This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based enc…
This book constitutes the proceedings of the 15th International Conference on Transport Systems Telematics, TST 2015, held in Wrocław, Poland, in April 2015. The 35 revised full papers and two short papers included in this volume were carefully reviewed and selected from 115 submissions. The papers provide an overview of solutions being developed in the fields of transport telematics and inte…
This textbook effectively builds a bridge from basic number theory to recent advances in applied number theory. It presents the first unified account of the four major areas of application where number theory plays a fundamental role, namely cryptography, coding theory, quasi-Monte Carlo methods, and pseudorandom number generation, allowing the authors to delineate the manifold links and interr…
The second volume in the SIRCA book series investigates the impact of information society initiatives by extending the boundaries of academic research into the realm of practice. Global in scope, it includes contributions and research projects from Asia, Africa and Latin America. The international scholarly community has taken a variety of approaches to question the impact of information societ…
The first book on 6G wireless presents an overall vision for 6G - an era of intelligence-of-everything - with drivers, key capabilities, use cases, KPIs, and the technology innovations that will shape it. These innovations include immersive human-centric communication, sensing, localization, and imaging, connected machine learning and networked AI, Industry 4.0 and beyond with connected intelli…
This book introduces the theoretical fundamentals for modeling queues in discrete-time, and the basic procedures for developing queuing models in discrete-time. There is a focus on applications in modern telecommunication systems. It presents how most queueing models in discrete-time can be set up as discrete-time Markov chains. Techniques such as matrix-analytic methods (MAM) that can used …
This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I …
This volume of essays focuses on films of the so-called ‘quinqui’ genre, films created during the 1970s–1980s depicting the lives of young criminals from the outskirts of Spanish cities, that arose/spread during the uncertain transitional period in a Spain moving from a dictatorship to a democracy. The ‘quinqui’ films, produced and released on a shoestring budget, were nonetheless imm…
This book constitutes the refereed proceedings of the 4th International Conference on Theory and Practice of Natural Computing, TPNC 2015, held in Mieres, Spain, in December 2015. The 12 revised full papers presented together with 20 invited talks in this book were carefully reviewed and selected from 30 submissions. The scope of TPNC is rather broad, containing topics of either theoretical,…
In this book, experts from academia and industry present the latest advances in scientific theory relating to applied electromagnetics and examine current and emerging applications particularly within the fields of electronics, communications, and computer technology. The book is based on presentations delivered at APPEIC 2015, the 2nd Applied Electromagnetic International Conference, held in K…