Browse Results

Showing 53,401 through 53,425 of 53,672 results

Practical Handbook for Professional Investigators

by Rory J. McMahon CLI CFE Randy Dickson

The third edition of this popular volume continues to supply an up-to-date, nuts-and-bolts learning tool for students and an everyday reference for investigative professionals at all levels. More relevant than ever, this edition adds two new chapters on death and terrorism investigations and several new sections, including insurance fraud, fire and arson investigation; indicators of online marital infidelity; obtaining governmental reports; service of subpoenas for witnesses in federal courts; the Rules of Professional Conduct; niche markets in the investigative industry; and managing and marketing an investigative practice.

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

by Andy Greenberg

"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of DemocracyThe true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times).In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.

Industrial Engineering and Applications – Europe: 11th International Conference, ICIEA-EU 2024, Nice, France, January 10–12, 2024, Revised Selected Papers (Lecture Notes in Business Information Processing #507)

by Shey-Huei Sheu

This book constitutes the refereed post-proceedings of the 11th International Conference on Industrial Engineering and Applications, ICIEA 2024, held in Nice, France, during January 10-12, 2024. The 16 full papers and 3 short papers included in this book were carefully reviewed and selected from 90 submissions. They focus on the most recent and relevant research, theories and practices in industrial engineering and its applications.

Introduction to Data Science in Biostatistics: Using R, the Tidyverse Ecosystem, and APIs

by Thomas W. MacFarland

Introduction to Data Science in Biostatistics: Using R, the Tidyverse Ecosystem, and APIs defines and explores the term "data science" and discusses the many professional skills and competencies affiliated with the industry. With data science being a leading indicator of interest in STEM fields, the text also investigates this ongoing growth of demand in these spaces, with the goal of providing readers who are entering the professional world with foundational knowledge of required skills, job trends, and salary expectations. The text provides a historical overview of computing and the field's progression to R as it exists today, including the multitude of packages and functions associated with both Base R and the tidyverse ecosystem. Readers will learn how to use R to work with real data, as well as how to communicate results to external stakeholders. A distinguishing feature of this text is its emphasis on the emerging use of APIs to obtain data.

Intelligent Systems and Computing (Lecture Notes on Data Engineering and Communications Technologies #207)

by Bing-Yuan Cao Shu-Feng Wang Seyed Hadi Nasseri Yu-Bin Zhong

This book includes high quality research papers submitted at the 2022 “Four Session (ICFIE, ICORG, GDORS, CGHMORS) Celebration” Joint International Conference held on December 28, 2022 and the online meeting of the Fuzzy Information and Engineering Branch of the China Operations Research Society on September 17, 2022. It covers topics in the fields of certainty, stochastic uncertainty, and fuzzy uncertainty, including computer science and mathematics, operations research and control, artificial intelligence, information and engineering technology, barrier-free communication for people with disabilities, digital logistics and knowledge representation, medical applications, queuing theory and game theory, algorithms and optimization methods. The book is a valuable reference book for scholars, engineers, management professionals, and graduate, undergraduate, and vocational students interested in computer science, mathematics, and fuzzy mathematics and operations research, as well as their applications in information technology and engineering.

Smart Learning Solutions for Sustainable Societies (Lecture Notes in Educational Technology)

by Cândida Silva Susana Silva Dulce Mota Paula Peres

This book showcases research and project results on technology, smart learning, and sustainability education and analyzes smart learning solutions for lifelong learning. It discusses their impact and potential for transfer and scaling and reviews how real solutions perform in the real world. Sustainable societies are built on twenty-first-century skills. Attaining the United Nations' Sustainable Development Goals requires a focus on a new set of knowledge, skills, and attitudes, as well as novel and smart strategies that leverage state-of-the-art technologies and make these skillsets widely available in our societies to all groups of people, at any time in their lives, in professional as well as academic settings. This book serves as a helpful resource for researchers, academics, practitioners, and consultants from around the world who are involved in the study, management and development of educational technology, smart learning, sustainability education, and related issues.

