Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Fully Homomorphic Encryption in Real World Applications, Ayantika Chatterjee; Khin Mi Mi Aung


Варианты приобретения
Цена: 19564.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Ayantika Chatterjee; Khin Mi Mi Aung
Название:  Fully Homomorphic Encryption in Real World Applications
ISBN: 9789811363924
Издательство: Springer
Классификация:




ISBN-10: 9811363927
Обложка/Формат: Hardcover
Страницы: 141
Вес: 0.40 кг.
Дата издания: 2019
Серия: Computer Architecture and Design Methodologies
Язык: English
Издание: 1st ed. 2019
Иллюстрации: 5 tables, color; 6 illustrations, color; 34 illustrations, black and white; vii, 141 p. 40 illus., 6 illus. in color.
Размер: 234 x 156 x 10
Читательская аудитория: Professional & vocational
Основная тема: Engineering
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the ‘cloud’. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.
Дополнительное описание: Introduction.- Mathematical Background.- Searching and Sorting on Encrypted Data.- Translating Algorithms to Handle Fully Homomorphic Encrypted Data.- Secure Database Handling.- Encrypted Processor Design.- Conclusion.



Applied Cryptography: Protocols, Algorithms and Source Code in C

Автор: Schneier Bruce
Название: Applied Cryptography: Protocols, Algorithms and Source Code in C
ISBN: 1119096723 ISBN-13(EAN): 9781119096726
Издательство: Wiley
Рейтинг:
Цена: 9187.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: From the world`s most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information.

The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity

Автор: Quade Phil
Название: The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ISBN: 1119617367 ISBN-13(EAN): 9781119617365
Издательство: Wiley
Рейтинг:
Цена: 3642.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges

Humankind's efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic 'Big Bang' as an explosion of particles--everything in the universe centered around core elements and governed by laws of matter and gravity. In the modern era of digital technology, we are experiencing a similar explosion of ones and zeros, an exponentially expanding universe of bits of data centered around the core elements of speed and connectivity. One of the disciplines to emerge from our efforts to make sense of this new universe is the science of cybersecurity. Cybersecurity is as central to the Digital Age as physics and chemistry were to the Scientific Age. The Digital Big Bang explores current and emerging knowledge in the field of cybersecurity, helping readers think like scientists to master cybersecurity principles and overcome cybersecurity challenges.

This innovative text adopts a scientific approach to cybersecurity, identifying the science's fundamental elements and examining how these elements intersect and interact with each other. Author Phil Quade distills his over three decades of cyber intelligence, defense, and attack experience into an accessible, yet detailed, single-volume resource. Designed for non-specialist business leaders and cybersecurity practitioners alike, this authoritative book is packed with real-world examples, techniques, and strategies no organization should be without. Contributions from many of the world's leading cybersecurity experts and policymakers enable readers to firmly grasp vital cybersecurity concepts, methods, and practices. This important book:

  • Guides readers on both fundamental tactics and advanced strategies
  • Features observations, hypotheses, and conclusions on a wide range of cybersecurity issues
  • Helps readers work with the central elements of cybersecurity, rather than fight or ignore them
  • Includes content by cybersecurity leaders from organizations such as Microsoft, Target, ADP, Capital One, Verisign, AT&T, Samsung, and many others
  • Offers insights from national-level security experts including former Secretary of Homeland Security Michael Chertoff and former Director of National Intelligence Mike McConnell

The Digital Big Bang is an invaluable source of information for anyone faced with the challenges of 21st century cybersecurity in all industries and sectors, including business leaders, policy makers, analysts and researchers as well as IT professionals, educators, and students.

Implementing Computational Intelligence Techniques for Security Systems Design

Автор: Yousif Abdullatif Albastaki, Wasan Awad
Название: Implementing Computational Intelligence Techniques for Security Systems Design
ISBN: 1799824195 ISBN-13(EAN): 9781799824190
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 20236.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues.

Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.

Algorithmic strategies for solving complex problems in cryptography /

Автор: BALASUBRAMANIAN & RAJAKAN
Название: Algorithmic strategies for solving complex problems in cryptography /
ISBN: 1522529152 ISBN-13(EAN): 9781522529156
Издательство: Turpin
Рейтинг:
Цена: 41210.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cryptography is a field that is constantly advancing, due to exponential growth in new technologies within the past few decades. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Algorithmic Strategies for Solving Complex Problems in Cryptography is an essential reference source that discusses the evolution and current trends in cryptology, and it offers new insight into how to use strategic algorithms to aid in solving intricate difficulties within this domain. Featuring relevant topics such as hash functions, homomorphic encryption schemes, two party computation, and integer factoring, this publication is ideal for academicians, graduate students, engineers, professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.

Security solutions and applied cryptography in smart grid communications /

Название: Security solutions and applied cryptography in smart grid communications /
ISBN: 1522518290 ISBN-13(EAN): 9781522518297
Издательство: Turpin
Рейтинг:
Цена: 31786.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of energy control and safe use.Security Solutions and Applied Cryptography in Smart Grid Communications is a pivotal reference source for the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is ideally designed for academicians, researchers, engineers and students seeking current research on ways in which to implement smart grid platforms all over the globe.

Encryption for Digital Content

Автор: Aggelos Kiayias; Serdar Pehlivanoglu
Название: Encryption for Digital Content
ISBN: 1461427215 ISBN-13(EAN): 9781461427216
Издательство: Springer
Рейтинг:
Цена: 19564.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This is a mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. It includes a complete description of broadcast encryption with various revocation and tracing functionalities.

Applied Incident Response

Автор: Anson Steve
Название: Applied Incident Response
ISBN: 1119560268 ISBN-13(EAN): 9781119560265
Издательство: Wiley
Рейтинг:
Цена: 5861.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Democratic practices - participation, citizenship rights, and an inclusionary state - enhance human development. The book uncovers how local democratic governance improves well-being, related to poverty, health, women`s empowerment, and education. Municipalities that invest in democracy attain greater human development. Commitments to democracy thus have real consequences for citizens.

Homomorphic Encryption and Applications

Автор: Xun Yi; Russell Paulet; Elisa Bertino
Название: Homomorphic Encryption and Applications
ISBN: 3319122282 ISBN-13(EAN): 9783319122281
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. This volume achieves a balance between the theoretical and the practical components of modern information security.

The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption

Автор: Holden Joshua
Название: The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
ISBN: 0691183317 ISBN-13(EAN): 9780691183312
Издательство: Wiley
Рейтинг:
Цена: 2533.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known.

Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book.

With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.

Cryptography Engineering: Design Principles and Practical Applications

Автор: Ferguson Niels, Schneier Bruce, Kohno Tadayoshi
Название: Cryptography Engineering: Design Principles and Practical Applications
ISBN: 0470474246 ISBN-13(EAN): 9780470474242
Издательство: Wiley
Рейтинг:
Цена: 6534.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The ultimate guide to cryptography, updated from an author team of the world`s top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging.

Trusted Computing: Principles and Applications

Автор: Dengguo Feng
Название: Trusted Computing: Principles and Applications
ISBN: 3110476045 ISBN-13(EAN): 9783110476040
Издательство: Walter de Gruyter
Рейтинг:
Цена: 18586.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Blockchain Technology and Applications

Автор: Ahmed Banafa
Название: Blockchain Technology and Applications
ISBN: 8770221065 ISBN-13(EAN): 9788770221061
Издательство: Taylor&Francis
Рейтинг:
Цена: 13320.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Blockchain is an emerging technology that can radically improve security in transaction networks, it provides the basis for a dynamic distributed ledger that can be applied to save time when recording transactions between parties, remove costs associated with intermediaries, and reduce risks of fraud and tampering. This book explores the fundamentals and applications of Blockchain technology; the transparent, secure, immutable and distributed database used currently as the underlying technology for Cryptocurrency. Decentralized peer-to-peer network, distributed ledger and the trust model that defines Blockchain technology will be explained. Components of Blockchain, its operations, underlying algorithms, and essentials of trust will be defined. Types of Blockchain networks including private and public Blockchain networks will be introduced. Concepts of smart contracts, proof of work and proof of stack will be clarified. The relationship between Blockchain technology, Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and Digital Transformation will be explored in this book. Myths about Blockchain will be exposed and a look at the future of Blockchain will be presented.

Topics will be covered in this book:

Blockchain technology, Smart contracts, Hashing, SHA-256 Hash, Verification, Validation, Consensus models, Digital Mining, Hard fork, Soft fork, Bitcoin, Ethereum, Proof of work, Proof of stack, Myths about Blockchain, Decentralized peer-to-peer network, Types of Blockchain networks, Hot and Cold Wallets, Double Spend, Decentralized Applications, Transaction networks, Sidechains, 51% attack, Cryptocurrency, Digital transformation, Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and the Future of Blockchain.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия