 | 5.08 MB

This book constitutes the refereed post-conference proceedings of the First International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2017, held in Warsaw, Poland, in September 2017.The 15 revised full papers presented in this book together with 3 invited talks were carefully reviewed and selected from 32 initial submissions. The papers are organized in topical sections on elliptic curves in cryptography; public-key cryptography; lattices in cryptography; number theory; pseudorandomness; and algebraic structures and analysis.

The Cybersecurity Manager's Guide: The Art of Building Your Security Program

Posted By: First1
The Cybersecurity Manager's Guide: The Art of Building Your Security Program

The Cybersecurity Manager's Guide: The Art of Building Your Security Program by Todd Barnum
English | April 13th, 2021 | ISBN: 149207621X | 178 pages | True EPUB | 1.59 MB

If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow.

Foundations of Cryptography A Primer

Posted By: insetes
Foundations of Cryptography A Primer

Foundations of Cryptography A Primer By Oded Goldreich
2005 | 131 Pages | ISBN: 1933019026 | PDF | 3 MB

Cryptography Theory And Practice

Posted By: insetes
Cryptography Theory And Practice

Cryptography Theory And Practice By Douglas Stinson
1995 | 573 Pages | ISBN: 0849385210 | PDF | 17 MB

Developments in Language Theory (Repost)

Posted By: AvaxGenius
Developments in Language Theory (Repost)

Developments in Language Theory: 23rd International Conference, DLT 2019, Warsaw, Poland, August 5–9, 2019, Proceedings by Piotrek Hofman
English | EPUB | 2019 | 328 Pages | ISBN : 3030248852 | 24.5 MB

This book constitutes the proceedings of the 23rd International Conference on Developments in Language Theory, DLT 2019, held in Warsaw, Poland, in August 2019.

Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer

Posted By: tarantoga
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer

Jean-Philippe Aumasson, "Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer"
English | ASIN: B08PHS676K, ISBN: 1718501404 | 2021 | AZW3 | 160 pages | 387 KB

Codes, Ciphers, Steganography & Secret Messages

Posted By: Free butterfly
Codes, Ciphers, Steganography & Secret Messages

Codes, Ciphers, Steganography & Secret Messages by Sunil Tanna
English | January 30, 2020 | ISBN: N/A | ASIN: B084DHGY6T | 263 pages | EPUB | 10 Mb

Smart Card Research and Advanced Applications

Posted By: AvaxGenius
Smart Card Research and Advanced Applications

Smart Card Research and Advanced Applications: 19th International Conference, CARDIS 2020, Virtual Event, November 18–19, 2020, Revised Selected Papers by Pierre-Yvan Liardet
English | PDF | 2021 | 201 Pages | ISBN : 3030684865 | 12.1 MB

This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lübeck, Germany, and changed to an online format due to the COVID-19 pandemic.

Security and Privacy: Select Proceedings of ICSP 2020

Posted By: AvaxGenius
Security and Privacy: Select Proceedings of ICSP 2020

Security and Privacy: Select Proceedings of ICSP 2020 by Pantelimon Stănică
English | PDF | 2020 | 183 Pages | ISBN : 9813367806 | 4.4 MB

This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy.

Cyber-Physical Security for Critical Infrastructures Protection

Posted By: AvaxGenius
Cyber-Physical Security for Critical Infrastructures Protection

Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers by Habtamu Abie
English | EPUB | 2021 | 227 Pages | ISBN : 3030697800 | 24 MB

This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020.

Machine Learning and Metaheuristics Algorithms, and Applications

Posted By: AvaxGenius
Machine Learning and Metaheuristics Algorithms, and Applications

Machine Learning and Metaheuristics Algorithms, and Applications: Second Symposium, SoMMA 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers by Sabu M. Thampi
English | EPUB | 2021 | 256 Pages | ISBN : 9811604185 | 35.1 MB

This book constitutes the refereed proceedings of the Second Symposium on Machine Learning and Metaheuristics Algorithms, and Applications, SoMMA 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online.

Arithmetic of Finite Fields

Posted By: AvaxGenius
Arithmetic of Finite Fields

Arithmetic of Finite Fields: 8th International Workshop, WAIFI 2020, Rennes, France, July 6–8, 2020, Revised Selected and Invited Papers by Jean Claude Bajard
English | EPUB | 2021 | 280 Pages | ISBN : 3030688682 | 19.9 MB

This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2020, held in Rennes, France in July 2020.
Due to the COVID-19, the workshop was held online.

A Short & Happy Guide to Bitcoin, Blockchain, and Crypto (Short & Happy Guides)

Posted By: First1
A Short & Happy Guide to Bitcoin, Blockchain, and Crypto (Short & Happy Guides)

A Short & Happy Guide to Bitcoin, Blockchain, and Crypto (Short & Happy Guides) by Del Wright, Jr.
English | June 17th, 2020 | ISBN: 1684672260 | 261 pages | True EPUB | 0.64 MB

In a concise and easily digestible format, this book gives students, entrepreneurs, lawyers, policymakers, and anyone curious about blockchain and crypto, an introduction to what has become the most valuable innovation of the 21st century. It also offers a handy field guide to blockchain technologies and crypto, so readers can better understand both their functions, as well as the market and regulatory challenges they face.

Encryption for Digital Content (Repost)

Posted By: AvaxGenius
Encryption for Digital Content (Repost)

Encryption for Digital Content by Aggelos Kiayias
English | PDF | 2010 | 217 Pages | ISBN : 1441900438 | 4.3 MB

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques.