Search Results - "cryptographer"
Suggested Topics within your search.
Suggested Topics within your search.
- Communications Engineering, Networks 14
- Telecommunication 14
- Computational Intelligence 12
- Computational intelligence 12
- Data and Information Security 8
- Data protection 8
- Cryptography 6
- Cryptology 6
- Data encryption (Computer science) 6
- Electronic Circuits and Systems 6
- Electronic circuits 6
- Signal processing 6
- Signal, Speech and Image Processing 6
- Artificial Intelligence 5
- Artificial intelligence 5
- Computer architecture 4
- Microprocessors 4
- Processor Architectures 4
- Computer Communication Networks 3
- Computer networks 3
- Information theory 3
- Mobile communication systems 3
- Wireless and Mobile Communication 3
- Wireless communication systems 3
- Algorithms 2
- Big Data 2
- Big data 2
- Data Mining and Knowledge Discovery 2
- Data Structures and Information Theory 2
- Data mining 2
-
1
Reconfigurable Cryptographic Processor
Published Springer Nature Singapore : Imprint: Springer, 2018.Table of Contents: “…Introduction -- Analysis of Reconfigurability of Cryptographic Algorithms -- Hardware Architecture -- Compilation Techniques -- Case Studies in Design -- Countermeasures against Physical Attacks -- Perspective: Application Trends.…”
Full-text access
e-Book -
2
Automated Methods in Cryptographic Fault Analysis
Published Springer International Publishing : Imprint: Springer, 2019.Table of Contents: “…Automatic construction of fault attacks on cryptographic hardware implementations -- Part II. Automated Design and Deployment of Fault Countermeasures -- Chapter 7. …”
Full-text access
e-Book -
3
Domain Specific High-Level Synthesis for Cryptographic Workloads
Published Springer Nature Singapore : Imprint: Springer, 2019.Full-text access
e-Book -
4
-
5
Variant Construction from Theoretical Foundation to Applications
Published Springer Nature Singapore : Imprint: Springer, 2019.Table of Contents: “…Introduction -- Variant Logic -- Variant Measurement -- Variant Map -- Variation with Global Functions -- Variant Stream Ciphers -- Quantum Interferences -- Classical/Quantum Cryptographic Sequences -- Whole DNA Sequences -- Multiple Valued Pulse Sequences -- Conclusion -- Bibliography -- Index.…”
Full-text access
e-Book -
6
Advances in Information and Communication Technologies Processing and Control in Information and Communication Systems /
Published Springer International Publishing : Imprint: Springer, 2019.Table of Contents: “…Internet of Things: Future Telecommunication -- Cryptographic Technology Blockchain and its Applications -- Model of transdisciplinary representation of GEOspatial information -- Quality control for mobile communication management services in a hybrid environment -- Improved Estimates for the Reliability Indicators of Information and Communication Network Objects with Limited Source Information.…”
Full-text access
e-Book -
7
Multi-photon Quantum Secure Communication
Published Springer Nature Singapore : Imprint: Springer, 2019.Table of Contents: “…Introduction to Classical Cryptography -- Contemporary Quantum Key Distribution Techniques -- The Y-00 Protocol -- Multi-stage Multi-Photon Techniques in Cryptography -- Variations of Multi-Photon Protocols -- Multi-stage Multi-Photon Techniques in Wireless Communication -- Cryptographic strength of Multi-Photon Techniques -- Intrusion Detection System using the Polarization Channel -- Secure Key Transfer Using the Polarization Channel. .…”
Full-text access
e-Book -
8
Advanced Multimedia and Ubiquitous Engineering Future Information Technology Volume 2 /
Published Springer Berlin Heidelberg : Imprint: Springer, 2016.Table of Contents: “…From the Contents: The study on the detection of the damaged file using the graph of the information entropy for Security Management -- Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications -- A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds -- A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-based Formal Analysis.…”
Full-text access
e-Book -
9
Physically Unclonable Functions From Basic Design Principles to Advanced Hardware Security Applications /
Published Springer International Publishing : Imprint: Springer, 2018.Table of Contents: “…A Primer on Cryptographic Primitives and Security Attacks -- Physically Unclonable Functions: Design Principles and Evaluation Metrics -- Reliability Challenges of Silicon-Based Physically Unclonable Functions -- Reliability Enhancement Techniques for Physically Unclonable Functions -- Security Attacks on Physically Unclonable Functions and Possible Countermeasures -- Hardware-based Security Applications of Physically Unclonable Functions -- Appendix 1 -- Appendix 2 -- Appendix 3.…”
Full-text access
e-Book -
10
Secure Image Transmission in Wireless Sensor Network (WSN) Applications
Published Springer International Publishing : Imprint: Springer, 2019.Table of Contents: “…Introduction -- An Optimal Light Weight Cryptography - SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight RECTANGLE Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Haar Wavelet with Light Weight Cryptography based Secret Data Hiding on Digital Images in Wireless Sensor Networks.…”
Full-text access
e-Book -
11
Modeling and Simulation in HPC and Cloud Systems
Published Springer International Publishing : Imprint: Springer, 2018.Table of Contents: “…Evaluating Distributed Systems and Applications through Accurate Models and Simulations -- Scheduling Data-Intensive Workloads in Large-Scale Distributed Systems: Trends and Challenges -- Design Patterns and Algorithmic Skeletons: A Brief Concordance -- Evaluation of Cloud Systems -- Science Gateways in HPC: Usability meets Efficiency and Effectiveness -- MobEmu: A Framework to Support Decentralized Ad-Hoc Networking -- Virtualisation Model For Processing of the Sensitive Mobile Data -- Analysis of selected cryptographic services for processing batch tasks in Cloud Computing systems.…”
Full-text access
e-Book -
12
Information and Communication Technology for Intelligent Systems Proceedings of ICTIS 2018, Volume 1 /
Published Springer Nature Singapore : Imprint: Springer, 2019.Table of Contents: “…Semantic Segmentation using Deep learning for Brain Tumor MRI via Fully Convolution Neural Networks -- An Efficient Cryptographic Mechanism to Defend Collaborative Attack against DSR Protocol in Mobile Adhoc Networks -- Materialized Queries with Incremental Updates -- Traffic Signal Automation through IoT by Sensing and Detecting Traffic Intensity through IR sensors -- Performance Evaluation of Various Data Mining Algorithms on Road Traffic Accident Dataset -- Classification of Blood Cancer and form associated Gene networks using Gene Expression Profiles -- Stock Market Decision Making Model based on spline approximation using minimax criterion.…”
Full-text access
e-Book -
13
Proceedings of International Ethical Hacking Conference 2018 eHaCON 2018, Kolkata, India /
Published Springer Nature Singapore : Imprint: Springer, 2019.Table of Contents: “…Chapter 1.Social Engineering Attack Detection and Data Protection Model (SEADDPM) -- Chapter 2.OnlineKALI: Online Vulnerability Scanner -- Chapter 3.Towards an AI-Chatbot driven Advanced Digital Locker -- Chapter 4.A hybrid task scheduling algorithm for efficient task management in multi cloud environment -- Chapter 5.An Enhanced Post Migration Algorithm for Dynamic Load Balancing in Cloud Computing Environment -- Chapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment -- Chapter 7.Bi-Symmetric Key Exchange: A Novel Cryptographic Key Exchanging Algorithm -- Chapter 8.DNA Cryptography Based Secured Weather Prediction Model in High Performance Computing -- Chapter 9.A Novel Approach of Image Steganography with Encoding and Location Selection -- Chapter 10.Image Encryption using Pseudorandom Permutation.-..etc.…”
Full-text access
e-Book -
14
International Conference on Intelligent Computing and Applications Proceedings of ICICA 2018 /
