Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions, Mangey Ram, Rajeev Singh


Варианты приобретения
Цена: 29744.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до:
Ориентировочная дата поставки:
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Mangey Ram, Rajeev Singh
Название:  Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions
ISBN: 9783110616750
Издательство: Walter de Gruyter
Классификация:


ISBN-10: 3110616750
Обложка/Формат: Hardback
Страницы: 232
Вес: 0.57 кг.
Дата издания: 20.07.2021
Серия: De gruyter series on the applications of mathematics in engineering and information sciences
Язык: English
Иллюстрации: 22 illustrations, black and white; 64 illustrations, color; 30 tables, black and white
Размер: 244 x 170 x 18
Читательская аудитория: Professional and scholarly
Ключевые слова: Applied mathematics,Artificial intelligence,Computer security,Ownership & organization of enterprises,Software Engineering, COMPUTERS / Information Theory,COMPUTERS / Security / Networking,COMPUTERS / Software Development & Engineering / General,MATHEMATI
Подзаголовок: Concepts, mathematical and cryptographic solutions
Рейтинг:
Поставляется из: Германии
Описание:

Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications.

De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.




Cryptographic Security Solutions for the Internet of Things

Автор: Mohammad Tariq Banday
Название: Cryptographic Security Solutions for the Internet of Things
ISBN: 1522557423 ISBN-13(EAN): 9781522557425
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 28413.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks.Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

Cryptographic Solutions for Secure Online Banking and Commerce

Автор: Kannan Balasubramanian, K. Mala, M. Rajakan
Название: Cryptographic Solutions for Secure Online Banking and Commerce
ISBN: 1522502734 ISBN-13(EAN): 9781522502739
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 29106.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: "This book discusses the challenges of providing security for online applications and transactions, highlighting research on digital signatures, public key infrastructure, encryption algorithms, and digital certificates, as well as other e-commerce protocols"--

Cryptographic Security Solutions for the Internet of Things

Автор: Banday Mohammad Tariq
Название: Cryptographic Security Solutions for the Internet of Things
ISBN: 1522586296 ISBN-13(EAN): 9781522586296
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 18810.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Discusses novel designs and developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. Coverage includes cryptographic algorithms, encryption techniques, and authentication procedures.

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Автор: Gupta Brij, Agrawal Dharma P., Yamaguchi Shingo
Название: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
ISBN: 1522501053 ISBN-13(EAN): 9781522501053
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 44491.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments.The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.

Cryptographic Attacks: Computer Security Exploits

Автор: Krzewinski Basil
Название: Cryptographic Attacks: Computer Security Exploits
ISBN: 153002529X ISBN-13(EAN): 9781530025299
Издательство: Неизвестно
Цена: 10346.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Construction and Analysis of Cryptographic Functions

Автор: Lilya Budaghyan
Название: Construction and Analysis of Cryptographic Functions
ISBN: 3319363581 ISBN-13(EAN): 9783319363585
Издательство: Springer
Рейтинг:
Цена: 9781.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions.

Advances in Cryptology - Eurocrypt 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa

Автор: Canteaut Anne, Standaert Franзois-Xavier
Название: Advances in Cryptology - Eurocrypt 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa
ISBN: 3030778851 ISBN-13(EAN): 9783030778859
Издательство: Springer
Цена: 18167.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Symmetric Designs.- Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.- Mind the Middle Layer: The HADES Design Strategy Revisited.- Password Hashing and Preprocessing.- Compactness of Hashing Modes and Efficiency beyond Merkle Tree.- Real-World Cryptanalysis.- Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.- Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.- Implementation Issues.- Pre-Computation Scheme of Window NAF for Koblitz Curves Revisited.- Dummy Shuffling against Algebraic Attacks in White-box Implementations.- Advanced Lattice Sieving on GPUs, with Tensor Cores.- Masking and Secret-Sharing.- Fast verification of masking schemes in characteristic two.- On the Power of Expansion: More Efficient Constructions in the Random Probing Model.- Leakage-resilience of the Shamir Secret-sharing Scheme against Physicalbit Leakages.- Leakage, Faults and Tampering.- Leakage Resilient Value Comparison With Application to Message Authentication.- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.- Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.- Multi-Source Non-Malleable Extractors and Applications.- Quantum Constructions and Proofs.- Secure Software Leasing.- Oblivious Transfer is in MiniQCrypt.- Security Analysis of Quantum Lightning.- Classical vs Quantum Random Oracles.- On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.- Classical proofs of quantum knowledge.- Multiparty Computation.- Order-C Secure Multiparty Computation for Highly Repetitive Circuits.- The More The Merrier: Reducing the Cost of Large Scale MPC.- Multi-Party Reusable Non-Interactive Secure Computation from LWE.- Unbounded Multi-Party Computation from Learning with Errors.- Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.- Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.- Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN.- Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.- VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE.

