Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research

Download Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research PDF Online Free

Author :
Publisher :
ISBN 13 : 9781450309455
Total Pages : 18 pages
Book Rating : 4.3/5 (94 download)

DOWNLOAD NOW!


Book Synopsis Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research by : Frederick T. Sheldon

Download or read book Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research written by Frederick T. Sheldon and published by . This book was released on 2011 with total page 18 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Sixth Annual Cyber Security and Information Intelligence Research Workshop

Download Sixth Annual Cyber Security and Information Intelligence Research Workshop PDF Online Free

Author :
Publisher :
ISBN 13 : 9781450300179
Total Pages : 257 pages
Book Rating : 4.3/5 (1 download)

DOWNLOAD NOW!


Book Synopsis Sixth Annual Cyber Security and Information Intelligence Research Workshop by : Frederick T. Sheldon

Download or read book Sixth Annual Cyber Security and Information Intelligence Research Workshop written by Frederick T. Sheldon and published by . This book was released on 2010 with total page 257 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop

Download Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop PDF Online Free

Author :
Publisher :
ISBN 13 : 9781450316873
Total Pages : 282 pages
Book Rating : 4.3/5 (168 download)

DOWNLOAD NOW!


Book Synopsis Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop by : Frederick Sheldon

Download or read book Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop written by Frederick Sheldon and published by . This book was released on 2013-01-08 with total page 282 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cyber Security and Information Intelligence Jan 08, 2013-Jan 10, 2013 Oak Ridge, USA. You can view more information about this proceeding and all of ACM�s other published conference proceedings from the ACM Digital Library: http://www.acm.org/dl.

Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research

Download Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : pages
Book Rating : 4.:/5 (16 download)

DOWNLOAD NOW!


Book Synopsis Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research by :

Download or read book Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research written by and published by . This book was released on 2011 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R & D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Protecting and trusting information is not unique to the grid. Indeed, the information security market is worth tens of billions of dollars, almost exclusively in cyber security products and services. Yet, solutions designed for the Internet are often not appropriate for securing the energy grid, which has a different set of priorities and communication needs. Any viable information security solution must address those unique challenges and features. The discussion at the CSIIR Workshop was primarily focused about the Energy Infrastructure Cyber Protection (ENCyP) Initiative. ENCyP is a multidisciplinary strategic theme oriented on cyber protection for the most critical and most vulnerable components of Energy Delivery System (EDS). The initiative derived from ORNL's focus on energy and cyber-physical defenses. On this basis we received just over 100 submissions stemming from both novel theoretical and empirical research focused on the many different aspects of ENCyP. We encouraged the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the evolving context ENCyP. Topics included: Security assurance/interoperability for Energy Delivery Systems (EDS) Scalable/trusted control (cyber-physical) systems security Visual analytics for cyber security Next generation control systems vulnerability assessment Wireless Smart Grid security SCADA, EDS communications security test beds Use cases and attack scenarios for EDS Wide area monitoring, protection & control AMI, demand-response, distribution grid management security Electric transportation & distributed energy resources security Policy/standards driven architectures for EDS Anti-tamper device architectures Cryptographic key management for EDS Security risk assessment and management for EDS Insider and life-cycle threats Automated vulnerability detection Access control management and authentication services for EDS Secure information exchange gateway & watchdog switches Bio-Inspired technologies for enhancing EDS cybersecurity A principle goal of the workshop was to foster discussions and dialog among the 210 registered attendees from North and South America, Europe, Asia, and Africa. This goal was initiated and facilitated by 8 plenary keynote addresses including our banquet and reception speakers. There were also six invited speakers, including two panels of government and national laboratory representatives. A total of one hundred and three papers (i.e., extended abstracts [EAs]) were submitted involving over three hundred independent reviews from more than one hundred reviewers. Thirty two percent of the papers that were submitted received two reviews while all of the rest of the papers received three or more. Fifty-four EAs were accepted. Twenty-five posters were invited. All of the EAs, presentations and posters are included in our proceedings. The subject areas span the topics above and were organized into nine tracks: Security Assurance for EDS; Wide Area Monitoring, Protection and Control; Security Risk Assessment; Malware; Cyber Physical Security; Cryptographic Key Management; Use Cases and Attack Scenarios; Smart Grid Advanced Concepts; and Anti-Tamper Devices and Architectures.

Proceedings of Fifth International Congress on Information and Communication Technology

Download Proceedings of Fifth International Congress on Information and Communication Technology PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 9811558566
Total Pages : 666 pages
Book Rating : 4.8/5 (115 download)

DOWNLOAD NOW!


Book Synopsis Proceedings of Fifth International Congress on Information and Communication Technology by : Xin-She Yang

Download or read book Proceedings of Fifth International Congress on Information and Communication Technology written by Xin-She Yang and published by Springer Nature. This book was released on 2020-10-21 with total page 666 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book gathers selected high-quality research papers presented at the Fifth International Congress on Information and Communication Technology, held at Brunel University, London, on February 20–21, 2020. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IoT) and e-mining. Written by respected experts and researchers working on ICT, the book offers a valuable asset for young researchers involved in advanced studies.

Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research

Download Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : pages
Book Rating : 4.:/5 (727 download)

DOWNLOAD NOW!


Book Synopsis Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research by :

Download or read book Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research written by and published by . This book was released on 2010 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: The Annual Cyber Security and Information Intelligence Research Workshop [CSIIRW] was be held at Oak Ridge National Laboratory in Oak Ridge, TN on April 21 - 23, 2010. The aim of this workshop is to introduce and discuss novel theoretical and empirical research focused on (the many) different aspects of software security/dependability, because as we know, the heart of the cyber infrastructure is software. As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value (wiki). The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. Cyber crime is a very serious and growing problem which now has an annual global turnover in the criminal world of more than 1000 BUSD [recent numbers from an FBI white paper] with the hardest hit industries being the banks and the insurance companies. A recent EU study of the banking world showed that more than 60% of cyber crime in banks was carried out by insiders of which ~65% by senior managers. Moreover, cyber security practice and policy is largely heuristic, reactive, and increasingly cumbersome, struggling to keep pace with rapidly evolving threats. Advancing beyond this reactive posture will require a transformation in computing and communication systems architecture and new capabilities that do not merely solve today s plethora of security enigmas, but enable comprehensive game-changing strategies [A Scientific R & D Approach to Cyber Security, C. Catlett, et al., Community-driven report submitted to the DOE, Dec. 2008]. The aim of this workshop is to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. We encourage the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the ever evolving context of cyberspace.

Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research

Download Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research PDF Online Free

Author :
Publisher :
ISBN 13 : 9781605585185
Total Pages : 952 pages
Book Rating : 4.5/5 (851 download)

DOWNLOAD NOW!


Book Synopsis Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research by : Frederick Sheldon

Download or read book Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research written by Frederick Sheldon and published by . This book was released on 2009-04-13 with total page 952 pages. Available in PDF, EPUB and Kindle. Book excerpt: Fifth Cyber Security and Information Intelligence Research Workshop Apr 13, 2009-Apr 15, 2009 Knoxville, USA. You can view more information about this proceeding and all of ACMs other published conference proceedings from the ACM Digital Library: http://www.acm.org/dl.

Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015

Download Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 813222695X
Total Pages : 703 pages
Book Rating : 4.1/5 (322 download)

DOWNLOAD NOW!


Book Synopsis Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 by : Swagatam Das

Download or read book Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 written by Swagatam Das and published by Springer. This book was released on 2015-10-24 with total page 703 pages. Available in PDF, EPUB and Kindle. Book excerpt: The proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications 2015 (FICTA 2015) serves as the knowledge centre not only for scientists and researchers in the field of intelligent computing but also for students of post-graduate level in various engineering disciplines. The book covers a comprehensive overview of the theory, methods, applications and tools of Intelligent Computing. Researchers are now working in interdisciplinary areas and the proceedings of FICTA 2015 plays a major role to accumulate those significant works in one arena. The chapters included in the proceedings inculcates both theoretical as well as practical aspects of different areas like Nature Inspired Algorithms, Fuzzy Systems, Data Mining, Signal Processing, Image processing, Text Processing, Wireless Sensor Networks, Network Security and Cellular Automata.

The GENI Book

Download The GENI Book PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 3319337696
Total Pages : 668 pages
Book Rating : 4.3/5 (193 download)

DOWNLOAD NOW!


Book Synopsis The GENI Book by : Rick McGeer

Download or read book The GENI Book written by Rick McGeer and published by Springer. This book was released on 2016-08-31 with total page 668 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book, edited by four of the leaders of the National Science Foundation’s Global Environment and Network Innovations (GENI) project, gives the reader a tour of the history, architecture, future, and applications of GENI. Built over the past decade by hundreds of leading computer scientists and engineers, GENI is a nationwide network used daily by thousands of computer scientists to explore the next Cloud and Internet and the applications and services they enable, which will transform our communities and our lives. Since by design it runs on existing computing and networking equipment and over the standard commodity Internet, it is poised for explosive growth and transformational impact over the next five years. Over 70 of the builders of GENI have contributed to present its development, architecture, and implementation, both as a standalone US project and as a federated peer with similar projects worldwide, forming the core of a worldwide network. Applications and services enabled by GENI, from smarter cities to intensive collaboration to immersive education, are discussed. The book also explores the concepts and technologies that transform the Internet from a shared transport network to a collection of “slices” -- private, on-the-fly application-specific nationwide networks with guarantees of privacy and responsiveness. The reader will learn the motivation for building GENI and the experience of its precursor infrastructures, the architecture and implementation of the GENI infrastructure, its deployment across the United States and worldwide, the new network applications and services enabled by and running on the GENI infrastructure, and its international collaborations and extensions. This book is useful for academics in the networking and distributed systems areas, Chief Information Officers in the academic, private, and government sectors, and network and information architects.

Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research

Download Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : pages
Book Rating : 4.:/5 (16 download)

DOWNLOAD NOW!


Book Synopsis Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research by :

Download or read book Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research written by and published by . This book was released on 2010 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information, which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value. The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. The aim of this workshop (www.csiir.ornl.gov/csiirw) was to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. Topics include: Scalable trustworthy systems Enterprise-level metrics Coping with insider and life-cycle threats Coping with malware and polymorphism Phishing/whaling, spam and cyber crime High assurance system survivability Cyber security for the Smart Grid Digital provenance and data integrity Privacy-aware security and usable security Social networking models for managing trust and security A principle goal of the workshop was to foster discussions and dialog among the 150 registered attendees from North America, Europe, Asia, and Africa. This goal was initiated and facilitated by 14 plenary keynote addresses including a banquet presentation and the CIO / CTO perspectives panel. A total of 98 papers (i.e., extended abstracts [EAs]) were submitted and 54 EAs were accepted plus 11 posters were invited. All of the abstracts and either presentation materials or posters are included in the proceedings. The subject areas span the topics above and were organized into eight tracks: Trust, Design, Malware, Network, Privacy and Metrics, Enterprise, Survivability and Formal Methods.

ICIW 2013 Proceedings of the 8th International Conference on Information Warfare and Security

Download ICIW 2013 Proceedings of the 8th International Conference on Information Warfare and Security PDF Online Free

Author :
Publisher : Academic Conferences Limited
ISBN 13 : 1909507091
Total Pages : 304 pages
Book Rating : 4.9/5 (95 download)

DOWNLOAD NOW!


Book Synopsis ICIW 2013 Proceedings of the 8th International Conference on Information Warfare and Security by : Doug Hart

Download or read book ICIW 2013 Proceedings of the 8th International Conference on Information Warfare and Security written by Doug Hart and published by Academic Conferences Limited. This book was released on 2013-03-25 with total page 304 pages. Available in PDF, EPUB and Kindle. Book excerpt:

17th International Conference on Information Technology–New Generations (ITNG 2020)

Download 17th International Conference on Information Technology–New Generations (ITNG 2020) PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 3030430200
Total Pages : 691 pages
Book Rating : 4.0/5 (34 download)

DOWNLOAD NOW!


Book Synopsis 17th International Conference on Information Technology–New Generations (ITNG 2020) by : Shahram Latifi

Download or read book 17th International Conference on Information Technology–New Generations (ITNG 2020) written by Shahram Latifi and published by Springer Nature. This book was released on 2020-05-11 with total page 691 pages. Available in PDF, EPUB and Kindle. Book excerpt: This volume presents the 17th International Conference on Information Technology—New Generations (ITNG), and chronicles an annual event on state of the art technologies for digital information and communications. The application of advanced information technology to such domains as astronomy, biology, education, geosciences, security, and healthcare are among the themes explored by the ITNG proceedings. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help information flow to end users are of special interest. Specific topics include Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing. The conference features keynote speakers; a best student contribution award, poster award, and service award; a technical open panel, and workshops/exhibits from industry, government, and academia.

Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research

Download Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : pages
Book Rating : 4.:/5 (727 download)

DOWNLOAD NOW!


Book Synopsis Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research by :

Download or read book Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research written by and published by . This book was released on 2008 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: As our dependence on the cyber infrastructure grows ever larger, more complex and more distributed, the systems that compose it become more prone to failures and/or exploitation. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. Information explosion describes the pervasive abundance of (public/private) information and the effects of such. Gathering, analyzing, and making use of information constitutes a business- / sociopolitical- / military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace "mechanization." The goal of the workshop was to challenge, establish and debate a far-reaching agenda that broadly and comprehensively outlined a strategy for cyber security and information intelligence that is founded on sound principles and technologies. We aimed to discuss novel theoretical and applied research focused on different aspects of software security/dependability, as software is at the heart of the cyber infrastructure.

Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research

Download Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : pages
Book Rating : 4.:/5 (727 download)

DOWNLOAD NOW!


Book Synopsis Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research by :

Download or read book Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research written by and published by . This book was released on 2009 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: Our reliance on the cyber infrastructure has further grown and the dependencies have become more complex. The infrastructure and applications running on it are not generally governed by the rules of bounded systems and inherit the properties of unbounded systems, such as the absence of global control, borders and barriers. Furthermore, the quest for increasing functionality and ease of operation is often at the cost of controllability, potentially opening up avenues for exploitation and failures. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. In the presence of information explosion, i.e., the pervasive abundance of (public/private) information and the effects of such, intelligence has the potential to shift the advantages in the dynamic game of defense and attacks in cyber space. Gathering, analyzing, and making use of information constitutes a business-/sociopolitical-/military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace. The goal of the workshop is to establish, debate and challenge the far-reaching agenda that broadly and comprehensively outlines a strategy for cyber security and information intelligence that is founded on sound principles and technologies.

Critical Information Infrastructure Protection and Resilience in the ICT Sector

Download Critical Information Infrastructure Protection and Resilience in the ICT Sector PDF Online Free

Author :
Publisher : IGI Global
ISBN 13 : 1466629657
Total Pages : 373 pages
Book Rating : 4.4/5 (666 download)

DOWNLOAD NOW!


Book Synopsis Critical Information Infrastructure Protection and Resilience in the ICT Sector by : Théron, Paul

Download or read book Critical Information Infrastructure Protection and Resilience in the ICT Sector written by Théron, Paul and published by IGI Global. This book was released on 2013-02-28 with total page 373 pages. Available in PDF, EPUB and Kindle. Book excerpt: With the progression of technological breakthroughs creating dependencies on telecommunications, the internet, and social networks connecting our society, CIIP (Critical Information Infrastructure Protection) has gained significant focus in order to avoid cyber attacks, cyber hazards, and a general breakdown of services. Critical Information Infrastructure Protection and Resilience in the ICT Sector brings together a variety of empirical research on the resilience in the ICT sector and critical information infrastructure protection in the context of uncertainty and lack of data about potential threats and hazards. This book presents a variety of perspectives on computer science, economy, risk analysis, and social sciences; beneficial to academia, governments, and other organisations engaged or interested in CIIP, Resilience and Emergency Preparedness in the ICT sector.

Cyber Warfare

Download Cyber Warfare PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 3319140396
Total Pages : 326 pages
Book Rating : 4.3/5 (191 download)

DOWNLOAD NOW!


Book Synopsis Cyber Warfare by : Sushil Jajodia

Download or read book Cyber Warfare written by Sushil Jajodia and published by Springer. This book was released on 2015-04-09 with total page 326 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference.

Information Security and Cryptology

Download Information Security and Cryptology PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 3030718522
Total Pages : 503 pages
Book Rating : 4.0/5 (37 download)

DOWNLOAD NOW!


Book Synopsis Information Security and Cryptology by : Yongdong Wu

Download or read book Information Security and Cryptology written by Yongdong Wu and published by Springer Nature. This book was released on 2021-03-12 with total page 503 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020. Due the COVID-19, the conference was held online and physical. The 24 full papers presented together with 8 short papers were carefully reviewed and selected from 79 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications.