OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 53 from your keywords: subject="Information theory"
First Page Previous 1 2 3 4 5 Next Last Page
cover
International Symposium on Mathematics, Quantum Theory, and Cryptography Pro…
Comment Share
TSUYOSHI, TakagiMASATO, WakayamaKEISUKE, TanakaNOBORU, Kunihiro

This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction mod…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Transactions on Data Hiding and Multimedia Security X
Comment Share
SHI, Yun Q.

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development …

Edition
-
ISBN/ISSN
978-3-662-46739-8
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA C…
Comment Share
NYBERG, Kaisa

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based enc…

Edition
-
ISBN/ISSN
978-3-319-16715-2
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Timing Channels in Cryptography A Micro-Architectural Perspective
Comment Share
REBEIRO, ChesterMUKHOPADHYAY, DebdeepBHATTACHANYA, Sarani

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms …

Edition
-
ISBN/ISSN
978-3-319-12370-7
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Applied Number Theory
Comment Share
Niederreiter, HaraldWINTERHOF, Arne

This textbook effectively builds a bridge from basic number theory to recent advances in applied number theory. It presents the first unified account of the four major areas of application where number theory plays a fundamental role, namely cryptography, coding theory, quasi-Monte Carlo methods, and pseudorandom number generation, allowing the authors to delineate the manifold links and interr…

Edition
Ed. 1
ISBN/ISSN
978-3-319-22321-6
Collation
X, 442
Series Title
-
Call Number
512.7 NIE a
Availability0
Add to basket
MARC DownloadCite
cover
Theory and Applications of Models of Computation 12th Annual Conference, TAM…
Comment Share
JAIN, RahulJAIN, SanjaySTEPHAN, Frank

This book constitutes the refereed proceedings of the 12th Annual Conference on Theory and Applications of Models of Computation, TAMC 2014, held in Singapore, in May 2015. The 35 revised full papers presented were carefully reviewed and selected from 78 submissions. The papers treat all topics relating to the theory and applications of models computation, for example recursion theory and mathe…

Edition
-
ISBN/ISSN
978-3-319-17142-5
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Number Theory: An Introduction via the Density of Primes
Comment Share
FINE, BenjaminROSENBERGER, Gerhard

Now in its second edition, this textbook provides an introduction and overview of number theory based on the density and properties of the prime numbers. This unique approach offers both a firm background in the standard material of number theory, as well as an overview of the entire discipline. All of the essential topics are covered, such as the fundamental theorem of arithmetic, theory of co…

Edition
2
ISBN/ISSN
978-3-319-43873-3
Collation
XIII, 413
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Analytic Number Theory: In Honor of Helmut Maier’s 60th Birthday
Comment Share
POMERANCE, CarlRASSIAS, Michael Th.

This volume contains a collection of research and survey papers written by some of the most eminent mathematicians in the international community and is dedicated to Helmut Maier, whose own research has been groundbreaking and deeply influential to the field. Specific emphasis is given to topics regarding exponential and trigonometric sums and their behavior in short intervals, anatomy of inte…

Edition
Ed. 1
ISBN/ISSN
978-3-319-22240-0
Collation
VIII, 379
Series Title
-
Call Number
519.4 ANA a
Availability0
Add to basket
MARC DownloadCite
cover
Zhang Functions and Various Models
Comment Share
ZHANG, YunongGUO, Dongsheng

This book focuses on solving different types of time-varying problems. It presents various Zhang dynamics (ZD) models by defining various Zhang functions (ZFs) in real and complex domains. It then provides theoretical analyses of such ZD models and illustrates their results. It also uses simulations to substantiate their efficacy and show the feasibility of the presented ZD approach (i.e., diff…

Edition
-
ISBN/ISSN
978-3-662-47334-4
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Why Cryptography Should Not Rely on Physical Attack Complexity
Comment Share
KRAMER, Juliane

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…

Edition
-
ISBN/ISSN
978-981-287-787-1
Collation
XXI, 122
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?