Results for ' cryptography'

97 found
Order:
  1.  44
    Quantum Cryptography.Serge Fehr - 2010 - Foundations of Physics 40 (5):494-531.
    Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analysis of cryptographic schemes. Optimally (but not always), quantum cryptography allows for the design of cryptographic schemes whose security is guaranteed solely by the laws of nature. This is in sharp contrast to standard cryptographic schemes, which can be broken in principle, i.e., when given sufficient computing power. From a theory point of view, quantum cryptography offers a beautiful interplay between the mathematics of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  2.  33
    Cryptography, data retention, and the panopticon society (abstract).Jean-François Blanchette & Deborah G. Johnson - 1998 - Acm Sigcas Computers and Society 28 (2):1-2.
    As we move our social institutions from paper and ink based operations to the electronic medium, we invisibly create a type of surveillance society, a panopticon society. It is not the traditional surveillance society in which government officials follow citizens around because they are concerned about threats to the political order. Instead it is piecemeal surveillance by public and private organizations. Piecemeal though it is, It creates the potential for the old kind of surveillance on an even grander scale. The (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  6
    Electronic Cryptography—Chance or Threat for Modern Democracy?Olaf Winkel - 2003 - Bulletin of Science, Technology and Society 23 (3):185-191.
    It is generally assumed that electronic cryptography benefits democracy because it can be instrumental in protecting free speech, which is considered a cornerstone for democracy. The author argues, however, that a close look at some aspects of democratic theory suggests that matters are not really as clear-cut. The fact that encryption can be abused in many ways also poses a threat to democracy. This paradox is examined in detail.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  7
    Wittgenstein's secret diaries: cryptography and semiotics.Dinda L. Gorlée - 2019 - New York, NY: Bloomsbury Academic.
    Introduction: silence and secrecy -- Symptoms -- Cryptography -- Cryptomnesia -- Fact or fiction -- Cryptosemiotician -- Tentative conclusion -- Appendix: list of coded passages from Wittgenstein's Nachlass.
    Direct download  
     
    Export citation  
     
    Bookmark  
  5. Nicholas Rescher, Leibniz and Cryptography: An Account on the Occasion of the Initial Exhibition of the Reconstruction of Leibniz’s Cipher Machine. [REVIEW]Stephen Puryear - 2014 - Review of Metaphysics 67 (4):882-884.
    In Part 1 of this short book, Rescher provides an overview of the nature and source of Leibniz’s interest in the theory and practice of cryptanalysis, including his unsuccessful bid to secure an apprentice for John Wallis (1616-1703) with a view to perpetuating the Englishman’s remarkable deciphering abilities. In Part 2, perhaps the most interesting part of the book, Rescher offers his account of the inner workings of Leibniz’s cipher machine. Part 3 provides a brief pictorial history of such machines (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  33
    Skepticism and Cryptography.Barry S. Fagin, Leemon C. Baird, Jeffrey W. Humphries & Dino L. Schweitzer - 2007 - Knowledge, Technology & Policy 20 (4):231-242.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  13
    An optimization of color halftone visual cryptography scheme based on Bat algorithm.Salama A. Mostafa, Ihsan Salman & Firas Mohammed Aswad - 2021 - Journal of Intelligent Systems 30 (1):816-835.
    Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  6
    Bounded Arithmetic, Cryptography and Complexity.Samuel R. Buss - 2008 - Theoria 63 (3):147-167.
  9.  80
    Bounded Arithmetic, Cryptography and Complexity.Samuel R. Buss - 1997 - Theoria 63 (3):147-167.
  10.  5
    Security in advanced metering infrastructures: Lightweight cryptography.Luis Hernández-Álvarez, Juan José Bullón Pérez & Araceli Queiruga-Dios - forthcoming - Logic Journal of the IGPL.
    Smart grids are designed to revolutionize the energy sector by creating a smarter, more efficient and reliable power supply network. The rise of smart grids is a response to the need for a more comprehensive and sophisticated energy system that caters to the needs of homes and businesses. Key features of smart grids include the integration of renewable energy sources, decentralized generation and advanced distribution networks. At the heart of smart grids is a sophisticated metering system, consisting of intelligent electronic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. Whole-brain simulation, cryptography, and Turing's mystery machine.Diane Proudfoot & Jack Copeland - 2020 - The Turing Conversation.
    No categories
     
    Export citation  
     
    Bookmark  
  12. Enforcing security with cryptography, chap. 20.S. Harari & L. Poinsot - forthcoming - Hermes.
    No categories
     
    Export citation  
     
    Bookmark  
  13.  12
    Politiques de la cryptographie.Pascal Jollivet - 2001 - Multitudes 4 (4):242-245.
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  14. Non-associative public-key cryptography.Arkadius Kalka - 2016 - In Delaram Kahrobaei, Bren Cavallo & David Garber (eds.), Algebra and computer science. Providence, Rhode Island: American Mathematical Society.
     
