Search Results - "cryptographer"

Refine Results
  1. 1

    Reconfigurable Cryptographic Processor by Liu, Leibo, Wang, Bo, Wei, Shaojun

    Published Springer Nature Singapore : Imprint: Springer, 2018.
    Table of Contents: “…Introduction -- Analysis of Reconfigurability of Cryptographic Algorithms -- Hardware Architecture -- Compilation Techniques -- Case Studies in Design -- Countermeasures against Physical Attacks -- Perspective: Application Trends.…”
    Full-text access
    e-Book
  2. 2

    Automated Methods in Cryptographic Fault Analysis

    Published Springer International Publishing : Imprint: Springer, 2019.
    Table of Contents: “…Automatic construction of fault attacks on cryptographic hardware implementations -- Part II. Automated Design and Deployment of Fault Countermeasures -- Chapter 7. …”
    Full-text access
    e-Book
  3. 3

    Domain Specific High-Level Synthesis for Cryptographic Workloads by Khalid, Ayesha, Paul, Goutam, Chattopadhyay, Anupam

    Published Springer Nature Singapore : Imprint: Springer, 2019.
    Full-text access
    e-Book
  4. 4

    Kayıp sembol / by Brown, Dan

    Published Altın Kitaplar, 2009.
    Subjects:
    Book
  5. 5

    Variant Construction from Theoretical Foundation to Applications

    Published Springer Nature Singapore : Imprint: Springer, 2019.
    Table of Contents: “…Introduction -- Variant Logic -- Variant Measurement -- Variant Map -- Variation with Global Functions -- Variant Stream Ciphers -- Quantum Interferences -- Classical/Quantum Cryptographic Sequences -- Whole DNA Sequences -- Multiple Valued Pulse Sequences -- Conclusion -- Bibliography -- Index.…”
    Full-text access
    e-Book
  6. 6

    Advances in Information and Communication Technologies Processing and Control in Information and Communication Systems /

    Published Springer International Publishing : Imprint: Springer, 2019.
    Table of Contents: “…Internet of Things: Future Telecommunication -- Cryptographic Technology Blockchain and its Applications -- Model of transdisciplinary representation of GEOspatial information -- Quality control for mobile communication management services in a hybrid environment -- Improved Estimates for the Reliability Indicators of Information and Communication Network Objects with Limited Source Information.…”
    Full-text access
    e-Book
  7. 7

    Multi-photon Quantum Secure Communication by Verma, Pramode K., El Rifai, Mayssaa, Chan, Kam Wai Clifford

    Published Springer Nature Singapore : Imprint: Springer, 2019.
    Table of Contents: “…Introduction to Classical Cryptography -- Contemporary Quantum Key Distribution Techniques -- The Y-00 Protocol -- Multi-stage Multi-Photon Techniques in Cryptography -- Variations of Multi-Photon Protocols -- Multi-stage Multi-Photon Techniques in Wireless Communication -- Cryptographic strength of Multi-Photon Techniques -- Intrusion Detection System using the Polarization Channel -- Secure Key Transfer Using the Polarization Channel. .…”
    Full-text access
    e-Book
  8. 8

    Advanced Multimedia and Ubiquitous Engineering Future Information Technology Volume 2 /

    Published Springer Berlin Heidelberg : Imprint: Springer, 2016.
    Table of Contents: “…From the Contents: The study on the detection of the damaged file using the graph of the information entropy for Security Management -- Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications -- A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds -- A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-based Formal Analysis.…”
    Full-text access
    e-Book
  9. 9

    Physically Unclonable Functions From Basic Design Principles to Advanced Hardware Security Applications / by Halak, Basel

    Published Springer International Publishing : Imprint: Springer, 2018.
    Table of Contents: “…A Primer on Cryptographic Primitives and Security Attacks -- Physically Unclonable Functions: Design Principles and Evaluation Metrics -- Reliability Challenges of Silicon-Based Physically Unclonable Functions -- Reliability Enhancement Techniques for Physically Unclonable Functions -- Security Attacks on Physically Unclonable Functions and Possible Countermeasures -- Hardware-based Security Applications of Physically Unclonable Functions -- Appendix 1 -- Appendix 2 -- Appendix 3.…”
    Full-text access
    e-Book
  10. 10

    Secure Image Transmission in Wireless Sensor Network (WSN) Applications by Shankar, K., Elhoseny, Mohamed

    Published Springer International Publishing : Imprint: Springer, 2019.
    Table of Contents: “…Introduction -- An Optimal Light Weight Cryptography - SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight RECTANGLE Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Haar Wavelet with Light Weight Cryptography based Secret Data Hiding on Digital Images in Wireless Sensor Networks.…”
    Full-text access
    e-Book
  11. 11

    Modeling and Simulation in HPC and Cloud Systems

    Published Springer International Publishing : Imprint: Springer, 2018.
    Table of Contents: “…Evaluating Distributed Systems and Applications through Accurate Models and Simulations -- Scheduling Data-Intensive Workloads in Large-Scale Distributed Systems: Trends and Challenges -- Design Patterns and Algorithmic Skeletons: A Brief Concordance -- Evaluation of Cloud Systems -- Science Gateways in HPC: Usability meets Efficiency and Effectiveness -- MobEmu: A Framework to Support Decentralized Ad-Hoc Networking -- Virtualisation Model For Processing of the Sensitive Mobile Data -- Analysis of selected cryptographic services for processing batch tasks in Cloud Computing systems.…”
    Full-text access
    e-Book
  12. 12

    Information and Communication Technology for Intelligent Systems Proceedings of ICTIS 2018, Volume 1 /

    Published Springer Nature Singapore : Imprint: Springer, 2019.
    Table of Contents: “…Semantic Segmentation using Deep learning for Brain Tumor MRI via Fully Convolution Neural Networks -- An Efficient Cryptographic Mechanism to Defend Collaborative Attack against DSR Protocol in Mobile Adhoc Networks -- Materialized Queries with Incremental Updates -- Traffic Signal Automation through IoT by Sensing and Detecting Traffic Intensity through IR sensors -- Performance Evaluation of Various Data Mining Algorithms on Road Traffic Accident Dataset -- Classification of Blood Cancer and form associated Gene networks using Gene Expression Profiles -- Stock Market Decision Making Model based on spline approximation using minimax criterion.…”
    Full-text access
    e-Book
  13. 13

    Proceedings of International Ethical Hacking Conference 2018 eHaCON 2018, Kolkata, India /

    Published Springer Nature Singapore : Imprint: Springer, 2019.
    Table of Contents: “…Chapter 1.Social Engineering Attack Detection and Data Protection Model (SEADDPM) -- Chapter 2.OnlineKALI: Online Vulnerability Scanner -- Chapter 3.Towards an AI-Chatbot driven Advanced Digital Locker -- Chapter 4.A hybrid task scheduling algorithm for efficient task management in multi cloud environment -- Chapter 5.An Enhanced Post Migration Algorithm for Dynamic Load Balancing in Cloud Computing Environment -- Chapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment -- Chapter 7.Bi-Symmetric Key Exchange: A Novel Cryptographic Key Exchanging Algorithm -- Chapter 8.DNA Cryptography Based Secured Weather Prediction Model in High Performance Computing -- Chapter 9.A Novel Approach of Image Steganography with Encoding and Location Selection -- Chapter 10.Image Encryption using Pseudorandom Permutation.-..etc.…”
    Full-text access
    e-Book
  14. 14

    International Conference on Intelligent Computing and Applications Proceedings of ICICA 2018 /

    Published Springer Nature Singapore : Imprint: Springer, 2019.
    Table of Contents: “…Strength and Swelling Characteristics of Expansive Soils Treated with Calcium Carbide Residue -- Studies on Properties of Concrete Using Crumb Rubber as Fine Aggregate -- Use of Textile Effluent Treatment Plant Sludge as Sustainable Material in Brick Manufacturing -- A novel IDS to Detect Multiple DoS Attacks with Network Lifetime Estimation Based on Learning Based Energy Prediction Algorithm for Hierarchical WSN -- Ensuring Security in Sharing of Information Using Cryptographic Technique -- Efficient Collaborative Key Management Protocol for Secure Mobile Cloud Data Storage -- Identification of FrontoTemporal Dementia Using Neural Network -- Cardiac Failure Detection Using Neural Network Model with Dual Tree Complex Wavelet Transform -- Feature Extraction through Segmentation of Retinal Layers in SDOCT Images for the Assessment of Diabetic Retinopathy -- QR Code Based Highly Secure ECG Steganography -- Modified Shunt Active Line Conditioner Using Enhanced Self-restoring Technique with Step SizeError Elimination Algorithm.…”
    Full-text access
    e-Book
  15. 15

    Hardware IP Security and Trust

    Published Springer International Publishing : Imprint: Springer, 2017.
    Table of Contents: “…Introduction -- Chapter 1.Security and Trust Vulnerabilities in Third-party IPs -- PArt II.Trust Analysis -- Chapter 2.Security Rule Check -- Chapter 3.Digital Circuit Vulnerabilities to Hardware Trojans -- Chapter 4.Code Coverage Analysis for IP Trust Verification -- Chapter 5.Analyzing Circuit Layout to Probing Attack -- Chapter 6.Testing of Side Channel Leakage of Cryptographic IPs: Metrics and Evaluations -- Part III -- Effective Countermeasures -- Chapter 7.Hardware Hardening Approaches using Camouflaging, Encryption and Obfuscation -- Chapter 8.A Novel Mutating Runtime Architecture for Embedding Multiple Countermeasures Against Passive Side Channel Attacks -- Part IV -- Chapter 9.Validation of IP Security and Trust -- Chapter 10.IP Trust Validation using Proof-carrying Hardware -- Chapter 11. …”
    Full-text access
    e-Book
  16. 16

    Intelligent Techniques in Signal Processing for Multimedia Security

    Published Springer International Publishing : Imprint: Springer, 2017.
    Table of Contents: “…Security of Multimedia Contents: A Brief -- A Survey on Intelligent Security Techniques for High Definition Multimedia Data -- Intelligent Morphing and Steganography Techniques for Multimedia Security -- Information Hiding: Steganography -- Digital Watermarking: A Potential Solution For Multimedia Authentication -- Real Time Implementation of Reversible Watermarking -- Comparative Approach between Singular Value Decomposition and Randomized Singular Value Decomposition based watermarking -- Biometric Based Security System: Issues and Challenges -- Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in Wireless Communication Network -- Hand Image based Personal Authentication System -- A Study on Security and Surveillance System using Gait Recognition -- Face Recognition under Dry and Wet Face Conditions -- Improved Approach for 3D Face Characterization -- Attendance Recording System using Partial Face Recognition Algorithm -- Automatic Human Emotion Recognition in Surveillance Video -- Watermarking in Bio-medical Signal Processing -- Pixel Repetition Technique: A high capacity and reversible data hiding method for e-healthcare applications -- A New method of Haar and Db10 based Secured Compressed Data Transmission over GSM Voice Channel -- StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection -- Adaptive Color Image Watermarking Scheme Using Weibull Distribution -- Multi-Fingerprint Unimodel based Biometric Authentication Supporting Cloud Computing.…”
    Full-text access
    e-Book
  17. 17

    Proceedings of the Third International Scientific Conference "Intelligent Information Technologies for Industry" (IITI'18) Volume 2 /

    Published Springer International Publishing : Imprint: Springer, 2019.
    Table of Contents: “…Computer-Aided Event Tree Synthesis on the Basis of Case-Based Reasoning -- Security of Information Processes in Supply Chains -- External consistency maintenance algorithm for chain and stellate structures of algebraic Bayesian networks: statistical experiments for running time analysis -- Perspectives of Fast Clustering Techniques -- Impact of Security Aspects at the IOTA protocol -- Cryptographic Protocol Security Verification Of The Electronic Voting System Based On Blinded Intermediaries -- Learning Bayesian Network Structure for Risky Behavior Modelling -- On continuous user authentication via hidden free-text based monitoring -- Synthesis and Learning of Socially Significant Behavior Model with Hidden Variables -- Adaptation of the nonlinear stochastic filter on the basis of irregular exact measurements -- Visual analysis of information dissemination channels in social network for protection against inappropriate content -- The problem of the anomaly detection in time series collections for dynamic objects -- Prediction and Detection of User Emotions Based on Neuro-Fuzzy Neural Networks in Social Networks -- Deep Learning in Vehicle Pose Recognition on Two-Dimensional Images -- Feature extraction of high-frequency patterns with the a priori unknown parameters in noised electrograms using spectral entropy -- Results of using neural networks to automatically creation musical compositions based on color image -- Intelligent integrated system for computer-aided design and complex technical objects' training -- Methods of Conceptual Modeling of Intelligent Decision Support Systems for Managing Complex Objects at All Stages of Its Life Cycle -- About the integration of learning and decision-making models in intelligent systems of real-time -- Intelligent planning and control of integrated expert system construction.…”
    Full-text access
    e-Book
  18. 18

    2nd International Conference on Wireless Intelligent and Distributed Environment for Communication WIDECOM 2019 /

    Published Springer International Publishing : Imprint: Springer, 2019.
    Table of Contents: “…Cyclic Redundancy Check based Data Authentication in Opportunistic Networks -- Chapter 3. Hybrid Cryptographic Based Approach for Privacy Preservation in Location Based Services -- Chapter 4. …”
    Full-text access
    e-Book
  19. 19

    Advanced Computing and Systems for Security Volume 1 /

    Published Springer India : Imprint: Springer, 2016.
    Table of Contents: “…Light-Weighted DNA Based Cryptographic Mechanism against Chosen Cipher Text Attacks -- Chapter 10. …”
    Full-text access
    e-Book
  20. 20

    VLSI Design: Circuits, Systems and Applications Select Proceedings of ICNETS2, Volume V /

    Published Springer Nature Singapore : Imprint: Springer, 2018.
    Table of Contents: “…Front-End CMOS Circuit for Low Power Consumption -- A Preliminary Study of Oscillators, Phase and Frequency Detector and Charge Pump for Phase Locked Loop (PLL) Applications -- All Digital RF Transmitter with Highly Power Efficient Doherty Power Amplifier -- Adiabatic Techniques for Energy Efficient Barrel Shifter Design -- A 79Ghz CMOS LNA with Adaptive Biasing -- X-Band Phased-Array Transmitter in 180nm Sige Bicmos Technology with Stacked Power Amplifier -- Short Range Low Data Rate Pulsed UWB Transmitter -- A New High Speed Multiplier Based on Carry Look Ahead Adder and Compressor -- Real-Time Automatic Peaks and Onsets Detection of Photoplethysmographic Signals -- Survey on Design of Low Power CMOS Four Quadrant Analog Multiplier in Nano-Meter Scaling -- Designing 5t Embedded Dram Cell for Ultra Low Power Low Voltage Applications Based on Schmitt Trigger -- Design and Implementation of Multi-Bit Self-Checking Carry-Select Adder -- A Novel Adiabatic Logic for Low Power VLSI Circuit Design and Power Optimization Using Finfet -- Test Signal Generation for Detecting Faults On Mil-Std 1553 Bus -- Design of Ultra Low Voltage- Energy Efficient Hybrid Full Adder Circuit -- Mtcmos Based Soft Start Circuit for Low Leakage Led Driver with Minimum In-Rush Current -- Implementation of Dual-Hysteresis Mode Flip-Flop Multivibrator    Using Differential Voltage Current Conveyor -- High Performance Domino Logic Circuit Design By Contention Reduction -- Differential Power Analysis (Dpa) Resistant Cryptographic S-Box -- Implementation of Radix-2 Butterfly Using Distributed Arithmatic Algorithm (Daa) -- An Area Efficient Design of Warped Filters -- Design of Arithmetic and Logical Unit (Alu) Using Subthreshold Adiabatic Logic for Low Power Application -- Design of Sample and Hold for High Speed Analog To Digital Converter -- Fpga Masked S-Box Implementation for Aes Engine -- Pipelined and Parallel Architecture of Reversible Watermarking for Grayscale Images -- Design and Verification of Amba Axi3 Protocol -- Design of Multi-Stage Cmos Ota for Low-Power and High Driving Capability.…”
    Full-text access
    e-Book