Listing 1 - 10 of 99 | << page >> |
Sort by
|
Choose an application
"Learn to develop blockchain-based distributed ledgers and deploy a Hyperledger Fabric network with concrete exercises and examples Key Features Updated with the latest features and additions that come with Hyperledger Fabric 2 Write your own smart contracts and services using Java and JavaScript on a Hyperledger Fabric network Dive into real-world blockchain challenges such as integration and scalability Book Description Blockchain with Hyperledger Fabric - Second Edition is a refreshed and extended version of the successful book on practical Hyperledger Fabric blockchain development. This edition includes many new chapters, alongside comprehensive updates and additions to the existing ones. Entirely reworked for Hyperledger Fabric version 2, this edition will bring you right up to date with the latest in blockchain. Using a real-world Trade Finance and Logistics example, with working code available on GitHub, you'll really understand both how and why Hyperledger Fabric can be used to maximum effect. This book is your comprehensive guide and reference to explore and build blockchain networks using Hyperledger Fabric version 2. This edition of the book begins by outlining the evolution of blockchain, including an overview of relevant blockchain technologies. Starting from first principles, you'll learn how to design and operate a permissioned blockchain network based on Hyperledger Fabric version 2. You will learn how to configure the main architectural components of a permissioned blockchain network including Peers, Orderers, Certificate Authorities, Channels, and Policies. You'll then learn how to design, develop, package, and deploy smart contracts, and how they are subsequently used by applications. This edition also contains chapters on DevOps, blockchain governance, and security, making this your go-to book for Hyperledger Fabric version 2. What you will learn Discover why blockchain is a technology and business game changer Set up blockchain networks using Hyperledger Fabric version 2 Understand how to create decentralized applications Learn how to integrate blockchains with existing systems Write smart contracts and services quickly with Hyperledger Fabric and Visual Studio Code Design transaction models and smart contracts with Java, JavaScript, TypeScript, and Golang Deploy REST gateways to access smart contracts and understand how wallets maintain user identities for access control Maintain, monitor, and govern your blockchain solutions Who this book is for This book is designed in such a way that professionals from different areas including business leaders, technology leaders, blockchain application developers, and even beginners can benefit from it." -- Publisher's description.
Coding theory & cryptology. --- Database design & theory. --- Data mining.
Choose an application
Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic operations: addition, subtraction, multiplication, and division. The second part is on the arithmetic of prime fields. And the third part is on the arithmetic of binary fields. The mathematical fundamentals necessary for the latter two parts are included, as are descriptions of various types of cryptosystems, to provide appropriate context. This book is intended for advanced-level students in Computer Science, Computer Engineering, and Electrical and Electronic Engineering. Practitioners too will find it useful, as will those with a general interest in "hard" applications of mathematics.
Data structures (Computer science). --- Data encryption (Computer science). --- Microprocessors. --- Electronic circuits. --- Data Structures and Information Theory. --- Cryptology. --- Processor Architectures. --- Circuits and Systems. --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Minicomputers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
This book is a timely document of state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this topic has recently received attention from governments, industries and academic communities due to the COVID-19 pandemic. This book provides a link between new proposals related to contact tracing applications and a contextual literature review primarily from the cryptologic viewpoint. As these applications are related to security and privacy of individuals, analyzing them from cryptologic viewpoint is of utmost importance. Therefore, present developments from cryptologic aspects of most proposals around the world, including Singapore, Europe, USA, Australia and India, have been discussed. Providing an in-depth study on the design rationale of each protocol, this book is of value to researchers, students and professionals alike.
Computer science. --- Data encryption (Computer science). --- Public health. --- Health care management. --- Health services administration. --- Computer Science, general. --- Cryptology. --- Public Health. --- Health Care Management. --- Health administration --- Health care administration --- Health care management --- Health sciences administration --- Health services management --- Medical care --- Health planning --- Public health administration --- Community health --- Health services --- Hygiene, Public --- Hygiene, Social --- Public health services --- Public hygiene --- Social hygiene --- Health --- Human services --- Biosecurity --- Health literacy --- Medicine, Preventive --- National health services --- Sanitation --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Informatics --- Science --- Administration --- Management --- Contact tracing (Epidemiology) --- Cryptography. --- Data processing. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Tracing, Contact (Epidemiology) --- Epidemiology
Choose an application
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.
Electronic circuits. --- Data encryption (Computer science). --- Algebra. --- Ordered algebraic structures. --- Circuits and Systems. --- Cryptology. --- Order, Lattices, Ordered Algebraic Structures. --- Public key cryptography. --- Algebraic structures, Ordered --- Structures, Ordered algebraic --- Algebra --- Mathematics --- Mathematical analysis --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption
Choose an application
This book provides a comprehensive introduction to blockchain and distributed ledger technology. Intended as an applied guide for hands-on practitioners, the book includes detailed examples and in-depth explanations of how to build and run a blockchain from scratch. Through its conceptual background and hands-on exercises, this book allows students, teachers and crypto enthusiasts to launch their first blockchain while assuming prior knowledge of the underlying technology. How do I build a blockchain? How do I mint a cryptocurrency? How do I write a smart contract? How do I launch an initial coin offering (ICO)? These are some of questions this book answers. Starting by outlining the beginnings and development of early cryptocurrencies, it provides the conceptual foundations required to engineer secure software that interacts with both public and private ledgers. The topics covered include consensus algorithms, mining and decentralization, and many more. “This is a one-of-a-kind book on Blockchain technology. The authors achieved the perfect balance between the breadth of topics and the depth of technical discussion. But the real gem is the set of carefully curated hands-on exercises that guide the reader through the process of building a Blockchain right from Chapter 1.” Volodymyr Babich, Professor of Operations and Information Management, McDonough School of Business, Georgetown University "An excellent introduction of DLT technology for a non-technical audience. The book is replete with examples and exercises, which greatly facilitate the learning of the underlying processes of blockchain technology for all, from students to entrepreneurs.” Serguei Netessine, Dhirubhai Ambani Professor of Innovation and Entrepreneurship, The Wharton School, University of Pennsylvania “Whether you want to start from scratch or deepen your blockchain knowledge about the latest developments, this book is an essential reference. Reading this book, you’ll get inspired, be able to assess the applicability of blockchain to supply chain operations, and learn from best practices recognized in real-world examples.” Ralf W. Seifert, Professor of Technology and Operations Management at EPFL and Professor of Operations Management at IMD.
Blockchains (Databases) --- Block chains (Databases) --- Database security --- Distributed databases --- Information technology. --- Business—Data processing. --- Application software. --- Data encryption (Computer science). --- IT in Business. --- Information Systems Applications (incl. Internet). --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management
Choose an application
"Covers fundamental theories and algorithms for practical design which form the basis of modern digital media steganography Provides new theoretical breakthroughs and a number of modern techniques in steganography Presents the latest advances in digital media steganography such as using deep learning and artificial neural network as well as Quantum Steganography"--
Cryptography. --- Data encryption (Computer science) --- Digital media --- Security measures. --- Electronic media --- New media (Digital media) --- Mass media --- Digital communications --- Online journalism --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers
Choose an application
This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.
Data encryption (Computer science). --- Computer security. --- Cryptology. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Protection --- Security measures --- Data encryption (Computer science)
Choose an application
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2020, CT-RSA 2020, held in San Francisco, CA, USA, in February 2020. The 28 papers presented in this volume were carefully reviewed and selected from 95 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto-graphic protocols to primitives and their implementation security.
Data encryption (Computer science). --- Computer communication systems. --- Application software. --- Computers. --- Coding theory. --- Information theory. --- Software engineering. --- Cryptology. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computing Milieux. --- Coding and Information Theory. --- Software Engineering. --- Computer software engineering --- Engineering --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Distributed processing --- Data encryption (Computer science) --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers
Choose an application
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi’an, China in October 2020. The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.
Computer security. --- Application software. --- Education—Data processing. --- Computers and civilization. --- Data encryption (Computer science). --- Systems and Data Security. --- Computer Appl. in Social and Behavioral Sciences. --- Computers and Education. --- Computers and Society. --- Cryptology. --- Security Services. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Machine learning --- Data protection. --- Social sciences --- Education --- Cryptography. --- Data and Information Security. --- Computer Application in Social and Behavioral Sciences. --- Data processing. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in the analysis-by-synthesis approach. This book distinguishes itself from the existing literature in three ways. First, it not only reviews traditional VC for binary secret images, but also covers recent efforts in improving visual quality for gray scale secret images. Second, not only traditional quality measures are reviewed, but also measures that were not used for measuring perceptual quality of decrypted secret images, such as Radially Averaged Power Spectrum Density (RAPSD) and residual variance, are employed for evaluating and guiding the design of VC algorithms. Third, unlike most VC books following a mathematical formal style, this book tries to make a balance between engineering intuition and mathematical reasoning. All the targeted problems and corresponding solutions are fully motivated by practical applications and evaluated by experimental tests, while important security issues are presented as mathematical proof. Furthermore, important algorithms are summarized as pseudocodes, thus enabling the readers to reproduce the results in the book. Therefore, this book serves as a tutorial for readers with an engineering background as well as for experts in related areas to understand the basics and research frontiers in visual cryptography.
Data encryption (Computer science). --- Visualization. --- Signal, Image and Speech Processing. --- Cryptology. --- Visualisation --- Imagination --- Visual perception --- Imagery (Psychology) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Signal processing. --- Image processing. --- Speech processing systems. --- Mathematics. --- Math --- Science --- Computational linguistics --- Electronic systems --- Information theory --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication)
Listing 1 - 10 of 99 | << page >> |
Sort by
|