    Export citation  
     
    Bookmark  
  15.  3
    USACM News: USACM, cryptography, and copyright.Lauren Gelman - 1997 - Acm Sigcas Computers and Society 27 (1):16-17.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  16.  4
    Possible dialogues between power, mathematics and cryptography.Beatriz Fernanda Litoldo & Douglas Ribeiro Guimarães - 2023 - Prometeica - Revista De Filosofía Y Ciencias 27:306-315.
    In this text we discuss how power, mathematics and cryptography establish dialogues that are considered critical for the present, but which have influence from the past and concerns for the future. We contextualize our reflections from a historical perspective, especially in the Brazilian context, and advance the debates about how cryptography, based on mathematical theories, influenced and dynamized wars. Going a little beyond this historical context, we present some reflections concerning the role of cryptography as a means (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  28
    Book Review: Yves Nievergelt, Foundations of Logic and Mathematics: Applications to Computer Science and Cryptography, Birkäuser Verlag, Boston, 2002, €90, pp. 480, ISBN 0-8176-4249-8, hardcover. Dimensions (in inches): 1.00 × 9.96 × 7.36. [REVIEW]Walter A. Carnielli - 2004 - Studia Logica 78 (3):479-481.
    This is a review of Yves Nievergelt, Foundations of Logic and Mathematics: Applications to Computer Science and Cryptography, Birkäuser Verlag, Boston, 2002, €90, pp. 480, ISBN 0-8176-4249-8, hardcover.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  11
    Analysis of a No Equilibrium Linear Resistive-Capacitive-Inductance Shunted Junction Model, Dynamics, Synchronization, and Application to Digital Cryptography in Its Fractional-Order Form.Sifeu Takougang Kingni, Gaetan Fautso Kuiate, Romanic Kengne, Robert Tchitnga & Paul Woafo - 2017 - Complexity:1-12.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  29
    The physics of quantum information: quantum cryptography, quantum teleportation, quantum computation.Armond Duwell - 2003 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 34 (2):331-334.
  20.  56
    Peirce's contribution to american cryptography.Yvan Beaulieu - 2008 - Transactions of the Charles S. Peirce Society 44 (2):pp. 263-287.
    In an undated letter, Peirce claims that he can make a machine that will automatically encrypt and decrypt messages, an astonishing claim considering the state of American science during his time. In two undated manuscripts, Peirce actually describes a cryptosystem, a system for encrypting and decrypting, suggesting the use of arithmetical transformations and binary notation. The relationship between the manuscripts and the letter are discussed in the paper. The paper also describes Peirce’s cryptosystem, places it in its historical context and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  14
    Katherine Ellison. A Cultural History of Early Modern English Cryptography Manuals. xiii + 218 pp., figs., index. London/New York: Routledge, 2017. ISBN 9781472457646. [REVIEW]Karl de Leeuw - 2019 - Isis 110 (1):174-175.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  28
    S. Barry Cooper and Andrew Hodges , The Once and Future Turing: Computing the World. Cambridge University Press, 2016. xviii + 379 pp.— therein: - Martin Davis. Algorithms, Equations, and Logic. pp. 4–19. - J.M.E. Hyland. The Forgotten Turing. pp. 20–33. - Andrew R. Booker. Turing and the Primes. pp. 34–52. - Ueli Maurer. Cryptography and Computation after Turing. pp. 53–77. - Kanti V. Mardia and S. Barry Cooper. Alan Turing and Enigmatic Statistics. pp. 78–89. - Stephen Wolfram. What Alan Turing Might Have Discovered. pp. 92–105. - Christof Teuscher. Designed versus Intrinsic Computation. pp. 106–116. - Solomon Feferman. Turing’s ‘Oracle’: From Absolute to Relative Computability and Back. pp. 300–334. - P.D. Welch. Turing Transcendent: Beyond the Event Horizon. pp. 335–360. - Roger Penrose. On Attempting to Model the Mathematical Mind. pp. 361–378. [REVIEW]Alasdair Urquhart - 2016 - Bulletin of Symbolic Logic 22 (3):354-356.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  70
    Book review: Yves nievergelt, foundations of logic and mathematics: Applications to computer science and cryptography, birkäuser verlag, boston, 2002, €90, pp. 480, ISBN 0-8176-4249-8, hardcover. Dimensions (in inches): 1.00 × 9.96 × 7.36. [REVIEW]Walter A. Carnielli - 2004 - Studia Logica 78 (3):479-481.
    Book review r A. (2004). "Book review: Yves nievergelt, foundations of ...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24.  60
    The physics of quantum information: Quantum cryptography, quantum teleportation, quantum computation - D. bouwmeester, A. Ekert and A. Zeilinger (eds.); Germany, 2000, 314pp, US$ 54, ISBN 3-540-66778-. [REVIEW]A. Duwell - 2003 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 34 (2):331-334.
  25.  10
    Efficient mutual authentication using Kerberos for resource constraint smart meter in advanced metering infrastructure.Md Mehedi Hasan, Noor Afiza Mohd Ariffin & Nor Fazlida Mohd Sani - 2023 - Journal of Intelligent Systems 32 (1).