Cryptographic Hardware and Embedded Systems – CHES 2016

Автор: Gierlichs
Название: Cryptographic Hardware and Embedded Systems – CHES 2016
ISBN: 3662531399 ISBN-13(EAN): 9783662531396
Издательство: Springer
Рейтинг:
Цена: 11460.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.

Cryptographic Hardware and Embedded Systems – CHES 2017

Автор: Wieland Fischer; Naofumi Homma
Название: Cryptographic Hardware and Embedded Systems – CHES 2017
ISBN: 3319667866 ISBN-13(EAN): 9783319667867
Издательство: Springer
Рейтинг:
Цена: 13974.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations.

Cryptographic Hardware and Embedded Systems -- CHES 2014

Автор: Lejla Batina; Matthew Robshaw
Название: Cryptographic Hardware and Embedded Systems -- CHES 2014
ISBN: 3662447088 ISBN-13(EAN): 9783662447086
Издательство: Springer
Рейтинг:
Цена: 11180.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Side-Channel Attacks.- EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor.- A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks.- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks.- Good Is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory.- New Attacks and Constructions.- "Ooh Aah... Just a Little Bit" A Small Amount of Side Channel Can Go a Long Way.- Destroying Fault Invariant with Randomization: A Countermeasure for AES against Differential Fault Attacks.- Reversing Stealthy Dopant-Level Circuits.- Constructing S-boxes for Lightweight Cryptography with Feistel Structure.- Countermeasures.- A Statistical Model for Higher Order DPA on Masked Devices.- Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures.- Secure Conversion between Boolean and Arithmetic Masking of Any Order.- Making RSA-PSS Provably Secure against Non-random Faults.- Algorithm Specific SCA.- Side-Channel Attack against RSA Key Generation Algorithms.- Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.- RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data.- Simple Power Analysis on AES Key Expansion Revisited.- ECC Implementations.- Efficient Pairings and ECC for Embedded Systems.- Curve41417: Karatsuba Revisited.- Implementations.- Cofactorization on Graphics Processing Units.- Enhanced Lattice-Based Signatures on Reconfigurable Hardware.- Compact Ring-LWE Cryptoprocessor.- Hardware Implementations of Symmetric Cryptosystems.- ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption.- FPGA Implementations of SPRING: And Their Countermeasures against Side-Channel Attacks.- FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison.- PUFs Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?.- Efficient Power and Timing Side Channels for Physical Unclonable Functions.- Physical Characterization of Arbiter PUFs.- Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM.- RNGs and SCA Issues in Hardware.- Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG.- Entropy Evaluation for Oscillator-Based True Random Number Generators.- Side-Channel Leakage through Static Power: Should We Care about in Practice.- Gate-Level Masking under a Path-Based Leakage Metric.- Early Propagation and Imbalanced Routing, How to Diminish in FPGAs.

Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions

Автор: Mangey Ram, Rajeev Singh
Название: Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions
ISBN: 3110619857 ISBN-13(EAN): 9783110619850
Издательство: Walter de Gruyter
Рейтинг:
Цена: 24909.00 р.
Наличие на складе: Нет в наличии.

Описание:

Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications.

De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.

The Cryptographic Mathematics of Enigma

Автор: Miller A. Ray
Название: The Cryptographic Mathematics of Enigma
ISBN: 1478379278 ISBN-13(EAN): 9781478379270
Издательство: Неизвестно
Цена: 2067.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия