Solving the Nonlinear Schrödinger Equation -- Modulation and Detection Techniques for DWDW Systems -- Best Optical Filtering for Duobinary Transmission -- Theoretical Limits for the Dispersion Limited Optical Channel -- Capacity Bounds for Mimo Poisson Channels with Inter-symbol interference -- QSpace Project: Quantum Cryptography in Space -- Quantum-aided Classical Cryptography with a Moving …
Information Technology Security -- How can we justify trust in software based systems? -- The capacity of ciphers fulfilling the accessibility of cryptograms -- Parallelization of the Data Encryption Standard (DES) algorithm -- Linked authenticated dictionaries for certificate status verification -- Integrated Payment System for Public Key Infrastructure Services -- Some methods of the analysis…
This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, provid…
Software Engineering Challenges -- Software Processes and Process Models -- Project Management -- Software Configuration Management -- Software Requirements Analysis and Specification -- Software Architecture and Design -- Project Planning -- Project Scheduling and Staffing -- Software Quality Management -- Rish Management -- Structured Design Methodology -- Object-Oriented Design and Design Me…
Invited Talks -- Probabilistic Validation of Computer System Survivability -- Timed Asynchronous Distributed Systems -- WLAN in Automation – More Than an Academic Exercise? -- Evaluation -- Using Stratified Sampling for Fault Injection -- A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Software Without Source-Code -- Quantitative Evaluation of D…
Invited Papers -- Abstract Models of Computation in Cryptography -- Pairing-Based Cryptography at High Security Levels -- Improved Decoding of Interleaved AG Codes -- Coding Theory -- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics -- A Trellis-Based Bound on (2,1)-Separating Codes -- Tessellation Based Multiple Description Coding -- Exploitin…
Efficient Distributed Computation Modulo a Shared Secret -- Multiparty Computation, an Introduction -- Foundations of Modern Cryptography -- Provable Security for Public Key Schemes -- Efficient and Secure Public-Key Cryptosystems.The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes: - efficient distr…
Book Introduction -- Iterative Codes in Magnetic Storage Systems -- Turbo Product Codes for Optical Recording Systems -- Turbo and Turbo-like Code Design in ADSL Modems -- Turbo Codes for Single-Mode and Multimode Fiber Optic Communications -- Iterative Demodulation and Decoding -- Turbo Receiver Techniques for Coded MIMO OFDM Systems -- Space-Time Turbo Coded Modulation for Future Wireless Com…
Genesis and Theory of Computer Viruses -- The Formalization Foundations: from Turing to von Neumann (1936 – 1967) -- F. Cohen and L. Adleman’s Formalization (1984 – 1989) -- Taxonomy, Techniques and Tools -- Fighting Against Viruses -- Learning Computer Viruses by Programming -- Computer Viruses in Interpreted Programming Language -- Companion Viruses -- Worms -- Computer Viruses and Appl…
CMMI RAMS Extension Based on CENELEC Railway Standard -- The Importance of Single-Source Engineering of Emergency and Process Shutdown Systems -- Combining Extended UML Models and Formal Methods to Analyze Real-Time Systems -- Defining and Decomposing Safety Policy for Systems of Systems -- Generalising Event Trees Using Bayesian Networks with a Case Study of Train Derailment -- Control and Dat…