Narrow your search

Library

Odisee (98)

Thomas More Kempen (98)

Thomas More Mechelen (98)

VIVES (98)

UGent (97)

KU Leuven (96)

UCLL (96)

ULiège (95)

ULB (94)

KBC (73)

More...

Resource type

book (99)


Language

English (99)


Year
From To Submit

2020 (99)

Listing 1 - 10 of 99 << page
of 10
>>
Sort by

Book
Blockchain with hyperledger fabric : build decentralized applications using hyperledger fabric 2
Author:
ISBN: 1839216174 9781839216176 1839218754 9781839218750 Year: 2020 Publisher: Birmingham, England ; Mumbai : Packt Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Learn to develop blockchain-based distributed ledgers and deploy a Hyperledger Fabric network with concrete exercises and examples Key Features Updated with the latest features and additions that come with Hyperledger Fabric 2 Write your own smart contracts and services using Java and JavaScript on a Hyperledger Fabric network Dive into real-world blockchain challenges such as integration and scalability Book Description Blockchain with Hyperledger Fabric - Second Edition is a refreshed and extended version of the successful book on practical Hyperledger Fabric blockchain development. This edition includes many new chapters, alongside comprehensive updates and additions to the existing ones. Entirely reworked for Hyperledger Fabric version 2, this edition will bring you right up to date with the latest in blockchain. Using a real-world Trade Finance and Logistics example, with working code available on GitHub, you'll really understand both how and why Hyperledger Fabric can be used to maximum effect. This book is your comprehensive guide and reference to explore and build blockchain networks using Hyperledger Fabric version 2. This edition of the book begins by outlining the evolution of blockchain, including an overview of relevant blockchain technologies. Starting from first principles, you'll learn how to design and operate a permissioned blockchain network based on Hyperledger Fabric version 2. You will learn how to configure the main architectural components of a permissioned blockchain network including Peers, Orderers, Certificate Authorities, Channels, and Policies. You'll then learn how to design, develop, package, and deploy smart contracts, and how they are subsequently used by applications. This edition also contains chapters on DevOps, blockchain governance, and security, making this your go-to book for Hyperledger Fabric version 2. What you will learn Discover why blockchain is a technology and business game changer Set up blockchain networks using Hyperledger Fabric version 2 Understand how to create decentralized applications Learn how to integrate blockchains with existing systems Write smart contracts and services quickly with Hyperledger Fabric and Visual Studio Code Design transaction models and smart contracts with Java, JavaScript, TypeScript, and Golang Deploy REST gateways to access smart contracts and understand how wallets maintain user identities for access control Maintain, monitor, and govern your blockchain solutions Who this book is for This book is designed in such a way that professionals from different areas including business leaders, technology leaders, blockchain application developers, and even beginners can benefit from it." -- Publisher's description.


Book
Cryptography Arithmetic : Algorithms and Hardware Architectures
Author:
ISBN: 3030341429 3030341410 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic operations: addition, subtraction, multiplication, and division. The second part is on the arithmetic of prime fields. And the third part is on the arithmetic of binary fields. The mathematical fundamentals necessary for the latter two parts are included, as are descriptions of various types of cryptosystems, to provide appropriate context. This book is intended for advanced-level students in Computer Science, Computer Engineering, and Electrical and Electronic Engineering. Practitioners too will find it useful, as will those with a general interest in "hard" applications of mathematics.


Book
Contact tracing in post-Covid world : a cryptologic approach
Author:
ISBN: 9811597278 981159726X Year: 2020 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is a timely document of state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this topic has recently received attention from governments, industries and academic communities due to the COVID-19 pandemic. This book provides a link between new proposals related to contact tracing applications and a contextual literature review primarily from the cryptologic viewpoint. As these applications are related to security and privacy of individuals, analyzing them from cryptologic viewpoint is of utmost importance. Therefore, present developments from cryptologic aspects of most proposals around the world, including Singapore, Europe, USA, Australia and India, have been discussed. Providing an in-depth study on the design rationale of each protocol, this book is of value to researchers, students and professionals alike.


Book
Lattice-Based Public-Key Cryptography in Hardware
Authors: ---
ISBN: 9813299940 9813299932 Year: 2020 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.


Book
Build Your Own Blockchain : A Practical Guide to Distributed Ledger Technology
Authors: --- ---
ISBN: 3030401421 3030401413 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a comprehensive introduction to blockchain and distributed ledger technology. Intended as an applied guide for hands-on practitioners, the book includes detailed examples and in-depth explanations of how to build and run a blockchain from scratch. Through its conceptual background and hands-on exercises, this book allows students, teachers and crypto enthusiasts to launch their first blockchain while assuming prior knowledge of the underlying technology. How do I build a blockchain? How do I mint a cryptocurrency? How do I write a smart contract? How do I launch an initial coin offering (ICO)? These are some of questions this book answers. Starting by outlining the beginnings and development of early cryptocurrencies, it provides the conceptual foundations required to engineer secure software that interacts with both public and private ledgers. The topics covered include consensus algorithms, mining and decentralization, and many more. “This is a one-of-a-kind book on Blockchain technology. The authors achieved the perfect balance between the breadth of topics and the depth of technical discussion. But the real gem is the set of carefully curated hands-on exercises that guide the reader through the process of building a Blockchain right from Chapter 1.” Volodymyr Babich, Professor of Operations and Information Management, McDonough School of Business, Georgetown University "An excellent introduction of DLT technology for a non-technical audience. The book is replete with examples and exercises, which greatly facilitate the learning of the underlying processes of blockchain technology for all, from students to entrepreneurs.” Serguei Netessine, Dhirubhai Ambani Professor of Innovation and Entrepreneurship, The Wharton School, University of Pennsylvania “Whether you want to start from scratch or deepen your blockchain knowledge about the latest developments, this book is an essential reference. Reading this book, you’ll get inspired, be able to assess the applicability of blockchain to supply chain operations, and learn from best practices recognized in real-world examples.” Ralf W. Seifert, Professor of Technology and Operations Management at EPFL and Professor of Operations Management at IMD.


Book
Digital media steganography
Author:
ISBN: 0128194391 0128194383 9780128194393 9780128194386 Year: 2020 Publisher: London Academic Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Covers fundamental theories and algorithms for practical design which form the basis of modern digital media steganography Provides new theoretical breakthroughs and a number of modern techniques in steganography Presents the latest advances in digital media steganography such as using deep learning and artificial neural network as well as Quantum Steganography"--


Book
Cryptographic obfuscation : a survey
Author:
ISBN: 3319980416 3319980408 Year: 2020 Publisher: Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.


Book
Topics in Cryptology – CT-RSA 2020 : The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings
Author:
ISBN: 3030401863 3030401855 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2020, CT-RSA 2020, held in San Francisco, CA, USA, in February 2020. The 28 papers presented in this volume were carefully reviewed and selected from 95 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto-graphic protocols to primitives and their implementation security.

Keywords

Data encryption (Computer science). --- Computer communication systems. --- Application software. --- Computers. --- Coding theory. --- Information theory. --- Software engineering. --- Cryptology. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computing Milieux. --- Coding and Information Theory. --- Software Engineering. --- Computer software engineering --- Engineering --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Distributed processing --- Data encryption (Computer science) --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers


Book
Machine Learning for Cyber Security : Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part I
Author:
ISBN: 3030622231 3030622223 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi’an, China in October 2020. The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.

Keywords

Computer security. --- Application software. --- Education—Data processing. --- Computers and civilization. --- Data encryption (Computer science). --- Systems and Data Security. --- Computer Appl. in Social and Behavioral Sciences. --- Computers and Education. --- Computers and Society. --- Cryptology. --- Security Services. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Machine learning --- Data protection. --- Social sciences --- Education --- Cryptography. --- Data and Information Security. --- Computer Application in Social and Behavioral Sciences. --- Data processing. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing


Book
Improving Image Quality in Visual Cryptography
Authors: --- ---
ISBN: 9811382891 9811382883 Year: 2020 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in the analysis-by-synthesis approach. This book distinguishes itself from the existing literature in three ways. First, it not only reviews traditional VC for binary secret images, but also covers recent efforts in improving visual quality for gray scale secret images. Second, not only traditional quality measures are reviewed, but also measures that were not used for measuring perceptual quality of decrypted secret images, such as Radially Averaged Power Spectrum Density (RAPSD) and residual variance, are employed for evaluating and guiding the design of VC algorithms. Third, unlike most VC books following a mathematical formal style, this book tries to make a balance between engineering intuition and mathematical reasoning. All the targeted problems and corresponding solutions are fully motivated by practical applications and evaluated by experimental tests, while important security issues are presented as mathematical proof. Furthermore, important algorithms are summarized as pseudocodes, thus enabling the readers to reproduce the results in the book. Therefore, this book serves as a tutorial for readers with an engineering background as well as for experts in related areas to understand the basics and research frontiers in visual cryptography.

Listing 1 - 10 of 99 << page
of 10
>>
Sort by