Advances in Intelligent Computing Techniques and Applications: Intelligent Systems, Intelligent Health Informatics, Intelligent Big Data Analytics and Smart Computing, Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #211)

by Faisal Saeed Fathey Mohammed Yousef Fazea

This book presents the papers included in the proceedings of the 7th International Conference of Reliable Information and Communication Technology 2023 (IRICT 2023) that was held in Pulai Springs Resorts, Johor, Malaysia on 27-28, December 2023. IRICT 2023 is organized by the Yemeni Scientists Research Group (YSRG) and Big Data Center in Universiti Teknologi Malaysia (Malaysia) in collaboration with Association for Information Systems – Malaysia Chapter (MyAIS) and College of Engineering, IT and Environment at Charles Darwin University (Australia). IRICT2023 is a forum for the presentation of technological advances in the field of Information and Communication Technology. The main theme of the conference is “Advances in Intelligent Computing Techniques and Applications”. The book discusses several research topics such as Health Informatics, Artificial Intelligence, Soft Computing, Data Science, Big Data Analytics, Internet of Things (IoT), Intelligent Communication Systems, Cyber Security, and Information System. These papers were presented in three parallel sessions during the two days.

Modelling and Mining Networks: 19th International Workshop, WAW 2024, Warsaw, Poland, June 3–6, 2024, Proceedings (Lecture Notes in Computer Science #14671)

by Megan Dewar Bogumił Kamiński Daniel Kaszyński Łukasz Kraiński Paweł Prałat François Théberge Małgorzata Wrzosek

This book constitutes the refereed proceedings of the 19th International Workshop on Modelling and Mining Networks, WAW 2024, held in Warsaw, Poland, during June 3–6, 2024. The 12 full papers presented in this book were carefully reviewed and selected from 19 submissions. The aim of this workshop was to further the understanding of networks that arise in theoretical as well as applied domains. The goal was also to stimulate the development of high-performance and scalable algorithms that exploit these networks.

Good Practices and New Perspectives in Information Systems and Technologies: WorldCIST 2024, Volume 1 (Lecture Notes in Networks and Systems #985)

by Álvaro Rocha Hojjat Adeli Gintautas Dzemyda Fernando Moreira Aneta Poniszewska-Marańda

This book is composed by a selection of articles from the 12th World Conference on Information Systems and Technologies (WorldCIST'24), held between 26 and 28 of March 2024, at Lodz University of Technology, Lodz, Poland. WorldCIST is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges of modern Information Systems and Technologies research, together with their technological development and applications. The main and distinctive topics covered are: A) Information and Knowledge Management; B) Organizational Models and Information Systems; C) Software and Systems Modeling; D) Software Systems, Architectures, Applications and Tools; E) Multimedia Systems and Applications; F) Computer Networks, Mobility and Pervasive Systems; G) Intelligent and Decision Support Systems; H) Big Data Analytics and Applications; I) Human-Computer Interaction; J) Ethics, Computers and Security; K) Health Informatics; L) Information Technologies in Education; M) Information Technologies in Radiocommunications; and N) Technologies for Biomedical Applications. The primary market of this book are postgraduates and researchers in Information Systems and Technologies field. The secondary market are undergraduates and professionals as well in Information Systems and Technologies field.

Developments and Advances in Defense and Security: MICRADS 2023 (Smart Innovation, Systems and Technologies #380)

by Álvaro Rocha Carlos Hernán Fajardo-Toro José María Riola Rodríguez

This book gathers the proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2023), held at Graduate School of the Colombian Air Force, in Bogota, Colombia, during July 6–8, 2023. It covers a broad range of topics in systems, communication, and defense; strategy and political–administrative vision in defense; and engineering and technologies applied to defense. Given its scope, it offers a valuable resource for practitioners, researchers, and students alike.

Human Activity and Behavior Analysis: Advances in Computer Vision and Sensors: Volume 1 (Ubiquitous Computing, Healthcare and Well-being)

by Md Atiqur Rahman Ahad

Human Activity and Behavior Analysis relates to the field of vision and sensor-based human action or activity and behavior analysis and recognition. The book includes a series of methodologies, surveys, relevant datasets, challenging applications, ideas, and future prospects.The book discusses topics such as action recognition, action understanding, gait analysis, gesture recognition, behavior analysis, emotion and affective computing, and related areas. This volume focuses on relevant activities in three main subject areas: Healthcare and Emotion, Mental Health, and Nurse Care Records.The editors are experts in these arenas and the contributing authors are drawn from high-impact research groups around the world. This book will be of great interest to academics, students, and professionals working and researching in the field of human activity and behavior analysis.

