Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
| Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou |
| Autore | Lu Wei |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Springer Nature, 2020 |
| Descrizione fisica | 1 online resource (X, 235 p. 108 illus., 70 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer security
Computer communication systems Application software Architecture, Computer Data encryption (Computer science) Computer networks - Security measures Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security |
| Soggetto non controllato |
Systems and Data Security
Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security Data and Information Security Computer and Information Systems Applications communication channels (information theory) communication systems computer crime computer hardware computer networks computer security computer systems cryptography data communication systems data security databases network protocols network security sensors signal processing telecommunication networks telecommunication systems telecommunication traffic wireless telecommunication systems Network hardware Information retrieval Internet searching Systems analysis & design Coding theory & cryptology Data encryption |
| ISBN | 981-334-922-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. |
| Record Nr. | UNISA-996465362903316 |
Lu Wei
|
||
| Springer Nature, 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
International Symposium on Mathematics, Quantum Theory, and Cryptography [[electronic resource] ] : Proceedings of MQC 2019 / / edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu
| International Symposium on Mathematics, Quantum Theory, and Cryptography [[electronic resource] ] : Proceedings of MQC 2019 / / edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu |
| Autore | Takagi Tsuyoshi |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Springer Nature, 2021 |
| Descrizione fisica | 1 online resource (XII, 274 p. 83 illus., 24 illus. in color.) |
| Disciplina | 519 |
| Collana | Mathematics for Industry |
| Soggetto topico |
Applied mathematics
Engineering mathematics Data structures (Computer science) Quantum computers Computer security Mathematical and Computational Engineering Data Structures and Information Theory Quantum Computing Systems and Data Security |
| Soggetto non controllato |
Mathematical and Computational Engineering
Data Structures and Information Theory Quantum Computing Systems and Data Security Mathematical and Computational Engineering Applications Data and Information Security Cryptography for Quantum Computers Post-quantum Cryptography Number Theory Representation Theory Quantum Physics Security Modelling Open Access Maths for engineers Algorithms & data structures Information theory Mathematical theory of computation Computer security Network security |
| ISBN | 981-15-5191-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation. |
| Record Nr. | UNISA-996466557703316 |
Takagi Tsuyoshi
|
||
| Springer Nature, 2021 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Machine Learning for Cyber Agents : Attack and Defence / Stanislav Abaimov, Maurizio Martellini
| Machine Learning for Cyber Agents : Attack and Defence / Stanislav Abaimov, Maurizio Martellini |
| Autore | Abaimov, Stanislav |
| Pubbl/distr/stampa | Cham, : Springer, 2022 |
| Descrizione fisica | xv, 227 p. : ill. ; 24 cm |
| Altri autori (Persone) | Martellini, Maurizio |
| Soggetto topico |
68-XX - Computer science [MSC 2020]
68Txx - Artificial intelligence [MSC 2020] |
| Soggetto non controllato |
Artificial Intelligence
Autonomous Systems Cyber Diplomacy Cyber Security Data and Information Security Network Security Security Testing Software Security |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNICAMPANIA-VAN00283604 |
Abaimov, Stanislav
|
||
| Cham, : Springer, 2022 | ||
| Lo trovi qui: Univ. Vanvitelli | ||
| ||
Security of Ubiquitous Computing Systems [[electronic resource] ] : Selected Topics / / edited by Gildas Avoine, Julio Hernandez-Castro
| Security of Ubiquitous Computing Systems [[electronic resource] ] : Selected Topics / / edited by Gildas Avoine, Julio Hernandez-Castro |
| Autore | Avoine Gildas |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Springer Nature, 2021 |
| Descrizione fisica | 1 online resource (XVIII, 265 p. 25 illus., 8 illus. in color.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Computer engineering Internet of things Embedded computer systems Computer software System safety Systems and Data Security Cyber-physical systems, IoT Professional Computing Security Science and Technology |
| Soggetto non controllato |
Systems and Data Security
Cyber-physical systems, IoT Professional Computing Security Science and Technology Data and Information Security Internet of Things Cryptology Cryptacus Security Ubiquitous Devices Lightweight Cryptography Symmetric Cryptography Side-Channel Analysis IoT Security Ubiquitous Computing Systems Open Access Computer security Network security Electrical engineering Cybernetics & systems theory Applied computing Security & fire alarm systems |
| ISBN | 3-030-10591-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics. |
| Record Nr. | UNISA-996464447403316 |
Avoine Gildas
|
||
| Springer Nature, 2021 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||