Published Springer Nature Singapore : Imprint: Springer, 2019.Table of Contents: “…Strength and Swelling Characteristics of Expansive Soils Treated with Calcium Carbide Residue -- Studies on Properties of Concrete Using Crumb Rubber as Fine Aggregate -- Use of Textile Effluent Treatment Plant Sludge as Sustainable Material in Brick Manufacturing -- A novel IDS to Detect Multiple DoS Attacks with Network Lifetime Estimation Based on Learning Based Energy Prediction Algorithm for Hierarchical WSN -- Ensuring Security in Sharing of Information Using Cryptographic Technique -- Efficient Collaborative Key Management Protocol for Secure Mobile Cloud Data Storage -- Identification of FrontoTemporal Dementia Using Neural Network -- Cardiac Failure Detection Using Neural Network Model with Dual Tree Complex Wavelet Transform -- Feature Extraction through Segmentation of Retinal Layers in SDOCT Images for the Assessment of Diabetic Retinopathy -- QR Code Based Highly Secure ECG Steganography -- Modified Shunt Active Line Conditioner Using Enhanced Self-restoring Technique with Step SizeError Elimination Algorithm.…”
Full-text access
e-Book -
15
Hardware IP Security and Trust
Published Springer International Publishing : Imprint: Springer, 2017.Table of Contents: “…Introduction -- Chapter 1.Security and Trust Vulnerabilities in Third-party IPs -- PArt II.Trust Analysis -- Chapter 2.Security Rule Check -- Chapter 3.Digital Circuit Vulnerabilities to Hardware Trojans -- Chapter 4.Code Coverage Analysis for IP Trust Verification -- Chapter 5.Analyzing Circuit Layout to Probing Attack -- Chapter 6.Testing of Side Channel Leakage of Cryptographic IPs: Metrics and Evaluations -- Part III -- Effective Countermeasures -- Chapter 7.Hardware Hardening Approaches using Camouflaging, Encryption and Obfuscation -- Chapter 8.A Novel Mutating Runtime Architecture for Embedding Multiple Countermeasures Against Passive Side Channel Attacks -- Part IV -- Chapter 9.Validation of IP Security and Trust -- Chapter 10.IP Trust Validation using Proof-carrying Hardware -- Chapter 11. …”
Full-text access
e-Book -
16
Intelligent Techniques in Signal Processing for Multimedia Security
Published Springer International Publishing : Imprint: Springer, 2017.Table of Contents: “…Security of Multimedia Contents: A Brief -- A Survey on Intelligent Security Techniques for High Definition Multimedia Data -- Intelligent Morphing and Steganography Techniques for Multimedia Security -- Information Hiding: Steganography -- Digital Watermarking: A Potential Solution For Multimedia Authentication -- Real Time Implementation of Reversible Watermarking -- Comparative Approach between Singular Value Decomposition and Randomized Singular Value Decomposition based watermarking -- Biometric Based Security System: Issues and Challenges -- Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in Wireless Communication Network -- Hand Image based Personal Authentication System -- A Study on Security and Surveillance System using Gait Recognition -- Face Recognition under Dry and Wet Face Conditions -- Improved Approach for 3D Face Characterization -- Attendance Recording System using Partial Face Recognition Algorithm -- Automatic Human Emotion Recognition in Surveillance Video -- Watermarking in Bio-medical Signal Processing -- Pixel Repetition Technique: A high capacity and reversible data hiding method for e-healthcare applications -- A New method of Haar and Db10 based Secured Compressed Data Transmission over GSM Voice Channel -- StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection -- Adaptive Color Image Watermarking Scheme Using Weibull Distribution -- Multi-Fingerprint Unimodel based Biometric Authentication Supporting Cloud Computing.…”
Full-text access
e-Book -
17
Proceedings of the Third International Scientific Conference "Intelligent Information Technologies for Industry" (IITI'18) Volume 2 /
Published Springer International Publishing : Imprint: Springer, 2019.Table of Contents: “…Computer-Aided Event Tree Synthesis on the Basis of Case-Based Reasoning -- Security of Information Processes in Supply Chains -- External consistency maintenance algorithm for chain and stellate structures of algebraic Bayesian networks: statistical experiments for running time analysis -- Perspectives of Fast Clustering Techniques -- Impact of Security Aspects at the IOTA protocol -- Cryptographic Protocol Security Verification Of The Electronic Voting System Based On Blinded Intermediaries -- Learning Bayesian Network Structure for Risky Behavior Modelling -- On continuous user authentication via hidden free-text based