Web and Big Data: 7th International Joint Conference, APWeb-WAIM 2023, Wuhan, China, October 6–8, 2023, Proceedings, Part IV (Lecture Notes in Computer Science #14334)

by Xiangyu Song Ruyi Feng Yunliang Chen Jianxin Li Geyong Min

The 4-volume set LNCS 14331, 14332, 14333, and 14334 constitutes the refereed proceedings of the 7th International Joint Conference, APWeb-WAIM 2023, which took place in Wuhan, China, in October 2023. The total of 138 papers included in the proceedings were carefully reviewed and selected from 434 submissions. They focus on innovative ideas, original research findings, case study results, and experienced insights in the areas of the World Wide Web and big data, covering Web technologies, database systems, information management, software engineering, knowledge graph, recommend system and big data.

Information Technology Convergence: Security, Robotics, Automations and Communication (Lecture Notes in Electrical Engineering #253)

by James J. Jong Hyuk Park Leonard Barolli Fatos Xhafa Hwa Young Jeong

Information technology and its convergence issue is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services. This area will be the most comprehensive topics with various aspects of advances in information technology and its convergence services. This book covers all topics as computational science and applications, electronics engineering, manufacturing technology, services, technical skill to control the robot, automatic operation and application, simulation and testing communication and many more.

Digital Communication and Soft Computing Approaches Towards Sustainable Energy Developments: Proceedings of ISSETA 2023 (Innovations in Sustainable Technologies and Computing)

by Gayadhar Panda Thaiyal Naayagi Ramasamy Seifeddine Ben Elghali Shaik Affijulla

This book is a second volume and contains selected papers presented at Second International Symposium on Sustainable Energy and Technological Advancements (ISSETA 2023), organized by the Department of Electrical Engineering, NIT Meghalaya, Shillong, India, during 24 – 25 February 2023. The topics covered in the book are the cutting-edge research involved in sustainable energy technologies, smart buildingtechnology, integration and application of multiple energy sources; advanced power converter topologies and their modulation techniques; and information and communication technologies for smart microgrids.

Frame Theory in Data Science (Advances in Science, Technology & Innovation)

by Zhihua Zhang Palle E. Jorgensen

This book establishes brand-new frame theory and technical implementation in data science, with a special focus on spatial-scale feature extraction, network dynamics, object-oriented analysis, data-driven environmental prediction, and climate diagnosis. Given that data science is unanimously recognized as a core driver for achieving Sustainable Development Goals of the United Nations, these frame techniques bring fundamental changes to multi-channel data mining systems and support the development of digital Earth platforms. This book integrates the authors' frame research in the past twenty years and provides cutting-edge techniques and depth for scientists, professionals, and graduate students in data science, applied mathematics, environmental science, and geoscience.

Advanced Information Networking and Applications: Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Volume 1 (Lecture Notes on Data Engineering and Communications Technologies #199)

by Leonard Barolli

Networks of today are going through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence, and actuations are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications have been difficult to realize because of many interconnection problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next generation wireless systems should be integrated in order to develop high performance computing solutions to problems arising from the complexities of these networks. This book covers the theory, design and applications of computer networks, distributed computing, and information systems. The aim of the book “Advanced Information Networking and Applications” is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.

Implementation and Benefits of Digital Twin on Decision Making and Data Quality Management

by Florian Blaschke

Digital twin technology is becoming important for the realization of Industry 4.0 using cyber-physical systems (CPS) and information technology. CPS form the backbone to support the creation of a network for decentralized and autonomous decision-making. The design principles for Industry 4.0 serve as guidelines for virtualization concepts that are virtual copies of the physical world and create a link between the real and virtual worlds to collect data and monitor processes, the so-called digital twin. In this book, a theoretical digital twin-driven decision-making model has been developed that combines corporate data quality management, a process digital twin, and a model-driven decision support system. It leverages the benefits of the digital twin to create, test and build a process in the virtual world that supports decision making by combining data, analytics and visualization of insights to help managers make better decisions

Datenbanken für Nichtinformatiker: Eine praxisnahe Einführung

by Jörg Mielebacher

Daten sind zu einem wichtigen Rohstoff in vielen Bereichen geworden. Auch Nichtinformatiker müssen große Datenbestände pflegen und nach den für sie relevanten Informationen durchsuchen. Dieses praxisnahe Lehrbuch zeigt, wie man hierfür Datenbanken einsetzt, wie man deren Inhalte mit der Abfragesprache SQL auswertet und worauf man bei Entwurf und Betrieb von Datenbanken achten muss.Zahlreiche Abbildungen und Anwendungsbeispiele vermitteln einen gut verständlichen Einblick in dieses wichtige Thema. Aber auch Berufspraktiker mit Interesse an Datenbanken finden wichtige Hinweise und Lösungsansätze für ihre Arbeit.

Azure Arc Systems Management: Governance and Administration of Multi-cloud and Hybrid IT Estates

by Ramona Maxwell

This book is for enterprise and solution architects, systems integrators, and anyone managing enterprise-scale, multi-cloud or hybrid IT landscapes. The book examines usage of Azure Arc for governance and systems management with security as an overarching theme. It is not an implementation manual but provides high-level guidance on best practices and links to detailed guidance. It offers insight into the types of problems that Azure Arc can solve, and will help you determine whether it is the right choice for your organization.Modern enterprise computing is an astonishing luxury land filled with never-before-seen hosting options on commercial clouds as well as advancements in the areas of private cloud and edge computing. The challenge with this plethora of choices is to manage and coordinate large IT estates which may bridge multiple public clouds and private datacenters. Visibility of operations to achieve security, cost control, and efficiency is often difficult to achieve. Data management is another area which is particularly fraught with complexity and risk.Industry leaders have made serious investments in the design of control plane products to address these gaps with varying approaches and degrees of success. Azure Arc is designed to provide a consolidated view of assets such as databases and Kubernetes installations across major cloud providers, edge locations, and customer-owned datacenters. It facilitates deployment of new infrastructure, patching and upgrades, monitoring, policy, and security controls for assets living on-premises or in competitor clouds as if they were native to Azure. While competitive products exist, at this writing none have the flexibility and reach of Arc to effectively manage very large hybrid estates.Readers will appreciate the author’s approach of walking through typical enterprise computing scenarios while listing industry- or scenario-specific challenges that are difficult to overcome, and then reinforcing understanding by restating the challenges while explaining how Azure Arc can be utilized to remediate them.What You Will LearnDiscover what Azure Arc is, the types of problems it is intended to solve, and how to map your requirements to its capabilitiesStreamline and secure large Arc-enabled Kubernetes deployments via modern GitOps practicesUse Azure Arc to consolidate management across a broad range of hybrid and multi-cloud ecosystems through policy-driven governanceApply monitoring and automation to defend systems against security threats that are beyond the ability of manual administration to deflectUncover practical guidance that is written in a way that makes basic precepts approachable to non-technical stakeholders and then branches out into areas that will offer advanced readers new insights and consolidate a broad topic into a usable directionWho This BookIs ForEnterprise and solution architects, systems integrators, and anyone else looking to solve enterprise-scale administration problems across a multi-cloud or hybrid architecture

The Code of Honor: Embracing Ethics in Cybersecurity

by Paul J. Maurer Ed Skoudis

A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions – including medicine, law, and engineering – have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses around the world, slows commerce, and delays innovation. The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives. Authors Ed Skoudis, President of the SANS Technology Institute College and founder of the Counter Hack team, and Dr. Paul Maurer, President of Montreat College, explain how timeless ethical wisdom gives birth to the Cybersecurity Code which is currently being adopted by security practitioners and leaders around the world. This practical book tells numerous engaging stories that highlight ethically complex situations many cybersecurity and tech professionals commonly encounter. It also contains compelling real-world case studies – called Critical Applications – at the end of each chapter that help the reader determine how to apply the hands-on skills described in the book. You'll also find: A complete system of cybersecurity ethics relevant to C-suite leaders and executives, front-line cybersecurity practitioners, and students preparing for careers in cybersecurity. Carefully crafted frameworks for ethical decision-making in cybersecurity. Timeless principles based on those adopted in countless professions, creeds, and civilizations. Perfect for security leaders, operations center analysts, incident responders, threat hunters, forensics personnel, and penetration testers, The Code of Honor is an up-to-date and engaging read about the ethically challenging world of modern cybersecurity that will earn a place in the libraries of aspiring and practicing professionals and leaders who deal with tech every day.

Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14652)

by Marc Joye Gregor Leander

The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.

Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14651)

by Marc Joye Gregor Leander

The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.

Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VII (Lecture Notes in Computer Science #14657)

by Marc Joye Gregor Leander

The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.

Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV (Lecture Notes in Computer Science #14654)

by Marc Joye Gregor Leander

The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.

Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part III (Lecture Notes in Computer Science #14653)

by Marc Joye Gregor Leander

The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.

Refine Search

Showing 53,401 through 53,425 of 53,672 results