This book constitutes the refereed proceedings of the 13th International Conference on Modern information Technology and IT Education, held in Moscow, Russia, in November-December 2018.;The 30 full papers and 1 s...
详细信息
ISBN:
(数字)9783030468958
ISBN:
(纸本)9783030468941
This book constitutes the refereed proceedings of the 13th International Conference on Modern information Technology and IT Education, held in Moscow, Russia, in November-December 2018.;The 30 full papers and 1 short papers were carefully reviewed and selected from 164 submissions. The papers are organized according to the following topics: IT-education: methodology, methodological support; e-learning and IT in education; educational resources and best practices of IT-education; research and development in the field of new IT and their applications; scientific software in education and science; school education in computer science and ICT; economic informatics.
The 87 full papers and 23 short papers presented in these proceedings were carefully reviewed and selected from 209 submissions. The papers are organized in the following topical sections:;Digital technologi...
详细信息
ISBN:
(数字)9783031502040
ISBN:
(纸本)9783031502033;9783031502064
The 87 full papers and 23 short papers presented in these proceedings were carefully reviewed and selected from 209 submissions. The papers are organized in the following topical sections:;Digital technologies (artificial intelligence) adoption; digital platforms and applications; digital technologies in e-governance; metaverse and marketing.;Emerging technologies adoption; general IT adoption; healthcare IT adoption.
theory is what remains true when technology is changing. So, it is important to know and master the basic concepts and the theoretical tools that underlie the design of the systems we are using today and the systems w...
详细信息
ISBN:
(数字)9783031792137
ISBN:
(纸本)9783031792014
theory is what remains true when technology is changing. So, it is important to know and master the basic concepts and the theoretical tools that underlie the design of the systems we are using today and the systems we will use tomorrow. This means that, given a computing model, we need to know what can be done and what cannot be done in that model. Considering systems built on top of an asynchronous read/write shared memory prone to process crashes, this monograph presents and develops the fundamental notions that are universal constructions, consensus numbers, distributed recursivity, power of the BG simulation, and what can be done when one has to cope with process anonymity and/or memory anonymity. Numerous distributed algorithms are presented, the aim of which is being to help the reader better understand the power and the subtleties of the notions that are presented. In addition, the reader can appreciate the simplicity and beauty of some of these algorithms.
This book constitutes the proceedings of the Second International Conference on information and Communication Technology for Development for Africa, ICT4DA 2019, held in Bahir Dar, Ethiopia, in May 2019.
ISBN:
(数字)9783030266301
ISBN:
(纸本)9783030266295
This book constitutes the proceedings of the Second International Conference on information and Communication Technology for Development for Africa, ICT4DA 2019, held in Bahir Dar, Ethiopia, in May 2019.
The general problem studied by informationtheory is the reliable transmission of information through unreliable channels. Channels can be unreliable either because they are disturbed by noise or because unauthorized ...
详细信息
ISBN:
(数字)9783709128381
ISBN:
(纸本)9783211822050
The general problem studied by informationtheory is the reliable transmission of information through unreliable channels. Channels can be unreliable either because they are disturbed by noise or because unauthorized receivers intercept the information transmitted. In the first case, the theory of error-control codes provides techniques for correcting at least part of the errors caused by noise. In the second case cryptography offers the most suitable methods for coping with the many problems linked with secrecy and authentication. Now, both error-control and cryptography schemes can be studied, to a large extent, by suitable geometric models, belonging to the important field of finite geometries. This book provides an update survey of the state of the art of finite geometries and their applications to channel coding against noise and deliberate tampering. The book is divided into two sections, "Geometries and Codes" and "Geometries and Cryptography". The first part covers such topicsas Galois geometries, Steiner systems, Circle geometry and applications to algebraic codingtheory. The second part deals with unconditional secrecy and authentication, geometric threshold schemes and applications of finite geometry to cryptography. This volume recommends itself to engineers dealing with communication problems, to mathematicians and to research workers in the fields of algebraic codingtheory, cryptography and informationtheory.
Cryptography, secret writing, is probably as old as writing itself. But only recently has it become the object of extensive scientific studies. Vast new applications to data security are one explanation for this. Perh...
详细信息
ISBN:
(数字)9783662026274
Cryptography, secret writing, is probably as old as writing itself. But only recently has it become the object of extensive scientific studies. Vast new applications to data security are one explanation for this. Perhaps a more important reason for the huge growth of scientific research on cryptography is the seminal idea of public-key cryptography and the resulting new vistas on the possibilities of communication. This book gives a broad overview of public-key cryptography, covering its essence and advantages, various public-key cryptosystems and protocols. It also gives a comprehensive introduction to classical cryptography and cryptanalysis. The book is self-contained and suitable both as a text and as a reference. It starts from the beginning but also includes some 1989 developments. The presentation is in many ways new, with some new results. The treatment is rigorous but avoids unnecessary formalism. The plaintext examples in the book form a package of basic sauna knowledge.
The 20 papers presented were carefully reviewed and selected from 64 submissions. They are organized in the following topical sections: security protocols; public-key implementation; cryptanalysis; theory of symmetric...
详细信息
ISBN:
(数字)9783030252830
ISBN:
(纸本)9783030252823
The 20 papers presented were carefully reviewed and selected from 64 submissions. They are organized in the following topical sections: security protocols; public-key implementation; cryptanalysis; theory of symmetric-key cryptography; multiparty computation and privacy; new constructions; and adversarial cryptography.
暂无评论