OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 53 from your keywords: subject="Information theory"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Tu…
Comment Share
LEANDER, Gregor

This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementatio…

Edition
-
ISBN/ISSN
978-3-662-48116-5
Collation
XI, 600
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, …
Comment Share
CID, CarlosRECHBERGER, Christian

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theor…

Edition
-
ISBN/ISSN
978-3-662-46706-0
Collation
XI, 636
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Visual Cryptography for Image Processing and Security Theory, Methods, and A…
Comment Share
LIU, FengYAN, Wei Qi

This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with ne…

Edition
-
ISBN/ISSN
978-3-319-23473-1
Collation
XVI, 167
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Ubiquitous Computing Application and Wireless Sensor UCAWSN-14
Comment Share
PARK, James J. (Jong Hyuk)PAN, YiCHAO, Han-Chieh

IT changes everyday’s life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its spe…

Edition
-
ISBN/ISSN
978-94-017-9618-7
Collation
281 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Advanced Concepts for Intelligent Vision Systems: 16th International Conferen…
Comment Share
BATTIATO, Sebastiano

This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2015, held Catania, Italy, in October 2015. The 76 revised full papers were carefully selected from 129 submissions. Acivs 2015 is a conference focusing on techniques for building adaptive, intelligent, safe and secure imaging systems. The f…

Edition
Ed. 1
ISBN/ISSN
978-3-319-25902-4
Collation
XXI, 897
Series Title
Lecture Notes in Computer Science
Call Number
003.54 ADV a
Availability0
Add to basket
MARC DownloadCite
cover
Evolution of Cyber Technologies and Operations to 2035
Comment Share
BLOWERS, Misty

This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serv…

Edition
-
ISBN/ISSN
978-3-319-23585-1
Collation
4 b/w illustrations, 7 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Transactions on Data Hiding and Multimedia Security X
Comment Share
SHI, Yun Q.

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development …

Edition
1
ISBN/ISSN
978-3-662-46738-1
Collation
IX, 107
Series Title
Lecture Notes in Computer Science
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Big Data in Context : Legal, Social and Technological Insights
Comment Share
Hoeren, ThomasKolany-Raiser, Barbara

This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, sociological and economic approaches to fundamental big data topics such as privacy, data quality and the ECJ’s Safe Harbor decision on the one hand, and practical applications such as smart cars, wearables and web tracking on the other. Addressing the interests of research…

Edition
-
ISBN/ISSN
9783319624617
Collation
-
Series Title
Springer Briefs in Law
Call Number
005.74 BIG
Availability0
Add to basket
MARC DownloadCite
cover
Timing Channels in Cryptography
Comment Share
REBEIRO, ChesterMUKHOPADHYAY, DebdeepBHATTACHARYA, Sarani

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms …

Edition
-
ISBN/ISSN
978-3-319-12370-7
Collation
61 b/w illustrations, 14 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Energy Time Series Forecasting Efficient and Accurate Forecasting of Evolvin…
Comment Share
DANNECKER, Lars

Lars Dannecker developed a novel online forecasting process that significantly improves how forecasts are calculated. It increases forecasting efficiency and accuracy, as well as allowing the process to adapt to different situations and applications. Improving the forecasting efficiency is a key pre-requisite for ensuring stable electricity grids in the face of an increasing amount of renewable…

Edition
-
ISBN/ISSN
978-3-658-11039-0
Collation
73 b/w illustrations, 19 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?