This open access book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical principles behind various encryption and decryption algorithms. The theory stems from technology. Based on Shannon's information theory, this book systematically introduces the information theory, statistical…
This book based on static indicators and dynamic big data from local electric vehicles, is the first New-Energy Vehicles (NEVs) research report on the Big Data in China. Using the real-time big data collected by China's National Monitoring and Management Platform for NEVs, this book delves into the main annual technological progress of NEVs, the vehicle operating characteristics, it also antici…
This open access book compiles the research results of the Collaborative Research Center SFB 837, which has been running since 2010 and will end in 2022, with the topic "Interaction Modeling in Mechanized Tunneling". The Collaborative Research Center is funded by the German Research Foundation (DFG) and is currently the world's largest research facility in the field of tunneling. The aim of the…
This open access two-volume set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organized in the following top…
In diesem Open-Access-Buch stehen die wirtschaftliche Verwertung von Daten und die dazu gehörenden technischen und organisatorischen Prozesse und Strukturen in Unternehmen im Fokus. Es behandelt Themen wie Datenmonetarisierung, Datenverträge, Data Governance, Informationssicherheit, Datenschutz und die Vertrauenswürdigkeit von Daten. Seit Jahren wird davon gesprochen, dass „Daten das …
In diesem Open-Access-Buch stehen die wirtschaftliche Verwertung von Daten und die dazu gehörenden technischen und organisatorischen Prozesse und Strukturen in Unternehmen im Fokus. Es behandelt Themen wie Datenmonetarisierung, Datenverträge, Data Governance, Informationssicherheit, Datenschutz und die Vertrauenswürdigkeit von Daten.
This open-access book aims to highlight the coming surge of 5G network-based applications and predicts that the centralized networks and their current capacity will be incapable of meeting the demands. The book emphasizes the benefits and challenges associated with the integration of 5G networks with varied applications. Further, the book gathers and investigates the most recent 5G-based resear…
This book presents the state-of-the-art in supercomputer simulation. It includes the latest findings from leading researchers using systems from the High Performance Computing Center Stuttgart (HLRS). The reports cover all fields of computational science and engineering ranging from CFD to computational physics and from chemistry to computer science with a special emphasis on industrially relev…
From the Foreword:'John Anderson's book represents a milestone in aviation literature. For the first time aviation enthusiasts - both specialists and popular readers alike - possess an authoritative history of aerodynamic theory. Not only is this study authoritative, it is also highly readable and linked to the actual (and more familiar) story of how the airplane evolved. The book touches on al…
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…