E-Business and Telecommunications
Springer International Publishing (Verlag)
978-3-030-90427-2 (ISBN)
An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems.- Security and Complexity of a New Variant of the McEliece Cryptosystem using Non-linear Convolutional Codes.- A Secure Distributed Hash-Based Encryption suited for Big Data Systems.- An Assurance Framework and Process for Hybrid Systems.- PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE.- Practically Efficient Attribute-based Encryption for Compartmented and Multilevel Access Structures.- Analysis of In-place Randomized Bit-flipping Decoders for the Design of LDPC and MDPC Code-based Cryptosystems.- Business Analyst Tasks for Requirement Elicitation.- Chained Transaction Protocol Automated Verification using Cl-AtSe.- Overall Feasibility of RF Energy Harvesting for IoT.
| Erscheinungsdatum | 02.11.2021 |
|---|---|
| Reihe/Serie | Communications in Computer and Information Science |
| Zusatzinfo | XV, 229 p. 70 illus., 35 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 385 g |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Schlagworte | Applications • authentication • Communication • Communication Systems • Computer Hardware • Computer Networks • Computer Science • Computer Security • Computer systems • conference proceedings • cryptography • Data Security • Encryption • Engineering • Informatics • Internet • Network Protocols • Network Security • Public Key Cryptography • Research • Signal Processing • Telecommunication networks • Telecommunication Systems • wireless telecommunication systems |
| ISBN-10 | 3-030-90427-X / 303090427X |
| ISBN-13 | 978-3-030-90427-2 / 9783030904272 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich