![]() |
Securing Digital Video: Techniques for DRM and Content Protection
ISBN: 9783642434884 / Angielski / Miękka / 266 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and maximize their revenues; consumers want backwards compatibility, while they fear that content owners will spy on their viewing habits; and academics are afraid that DRM may be a barrier to knowledge sharing. DRM technologies have a poor reputation and are not yet trusted. This book describes the key aspects of content protection and DRM systems, the objective being to demystify the technology and techniques. In the first part of the book,... Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and ... |
cena:
362,27 |
![]() |
Open Problems in Mathematics and Computational Science
ISBN: 9783319106823 / Angielski / Twarda / 439 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents interesting, important unsolved problems in the mathematical and computational sciences. The contributing authors are leading researchers in their fields and they explain outstanding challenges in their domains, first by offering basic definitions, explaining the context, and summarizing related algorithms, theorems, and proofs, and then by suggesting creative solutions.
The authors feel a strong motivation to excite deep research and discussion in the mathematical and computational sciences community, and the book will be of value to postgraduate students... This book presents interesting, important unsolved problems in the mathematical and computational sciences. The contributing authors are leading re... |
cena:
201,24 |
![]() |
Channel Estimation for Physical Layer Network Coding Systems
ISBN: 9783319116679 / Angielski / Miękka / 80 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This SpringerBrief presents channel estimation strategies for the physical later network coding (PLNC) systems. Along with a review of PLNC architectures, this brief examines new challenges brought by the special structure of bi-directional two-hop transmissions that are different from the traditional point-to-point systems and unidirectional relay systems. The authors discuss the channel estimation strategies over typical fading scenarios, including frequency flat fading, frequency selective fading and time selective fading, as well as future research directions. Chapters explore the...
This SpringerBrief presents channel estimation strategies for the physical later network coding (PLNC) systems. Along with a review of PLNC architectu...
|
cena:
201,24 |
![]() |
Entropy and Information Theory
ISBN: 9781489981325 / Angielski / Miękka / 409 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is an updated version of the information theory classic, first published in 1990. About one-third of the book is devoted to Shannon source and channel coding theorems; the remainder addresses sources, channels, and codes and on information and distortion measures and their properties. New in this edition:
This book is an updated version of the information theory classic, first published in 1990. About one-third of the book is devoted to Shannon sourc... |
cena:
684,33 |
![]() |
Network Security
ISBN: 9781489990013 / Angielski / Miękka / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly the Internet, have permeated into every facet of our daily lives. These changes also brought about new challenges, particularly in the area of security. Network security is essential to protect data integrity, con?d- tiality, access control, authentication, user privacy, and so on. All of these aspects are critical to provide fundamental network functionalities. This book covers a comprehensive array of topics in network security including secure metering, group key management,...
Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly the Internet, have permeated into e...
|
cena:
442,79 |
![]() |
Algebraic Cryptanalysis
ISBN: 9781489984500 / Angielski / Miękka / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SAT-solvers and the methods of Nicolas Courtois. Topics include: Analytic Combinatorics, and its application to cryptanalysis The... Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided... |
cena:
1006,38 |
![]() |
Construction and Analysis of Cryptographic Functions
ISBN: 9783319129907 / Angielski / Twarda / 168 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes...
This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (A...
|
cena:
402,53 |
![]() |
Moving Target Defense II: Application of Game Theory and Adversarial Modeling
ISBN: 9781489993168 / Angielski / Miękka / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling... Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their ... |
cena:
402,53 |
![]() |
Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise
ISBN: 9783658071158 / Angielski / Miękka / 362 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to...
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be abl...
|
cena:
201,24 |
![]() |
Thinkquest 2010: Proceedings of the First International Conference on Contours of Computing Technology
ISBN: 9788132217077 / Angielski / Miękka / 323 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This proceedings is a representation of decades of reasearch, teaching and application in the field. Image Processing, Fusion and Information Technology areas, Digital radio Communication, Wimax, Electrical engg, VLSI approach to processor design, embedded systems design are dealt in detail through models and illustrative techniques.
This proceedings is a representation of decades of reasearch, teaching and application in the field. Image Processing, Fusion and Information Technolo...
