International Symposium on Mathematics, Quantum Theory, and Cryptography [[electronic resource] ] : Proceedings of MQC 2019 / / edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu
| International Symposium on Mathematics, Quantum Theory, and Cryptography [[electronic resource] ] : Proceedings of MQC 2019 / / edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu |
| Autore | Takagi Tsuyoshi |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Springer Nature, 2021 |
| Descrizione fisica | 1 online resource (XII, 274 p. 83 illus., 24 illus. in color.) |
| Disciplina | 519 |
| Collana | Mathematics for Industry |
| Soggetto topico |
Applied mathematics
Engineering mathematics Data structures (Computer science) Quantum computers Computer security Mathematical and Computational Engineering Data Structures and Information Theory Quantum Computing Systems and Data Security |
| Soggetto non controllato |
Mathematical and Computational Engineering
Data Structures and Information Theory Quantum Computing Systems and Data Security Mathematical and Computational Engineering Applications Data and Information Security Cryptography for Quantum Computers Post-quantum Cryptography Number Theory Representation Theory Quantum Physics Security Modelling Open Access Maths for engineers Algorithms & data structures Information theory Mathematical theory of computation Computer security Network security |
| ISBN | 981-15-5191-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation. |
| Record Nr. | UNISA-996466557703316 |
Takagi Tsuyoshi
|
||
| Springer Nature, 2021 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Security of Ubiquitous Computing Systems [[electronic resource] ] : Selected Topics / / edited by Gildas Avoine, Julio Hernandez-Castro
| Security of Ubiquitous Computing Systems [[electronic resource] ] : Selected Topics / / edited by Gildas Avoine, Julio Hernandez-Castro |
| Autore | Avoine Gildas |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Springer Nature, 2021 |
| Descrizione fisica | 1 online resource (XVIII, 265 p. 25 illus., 8 illus. in color.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Computer engineering Internet of things Embedded computer systems Computer software System safety Systems and Data Security Cyber-physical systems, IoT Professional Computing Security Science and Technology |
| Soggetto non controllato |
Systems and Data Security
Cyber-physical systems, IoT Professional Computing Security Science and Technology Data and Information Security Internet of Things Cryptology Cryptacus Security Ubiquitous Devices Lightweight Cryptography Symmetric Cryptography Side-Channel Analysis IoT Security Ubiquitous Computing Systems Open Access Computer security Network security Electrical engineering Cybernetics & systems theory Applied computing Security & fire alarm systems |
| ISBN | 3-030-10591-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics. |
| Record Nr. | UNISA-996464447403316 |
Avoine Gildas
|
||
| Springer Nature, 2021 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||