    The continuous development of information communication technology facilitates the conventional grid in transforming into an automated modern system. Internet-of-Things solutions are used along with the evolving services of end-users to the electricity service provider for smart grid applications. In terms of various devices and machine integration, adequate authentication is the key to an accurate source and destination in advanced metering infrastructure (AMI). Various protocols are deployed to lead the identification between two parties, which require high computation time and communicational bit (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  26. Applications of (Neutro/Anti)sophications to Semihypergroups.A. Rezaei, Florentin Smarandache & S. Mirvakili - 2021 - Journal of Mathematics 2021 (1):1-7.
    A hypergroup, as a generalization of the notion of a group, was introduced by F. Marty in 1934. The first book in hypergroup theory was published by Corsini. Nowadays, hypergroups have found applications to many subjects of pure and applied mathematics, for example, in geometry, topology, cryptography and coding theory, graphs and hypergraphs, probability theory, binary relations, theory of fuzzy and rough sets and automata theory, physics, and also in biological inheritance.
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  6
    Structural analysis of code-based algorithms of the NIST post-quantum call.M. A. González de la Torre, L. Hernández Encinas & J. I. Sánchez García - forthcoming - Logic Journal of the IGPL.
    Code-based cryptography is currently the second most promising post-quantum mathematical tool for quantum-resistant algorithms. Since in 2022 the first post-quantum standard Key Encapsulation Mechanism, Kyber (a latticed-based algorithm), was selected to be established as standard, and after that the National Institute of Standards and Technology post-quantum standardization call focused in code-based cryptosystems. Three of the four candidates that remain in the fourth round are code-based algorithms. In fact, the only non-code-based algorithm (SIKE) is now considered vulnerable. Due to this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  45
    Mercury, or, the Secret and Swift Messenger: Shewing How a Man May with Privacy and Speed Communicate His Thoughts to a Friend at Any Distance ; Together with an Abstract of Dr. Wilkins's Essays Towards a Real Character and a Philosophical Language.John Wilkins - 1708 - John Benjamins. Edited by Brigitte Asbach-Schnitker.
    Language planning comprises a number of different though related aspects of linguistic activity, its proper realm ranging from the 'improvement' of existing ...
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  12
    A client-side approach for privacy-preserving identity federation.Sébastien Canard, Eric Malville & Jacques Traoré - 2009 - Identity in the Information Society 2 (3):269-295.
    Providing Single Sign-On (SSO) between service providers and enabling service providers to share user personal attributes are critical for both users to benefit from a seamless access to their services, and service providers to realize new business opportunities. Today, however, the users have several independent, partial identities spread over different service providers. Providing SSO and attribute sharing requires that links (federations) are established between (partial) identities. In SAML 2.0 (Maler et al. 2003), the links between identities are stored and managed (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  30. Electronic Coins.Craig Warmke - 2022 - Cryptoeconomic Systems 2 (1).
    In the bitcoin whitepaper, Satoshi Nakamoto (2008: 2) defines an electronic coin as a chain of digital signatures. Many have since defined a bitcoin as a chain of digital signatures. This latter definition continues to appear in reports from central banks, advocacy centers, and governments, as well as in academic papers across the disciplines of law, economics, computer science, cryptography, management, and philosophy. Some have even used it to argue that what we now call bitcoin is not the real (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31. Quantum computing.Amit Hagar & Michael Cuffaro - 2019 - Stanford Encyclopedia of Philosophy.
    Combining physics, mathematics and computer science, quantum computing and its sister discipline of quantum information have developed in the past few decades from visionary ideas to two of the most fascinating areas of quantum theory. General interest and excitement in quantum computing was initially triggered by Peter Shor (1994) who showed how a quantum algorithm could exponentially “speed-up” classical computation and factor large numbers into primes far more efficiently than any (known) classical algorithm. Shor’s algorithm was soon followed by several (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  32.  17
    Quantum Chance: Nonlocality, Teleportation and Other Quantum Marvels.Nicolas Gisin - 2014 - Cham: Imprint: Copernicus.
    Quantum physics, which offers an explanation of the world on the smallest scale, has fundamental implications that pose a serious challenge to ordinary logic. Particularly counterintuitive is the notion of entanglement, which has been explored for the past 30 years and posits an ubiquitous randomness capable of manifesting itself simultaneously in more than one place. This amazing 'non-locality' is more than just an abstract curiosity or paradox: it has entirely down-to-earth applications in cryptography, serving for example to protect financial (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  33.  24
    Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption.Xi Chen, Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li & Sichun Du - 2020 - Complexity 2020:1-17.
    In this paper, we propose a method to design the pseudorandom number generator using three kinds of four-wing memristive hyperchaotic systems with different dimensions as multientropy sources. The principle of this method is to obtain pseudorandom numbers with good randomness by coupling XOR operation on the three kinds of FWMHSs with different dimensions. In order to prove its potential application in secure communication, the security of PRNG based on this scheme is analyzed from the perspective of cryptography. In addition, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  34. Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity lie at (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  35.  12
    JSE 31:4 Editorial.Stephen Braude - 2017 - Journal of Scientific Exploration 31 (4).
    Although this issue of the JSE, as usual, contains a diverse cocktail of interesting papers, two of those papers are sufficiently out of the ordinary to deserve a few comments. In this issue, we fearlessly address—for the second time in the JSE’s history—one of the thorniest and most interesting topics in English literature—namely, the debate over Shakespeare authorship. As some current SSE members are undoubtedly aware, many have challenged the orthodox view that the works of Shakespeare were written by the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36. Nonlocality in Quantum Physics.Andrei Anatol Evich Grib & W. A. Rodrigues - 1999 - Springer.
    The nonlocality phenomena exhibited by entangled quantum systems are certainly one of the most extraordinary aspects of quantum theory. This book discusses this phe nomenon according to several points of view, i.e., according to different interpretations of the mathematics of the quantum formalism. The several interpretations of the Copenhagen interpretation, the many worlds, the de Broglie-Bohm, quantum logics, the decohering by the environment approach and the histories approach interpretations are scrutinized and criticized in detail. Recent results on cryptography, quantum (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  15
    What Arrow’s Information Paradox Says.Marco Pedicini & Mario Piazza - 2019 - In Matteo Vincenzo D'Alfonso & Don Berkich (eds.), On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence. Springer Verlag. pp. 83-94.
    Arrow’s information paradox features the most radical kind of information asymmetry by diagnosing an inherent conflict between two parties inclined to exchange information. In this paper, we argue that this paradox is more richly textured than generally supposed by current economic discussion on it and that its meaning encroaches on philosophy. In particular, we uncovers the ‘epistemic’ and more genuine version of the paradox, which looms on our cognitive lives like a sort of tax on curiosity. Finally, we sketch the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  33
    Trust and privacy in the future internet—a research perspective.Dirk Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity lie at (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  16
    Some evidence concerning the genesis of Shannon’s information theory.Samuel W. Thomsen - 2009 - Studies in History and Philosophy of Science Part A 40 (1):81-91.
    A typescript by Claude Shannon, ‘Theorems on statistical sequences’, is examined to shed light on the development of information theory. In particular, it appears that Shannon was still working out the mathematical details of his theory in the spring of 1948, just before he published ‘A mathematical theory of communication’. This is contrasted with evidence from a declassified cryptography report that Shannon’s theory was intuitively worked out in its essentials by the time he filed the report in 1945. Previous (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  29
    Fanged Noumena: collected writings 1987-2007.Nick Land - 2012 - New York, NY: Sequence Press. Edited by Robin Mackay & Ray Brassier.
    A dizzying trip through the mind(s) of the provocative and influential thinker Nick Land. During the 1990s British philosopher Nick Land's unique work, variously described as “rabid nihilism,” “mad black deleuzianism,” and “cybergothic,” developed perhaps the only rigorous and culturally-engaged escape route out of the malaise of “continental philosophy” —a route that was implacably blocked by the academy. However, Land's work has continued to exert an influence, both through the British “speculative realist” philosophers who studied with him, and through the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  41.  10
    Philosophical Explorations of the Legacy of Alan Turing: Turing 100.Alisa Bokulich & Juliet Floyd (eds.) - 2017 - Cham: Imprint: Springer.
    This volume presents an historical and philosophical revisiting of the foundational character of Turing's conceptual contributions and assesses the impact of the work of Alan Turing on the history and philosophy of science. Written by experts from a variety of disciplines, the book draws out the continuing significance of Turing's work. The centennial of Turing's birth in 2012 led to the highly celebrated "Alan Turing Year", which stimulated a world-wide cooperative, interdisciplinary revisiting of his life and work. Turing is widely (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  43.  18
    A model-theoretic characterization of the weak pigeonhole principle.Neil Thapen - 2002 - Annals of Pure and Applied Logic 118 (1-2):175-195.
    We bring together some facts about the weak pigeonhole principle from bounded arithmetic, complexity theory, cryptography and abstract model theory. We characterize the models of arithmetic in which WPHP fails as those which are determined by an initial segment and prove a conditional separation result in bounded arithmetic, that PV + lies strictly between PV and S21 in strength, assuming that the cryptosystem RSA is secure.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  44.  11
    Aura & Transvestment1.Pablo Somonte Ruano - 2021 - Technoetic Arts 19 (3):365-381.
    Aura & Transvestment is a transmedia project consisting of a series of generative images, an experimental form of cryptomedia and a video essay. By describing its own powers and contradictions, the work explores notions of value, ownership, authenticity, artificial scarcity and abundance in the digital realm. The project is a critical analysis of non-fungible tokens used as proof of ownership for digital art, taking Walter Benjamin’s concept of aura as a starting point. It argues that, for tokenized art, cryptography (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  6
    An elementary transition to abstract mathematics.Gove W. Effinger - 2020 - Boca Raton: CRC Press, Taylor & Francis Group. Edited by Gary L. Mullen.
    An Elementary Transition to Abstract Mathematics will help students move from introductory courses to those where rigor and proof play a much greater role. The text is organized into five basic parts: the first looks back on selected topics from pre-calculus and calculus, treating them more rigorously, and it covers various proof techniques; the second part covers induction, sets, functions, cardinality, complex numbers, permutations, and matrices; the third part introduces basic number theory including applications to cryptography; the fourth part (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  28
    Agents of History: Autonomous agents and crypto-intelligence.Bernard Dionysius Geoghegan - 2008 - Interaction Studiesinteraction Studies Social Behaviour and Communication in Biological and Artificial Systems 9 (3):403-414.
    World War II research into cryptography and computing produced methods, instruments and research communities that informed early research into artificial intelligence and semi-autonomous computing. Alan Turing and Claude Shannon in particular adapted this research into early theories and demonstrations of AI based on computers’ abilities to track, predict and compete with opponents. This formed a loosely bound collection of techniques, paradigms, and practices I call crypto-intelligence. Subsequent researchers such as Joseph Weizenbaum adapted crypto-intelligence but also reproduced aspects of its (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Философия на квантовата информация.Vasil Penchev - 2009 - Sofia: BAS: IPhR.
    The book is devoted to the contemporary stage of quantum mechanics – quantum information, and especially to its philosophical interpretation and comprehension: the first one of a series monographs about the philosophy of quantum information. The second will consider Be l l ’ s inequalities, their modified variants and similar to them relations. The beginning of quantum information was in the thirties of the last century. Its speed development has started over the last two decades. The main phenomenon is entanglement. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  6
    Proceedings of the International Workshop on Combinatorial Algorithms, 2007.Ljiljana Brankovic, Yuqing Lin & Bill Smyth (eds.) - 2008 - London: College Publications.
    The International Workshop on Combinatorial Algorithms was established in 1989 as the Australasian Workshop on Combinatorial Algorithms. As a consequence of the workshop's success in attracting mathematicians and computer scientists from around the world, it was decided at the 2006 meeting to go global, to change the workshop's name, and to hold it in appropriate venues around the world. The workshop supports basic research on the interface between mathematics and computing, specifically * Algorithms & Data Structures * Complexity Theory * (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  49. Discrete and continuous: a fundamental dichotomy in mathematics.James Franklin - 2017 - Journal of Humanistic Mathematics 7 (2):355-378.
    The distinction between the discrete and the continuous lies at the heart of mathematics. Discrete mathematics (arithmetic, algebra, combinatorics, graph theory, cryptography, logic) has a set of concepts, techniques, and application areas largely distinct from continuous mathematics (traditional geometry, calculus, most of functional analysis, differential equations, topology). The interaction between the two – for example in computer models of continuous systems such as fluid flow – is a central issue in the applicable mathematics of the last hundred years. This (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  50.  72
    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices.Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli & Kim Smith - 2021 - Complexity 2021:1-15.
    Coordination of a power system with the phasor measurement devices in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 97