Maybe you've heard the story—or probably urban legend—about the university that didn't lay any grass or pour any concrete when it first opened, leaving the campus grounds as solid dirt. Then, as students began to traverse the campus from one class to the next, campus planners mapped the common paths they took, and then...
You are holding the proceedings of FSE 2011, the 18th International Workshop
on Fast Software Encryption. This workshop was organized in cooperation with
the International Association for Cryptologic Research. It was held in Lyngby,
Denmark, during February 13–16, 2011.
The FSE 2011 Program Committee (PC) consisted of...
One of the most challenging tasks in today’s business and information technology (IT) environments
is to communicate a solution to an organizational problem in a simple manner that can be easily
understood by business and IT personnel alike. Is it also arduous to explain in simple words how
a remedy to an enterprise concern can be...
The present work grew out of lecture notes I prepared for a Vh hour tutorial
that I was invited to give at the 29th IEEE Computer Conference (CompCon)
in San Francisco on February 27, 1987. I have just completed a substantial
update of the material, including the addition of several topics. My main
purpose is to provide a...
The telegraph, telephone, radio, and especially the computer
have put everyone on the globe within earshot— at the price of our
privacy. It may feel like we're performing an intimate act when,
sequestered in our rooms and cubicles, we casually use our cell
phones and computers to transmit our thoughts, confidences,...
Ruby is famous for being easy to learn, but most users only scratch the surface of what it can do. While other books focus on Ruby's trendier features, The Book of Ruby reveals the secret inner workings of one of the world's most popular programming languages, teaching you to write clear, maintainable code.
From time immemorial, the security realm and personal identification task had
shown progress by employing technological means like secret knowledge as passwords
and Personal Identification Numbers, and by using personal possessions as
identity cards and Radio Frequency Identification chips. As opposed to these means
which are...
One of the most gripping yet improbable stories spawned by the computer revolution, Hacker Crocker is a classic American-dream success story set on the razor edge of high technology. Ejovi Nuwere takes the reader on the roller-coaster ride of his extraordinary life, from the bullet-riddled, drugged-out streets of one of America's...
Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...
This book is an introduction to modern ideas in cryptology and how to employ
these ideas. It includes the relevant material on number theory, probability, and
abstract algebra, in addition to descriptions of ideas about algorithms and com
plexity theory. Three somewhat different terms appear in the discussion of secure
communications...
In your hands is one of the most exciting devices to hit the market in quite some time: the iPhone 4S. This Quick Start Guide will help get you and your new iPhone 4S up and running in a hurry. You’ll learn all about the buttons, switches, and ports, and how to use the responsive touch screen, multitask and be introduced to Siri, the...
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the...