|
cena:
583,68 |
![]() |
Cooperative Communications and Networking: Technologies and System Design
ISBN: 9781489998576 / Angielski / Miękka / 402 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cooperative and relay communications have recently become the most widely explored topics in communications, whereby users cooperate in transmitting their messages to the destination, instead of conventional networks which operate independently and compete among each other for channel resources. As the field has progressed, cooperative communications have become a design concept rather than a specific transmission technology. This concept has revolutionized the design of wireless networks, allowing increased coverage, throughput, and transmission reliability even as conventional... Cooperative and relay communications have recently become the most widely explored topics in communications, whereby users cooperate in transmittin... |
cena:
603,81 |
![]() |
Einführung in Die Kryptologie: Lehrbuch Für Unterricht Und Selbststudium
ISBN: 9783834818553 / Niemiecki / Miękka / 399 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Mit groem didaktischen Geschick gelingt es den Autoren, Begeisterung fur die Welt der geheimen
Botschaften zu wecken. So gelingt der Einstieg in die Kryptologie ganz leicht. Viele Beispiele und Aufgaben regen dazu an, sich selbstandig mit diesem faszinierenden Gebiet zu beschaftigen und helfen dabei, den erlernten Stoff weiter zu vertiefen. Mit groem didaktischen Geschick gelingt es den Autoren, Begeisterung fur die Welt der geheimen
Botschaften zu wecken. So gelingt der Einstieg in d... |
cena:
188,08 |
![]() |
Handbook of Massive Data Sets
ISBN: 9781461348825 / Angielski / Miękka / 1223 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The proliferation of massive data sets brings with it a series of special computational challenges. This "data avalanche" arises in a wide range of scientific and commercial applications. With advances in computer and information technologies, many of these challenges are beginning to be addressed by diverse inter-disciplinary groups, that indude computer scientists, mathematicians, statisticians and engineers, working in dose cooperation with application domain experts. High profile applications indude astrophysics, bio-technology, demographics, finance, geographi cal information systems,...
The proliferation of massive data sets brings with it a series of special computational challenges. This "data avalanche" arises in a wide range of sc...
|
cena:
3019,23 |
![]() |
Operational Semantics and Verification of Security Protocols
ISBN: 9783642430534 / Angielski / Miękka / 174 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model... Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use st... |
cena:
201,09 |
![]() |
Probability, Random Processes, and Ergodic Properties
ISBN: 9781489983312 / Angielski / Miękka / 322 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Probability, Random Processes, and Ergodic Properties is for mathematically inclined information/communication theorists and people working in signal processing. It will also interest those working with random or stochastic processes, including mathematicians, statisticians, and economists. Highlights: Complete tour of book and guidelines for use given in Introduction, so readers can see at a glance the topics of interest. Structures mathematics for an engineering audience, with emphasis on engineering applications. New in the Second Edition: Much of the material has been... Probability, Random Processes, and Ergodic Properties is for mathematically inclined information/communication theorists and people working in sign... |
cena:
644,07 |
![]() |
Wireless Communications
ISBN: 9781489989239 / Angielski / Miękka / 370 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This IMA Volume in Mathematics and its Applications Wireless Communications contains papers based on invited lectures at the very successful IMA Sum mer Program on Wireless Communications, held on June 22 - July 1, 2005. We would like to thank Prathima Agrawal (Auburn University), Daniel Matthew Andrews (Lucent Technologies), Philip J. Fleming (Mo torola, Inc.), George Yin (Wayne State University), and Lisa Zhang (Lucent Technologies) for their superb role as workshop organizers and editors of the proceedings. We take this opportunity to thank the National Science Foundation for its support...
This IMA Volume in Mathematics and its Applications Wireless Communications contains papers based on invited lectures at the very successful IMA Sum m...
|
cena:
402,53 |
![]() |
New Directions in Wireless Communications Research
ISBN: 9781489984913 / Angielski / Miękka / 469 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. New Directions in Wireless Communications Research addresses critical issues in the design and performance analysis of current and future wireless system design. Intended for use by system designers and academic researchers, the contributions are by acknowledged international leaders in their field. Topics covered include: (1) Characterization of wireless channels; (2) The principles and challenges of OFDM; (3) Low-correlation sequences for communications; (4) Resource allocation in wireless systems; (5) Signal processing for wireless systems, including iterative systems... New Directions in Wireless Communications Research addresses critical issues in the design and performance analysis of current and future ... |
cena:
603,81 |
![]() |
Advanced Video Coding Systems
ISBN: 9783319142425 / Angielski / Twarda / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax... This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book in... |
cena:
402,53 |
![]() |
Algebraic Coding Theory (Revised Edition)
ISBN: 9789814635899 / Angielski / Twarda / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the revised edition of Berlekamp's famous book, 'Algebraic Coding Theory', originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field. One of these is an algorithm for decoding Reed-Solomon and Bose-Chaudhuri-Hocquenghem codes that subsequently became known as the Berlekamp-Massey Algorithm. Another is the Berlekamp algorithm for factoring polynomials over finite fields, whose later extensions and embellishments became widely used in symbolic manipulation systems. Other novel algorithms improved the basic...
This is the revised edition of Berlekamp's famous book, 'Algebraic Coding Theory', originally published in 1968, wherein he introduced several algorit...
|
cena:
774,06 |
![]() |
Introduction to Cryptography with Maple
ISBN: 9783642446214 / Angielski / Miękka / 706 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools such as complexity and randomness, and of the mathematical aspects, with emphasis on number-theoretic algorithms and their applications to cryptography and cryptanalysis, is integrated with the programming approach, thus providing implementations of the algorithms and schemes as well as examples... This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the ... |
cena:
201,24 |