Narrow your search
Listing 1 - 10 of 782 << page
of 79
>>
Sort by

Article
Homomorphic public-key cryptosystems over groups and rings

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

CRYPTOLOGIE


Book
Geheimschrift: over de geschiedenis en methoden van de cryptologie
Authors: ---
Year: 1993 Publisher: Tilburg Scryption

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Writing --- cryptologie

Invitation to cryptology.
Author:
ISBN: 0130889768 Year: 2002 Publisher: New Jersey : Prentice Hall,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Samenvatting:Designed for either the intelligent freshman (good at math) or for alow-level junior year first course, Cryptology introduces a wide range ofup-to-date cryptological concepts along with the mathematical ideas thatare behind them. The new and old are organized around a historicalframework. A variety of mathematical topics that are germane tocryptology (e.g., modular arithmetic, Boolean functions, complexitytheory, etc.) are developed, but they do not overshadow the main focus ofthe text. Unlike other texts in this field, Cryptology brings studentsdirectly to concepts of classical substitutions and transpositions andissues in modern cryptographic methods.


Book
Coderingstheorie en cryptologie
Authors: --- ---
ISBN: 9035811933 Year: 1993 Publisher: Heerlen Open Universiteit

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Enigma : aspects cryptologiques et techniques
Author:
Year: 2004 Publisher: Antwerpen Hogere Zeevaartschool

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Black-Box Models of Computation in Cryptology
Authors: ---
ISBN: 9783834819901 Year: 2012 Publisher: Wiesbaden Vieweg+Teubner Verlag

Loading...
Export citation

Choose an application

Bookmark

Abstract

Generic group algorithms solve computational problems defined over algebraic groups without exploiting properties of a particular representation of group elements. This is modeled by treating the group as a black-box. The fact that a computational problem cannot be solved by a reasonably restricted class of algorithms may be seen as support towards the conjecture that the problem is also hard in the classical Turing machine model. Moreover, a lower complexity bound for certain algorithms is a helpful insight for the search for cryptanalytic algorithms.   Tibor Jager addresses several fundamental questions concerning algebraic black-box models of computation: Are the generic group model and its variants a reasonable abstraction? What are the limitations of these models? Can we relax these models to bring them closer to the reality?


Digital
Black-Box Models of Computation in Cryptology
Author:
ISBN: 9783834819901 Year: 2012 Publisher: Wiesbaden Vieweg+Teubner Verlag

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
A Concise Introduction to Data Compression
Authors: ---
ISBN: 9781848000728 Year: 2008 Publisher: London Springer London

Loading...
Export citation

Choose an application

Bookmark

Abstract

Compressing data is an option naturally selected when faced with problems of high costs or restricted space. Written by a renowned expert in the field, this book offers readers a succinct, reader-friendly foundation to the chief approaches, methods and techniques currently employed in the field of data compression. Part I presents the basic approaches to data compression and describes a few popular techniques and methods commonly used to compress data. The reader discovers essential concepts, such as variable-length and prefix codes, statistical distributions and run-length encoding. Part II then concentrates on advanced techniques, such as arithmetic coding, orthogonal transforms, subband transforms and the Burrows-Wheeler transform. Features: ¢ Clear overview of the principles underlying this field ¢ Outlines the essentials of the various approaches to compressing data ¢ Contains many learning aids such as: chapter introductions and summaries, chapter-end exercises, comprehensive glossary, etc. ¢ Provides several examples of important compression algorithms ¢ Offers a supplementary author-maintained website, with errata and auxiliary material - www.davidsalomon.name/DCugAdvertis/DCug.html ¢ An ideal introductory volume to David Salomon's fourth edition of Data Compression: The Complete Reference Complete and clear, this book is the perfect resource for undergraduates in computer science and requires a minimum of mathematics. It is also ideal for readers with a basic knowledge of computer science wanting to learn about data compression. David Salomon is a professor emeritus of Computer Science at California State University, Northridge. He has authored numerous articles and books, including Coding for Data and Computer Communications, Guide to Data Compression Methods, Data Privacy and Security, Computer Graphics and Geometric Modeling, Foundations of Computer Security, Transformations and Projections in Computer Graphics, and Variable-length Codes for Data Compression.


Book
ISSE/SECURE 2007 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe/SECURE 2007 Conference
Authors: --- --- ---
ISBN: 9783834894182 Year: 2007 Publisher: Wiesbaden Vieweg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, eID Cards, Infrastructure Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE/SECURE 2007.


Book
Pro Hyper-V
Authors: ---
ISBN: 9781430219095 Year: 2009 Publisher: Berkeley CA Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Companies of all sizes worldwide are looking to virtualization to change the way data centers operate. Server consolidation, energy efficiency, simpler management, and deployment and increased capacity are all tangible benefits to be gained from a move to virtual servers and virtually hosted services. Microsoft has introduced Hyper-V, a Hypervisor-based virtualization platform integrated with the operating system, allowing you to dynamically add physical and virtual resources into your data center with minimal pain. In Pro Hyper-V, author Harley Stagner takes a comprehensive approach to acquiring, deploying, using, and troubleshooting Microsoft's answer to virtualization on the Windows Server platform. Learn from a true virtualization guru all you need to know about deploying virtual machines, managing your library of VMs in your enterprise, recovering gracefully from failure scenarios, and migrating existing physical machines to virtual hardware.

Listing 1 - 10 of 782 << page
of 79
>>
Sort by