monitoring -- Synthesis and Learning of Socially Significant Behavior Model with Hidden Variables -- Adaptation of the nonlinear stochastic filter on the basis of irregular exact measurements -- Visual analysis of information dissemination channels in social network for protection against inappropriate content -- The problem of the anomaly detection in time series collections for dynamic objects -- Prediction and Detection of User Emotions Based on Neuro-Fuzzy Neural Networks in Social Networks -- Deep Learning in Vehicle Pose Recognition on Two-Dimensional Images -- Feature extraction of high-frequency patterns with the a priori unknown parameters in noised electrograms using spectral entropy -- Results of using neural networks to automatically creation musical compositions based on color image -- Intelligent integrated system for computer-aided design and complex technical objects' training -- Methods of Conceptual Modeling of Intelligent Decision Support Systems for Managing Complex Objects at All Stages of Its Life Cycle -- About the integration of learning and decision-making models in intelligent systems of real-time -- Intelligent planning and control of integrated expert system construction.…”
Full-text access
e-Book -
18
2nd International Conference on Wireless Intelligent and Distributed Environment for Communication WIDECOM 2019 /
Published Springer International Publishing : Imprint: Springer, 2019.Table of Contents: “…Cyclic Redundancy Check based Data Authentication in Opportunistic Networks -- Chapter 3. Hybrid Cryptographic Based Approach for Privacy Preservation in Location Based Services -- Chapter 4. …”
Full-text access
e-Book -
19
Advanced Computing and Systems for Security Volume 1 /
Published Springer India : Imprint: Springer, 2016.Table of Contents: “…Light-Weighted DNA Based Cryptographic Mechanism against Chosen Cipher Text Attacks -- Chapter 10. …”
Full-text access
e-Book -
20
VLSI Design: Circuits, Systems and Applications Select Proceedings of ICNETS2, Volume V /
Published Springer Nature Singapore : Imprint: Springer, 2018.Table of Contents: “…Front-End CMOS Circuit for Low Power Consumption -- A Preliminary Study of Oscillators, Phase and Frequency Detector and Charge Pump for Phase Locked Loop (PLL) Applications -- All Digital RF Transmitter with Highly Power Efficient Doherty Power Amplifier -- Adiabatic Techniques for Energy Efficient Barrel Shifter Design -- A 79Ghz CMOS LNA with Adaptive Biasing -- X-Band Phased-Array Transmitter in 180nm Sige Bicmos Technology with Stacked Power Amplifier -- Short Range Low Data Rate Pulsed UWB Transmitter -- A New High Speed Multiplier Based on Carry Look Ahead Adder and Compressor -- Real-Time Automatic Peaks and Onsets Detection of Photoplethysmographic Signals -- Survey on Design of Low Power CMOS Four Quadrant Analog Multiplier in Nano-Meter Scaling -- Designing 5t Embedded Dram Cell for Ultra Low Power Low Voltage Applications Based on Schmitt Trigger -- Design and Implementation of Multi-Bit Self-Checking Carry-Select Adder -- A Novel Adiabatic Logic for Low Power VLSI Circuit Design and Power Optimization Using Finfet -- Test Signal Generation for Detecting Faults On Mil-Std 1553 Bus -- Design of Ultra Low Voltage- Energy Efficient Hybrid Full Adder Circuit -- Mtcmos Based Soft Start Circuit for Low Leakage Led Driver with Minimum In-Rush Current -- Implementation of Dual-Hysteresis Mode Flip-Flop Multivibrator Using Differential Voltage Current Conveyor -- High Performance Domino Logic Circuit Design By Contention Reduction -- Differential Power Analysis (Dpa) Resistant Cryptographic S-Box -- Implementation of Radix-2 Butterfly Using Distributed Arithmatic Algorithm (Daa) -- An Area Efficient Design of Warped Filters -- Design of Arithmetic and Logical Unit (Alu) Using Subthreshold Adiabatic Logic for Low Power Application -- Design of Sample and Hold for High Speed Analog To Digital Converter -- Fpga Masked S-Box Implementation for Aes Engine -- Pipelined and Parallel Architecture of Reversible Watermarking for Grayscale Images -- Design and Verification of Amba Axi3 Protocol -- Design of Multi-Stage Cmos Ota for Low-Power and High Driving Capability.…”
Full-text access
e-Book