Cryptographic Agility and Interoperability

Cryptographic Agility and Interoperability PDF

Author: National Academies of Sciences, Engineering, and Medicine

Publisher: National Academies Press

Published: 2017-02-03

Total Pages: 91

ISBN-13: 0309453569

DOWNLOAD EBOOK →

In May 2016, the National Academies of Sciences, Engineering, and Medicine hosted a workshop on Cryptographic Agility and Interoperability. Speakers at the workshop discussed the history and practice of cryptography, its current challenges, and its future possibilities. This publication summarizes the presentations and discussions from the workshop.

Rethinking the Regulation of Cryptoassets

Rethinking the Regulation of Cryptoassets PDF

Author: Johnstone, Syren

Publisher: Edward Elgar Publishing

Published: 2021-09-21

Total Pages: 328

ISBN-13: 1800886799

DOWNLOAD EBOOK →

This thought-provoking book challenges the way we think about regulating cryptoassets. Bringing a timely new perspective, Syren Johnstone critiques the application of a financial regulation narrative to cryptoassets, questioning the assumptions on which it is based and whether regulations developed in the 20th century remain fit to apply to a technology emerging in the 21st.

Advances in Information and Computer Security

Advances in Information and Computer Security PDF

Author: Nuttapong Attrapadung

Publisher: Springer

Published: 2019-08-07

Total Pages: 412

ISBN-13: 3030268349

DOWNLOAD EBOOK →

This book constitutes the refereed proceedings of the 14th International Workshop on Security, IWSEC 2019, held in Tokyo, Japan, in August 2019. The 18 regular papers and 5 short papers presented in this volume were carefully reviewed and selected from 61 submissions. They were organized in topical sections named: Public-Key Primitives; Cryptanalysis on Public-Key Primitives; Cryptographic Protocols; Symmetric-Key Primitives; Malware Detection and Classification; Intrusion Detection and Prevention; Web and Usable Security; Cryptanalysis on Symmetric-Key Primitives; and Forensics.

Foundations and Practice of Security

Foundations and Practice of Security PDF

Author: Guy-Vincent Jourdan

Publisher: Springer Nature

Published: 2023-03-31

Total Pages: 478

ISBN-13: 3031301226

DOWNLOAD EBOOK →

This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12–14, 2022. The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.

Computer Security – ESORICS 2020

Computer Security – ESORICS 2020 PDF

Author: Liqun Chen

Publisher: Springer Nature

Published: 2020-09-12

Total Pages: 769

ISBN-13: 3030590135

DOWNLOAD EBOOK →

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.

Software Update as a Mechanism for Resilience and Security

Software Update as a Mechanism for Resilience and Security PDF

Author: National Academies of Sciences, Engineering, and Medicine

Publisher: National Academies Press

Published: 2017-09-25

Total Pages: 97

ISBN-13: 0309462916

DOWNLOAD EBOOK →

Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies. To explore the landscape further, the Forum on Cyber Resilience hosted a workshop featuring invited speakers from government, the private sector, and academia. This publication summarizes the presentations and discussions from the workshop.

Quantum Computing

Quantum Computing PDF

Author: National Academies of Sciences, Engineering, and Medicine

Publisher: National Academies Press

Published: 2019-04-27

Total Pages: 273

ISBN-13: 030947969X

DOWNLOAD EBOOK →

Quantum mechanics, the subfield of physics that describes the behavior of very small (quantum) particles, provides the basis for a new paradigm of computing. First proposed in the 1980s as a way to improve computational modeling of quantum systems, the field of quantum computing has recently garnered significant attention due to progress in building small-scale devices. However, significant technical advances will be required before a large-scale, practical quantum computer can be achieved. Quantum Computing: Progress and Prospects provides an introduction to the field, including the unique characteristics and constraints of the technology, and assesses the feasibility and implications of creating a functional quantum computer capable of addressing real-world problems. This report considers hardware and software requirements, quantum algorithms, drivers of advances in quantum computing and quantum devices, benchmarks associated with relevant use cases, the time and resources required, and how to assess the probability of success.

Recoverability as a First-Class Security Objective

Recoverability as a First-Class Security Objective PDF

Author: National Academies of Sciences, Engineering, and Medicine

Publisher: National Academies Press

Published: 2018-11-01

Total Pages: 61

ISBN-13: 0309483700

DOWNLOAD EBOOK →

The Forum on Cyber Resilience of the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Recoverability as a First-Class Security Objective on February 8, 2018, in Washington, D.C. The workshop featured presentations from several experts in industry, research, and government roles who spoke about the complex facets of recoverabilityâ€"that is, the ability to restore normal operations and security in a system affected by software or hardware failure or a deliberate attack. This publication summarizes the presentations and discussions from the workshop.

Implications of Artificial Intelligence for Cybersecurity

Implications of Artificial Intelligence for Cybersecurity PDF

Author: National Academies of Sciences, Engineering, and Medicine

Publisher: National Academies Press

Published: 2020-01-27

Total Pages: 99

ISBN-13: 0309494508

DOWNLOAD EBOOK →

In recent years, interest and progress in the area of artificial intelligence (AI) and machine learning (ML) have boomed, with new applications vigorously pursued across many sectors. At the same time, the computing and communications technologies on which we have come to rely present serious security concerns: cyberattacks have escalated in number, frequency, and impact, drawing increased attention to the vulnerabilities of cyber systems and the need to increase their security. In the face of this changing landscape, there is significant concern and interest among policymakers, security practitioners, technologists, researchers, and the public about the potential implications of AI and ML for cybersecurity. The National Academies of Sciences, Engineering, and Medicine convened a workshop on March 12-13, 2019 to discuss and explore these concerns. This publication summarizes the presentations and discussions from the workshop.