Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
196 result(s) for "Ciphers History."
Sort by:
Can you crack the code? : a fascinating history of ciphers and cryptography
\"Codes can carry big secrets! Throughout history, lots of good guys and lots of bad guys have used codes to keep their messages under wraps. This fun and flippable nonfiction features stories of hidden treasures, war-time maneuverings, and contemporary hacking as well as explaining the mechanics behind the codes in accessible and kid friendly forms. Sidebars call out activities that invite the reader to try their own hand at cracking and crafting their own secret messages. This is the launch of an exciting new series that invites readers into a STEM topic through compelling historical anecdotes, scientific backup, and DIY projects\"-- Provided by publisher.
Cryptanalysis of a Special Polybius-Like Cipher Using Hill-Climbing
Polybius cipher is a special substitution system widely used during history. In our research, we found several Polybius-like ciphers used in Czecho-slovakia and in the Slovak State from the first half of the 20th century. Various types of this cipher are described in the first Czechoslovak cryptanalysis manual “šifrovací systémy a návod k luštění kryptogramů” by plk. Josef Růžek. It can be also found in the official cryptology directive called G–VII–8 “šifrování” (encryption) from 1938, and another variant in the new version of the same directive from 1946. In this work, we focus on a special Polybius-like cipher inspired by three real ciphers used in Czechoslovakia and in the Slovak State. Two were used during WW2 and one right after the war. We will show how these ciphers were used and how they can be solved with a modern heuristic approach on a personal computer. We evaluate the effectiveness of the Hill-Climbing heuristic methods with restarts. We also investigated several different fitness functions and language models.
Alan Turing : his work and impact
In this 2013 winner of the prestigious R.R. Hawkins Award from the Association of American Publishers, as well as the 2013 PROSE Awards for Mathematics and Best in Physical Sciences Mathematics, also from the AAP, readers will find many of the most significant contributions from the four-volume set of the Collected Works of A. M. Turing. These contributions, together with commentaries from current experts in a wide spectrum of fields and backgrounds, provide insight on the significance and contemporary impact of Alan Turing's work. Offering a more modern perspective than anything currently available, Alan Turing: His Work and Impact gives wide coverage of the many ways in which Turing's scientific endeavors have impacted current research and understanding of the world. His pivotal writings on subjects including computing, artificial intelligence, cryptography, morphogenesis, and more display continued relevance and insight into today's scientific and technological landscape. This collection provides a great service to researchers, but is also an approachable entry point for readers with limited training in the science, but an urge to learn more about the details of Turing's work. 2013 winner of the prestigious R.R. Hawkins Award from the Association of American Publishers, as well as the 2013 PROSE Awards for Mathematics and Best in Physical Sciences Mathematics, also from the AAPNamed a 2013 Notable Computer Book in Computing Milieux by Computing ReviewsAffordable, key collection of the most significant papers by A.M. TuringCommentary explaining the significance of each seminal paper by preeminent leaders in the fieldAdditional resources available online
Unsolved! : the history and mystery of the world's greatest ciphers from ancient Egypt to online secret societies
\"In 1953, a man was found dead from cyanide poisoning near the Philadelphia airport with a picture of a Nazi aircraft in his wallet. Taped to his abdomen was an enciphered message. In 1912, a book dealer named Wilfrid Voynich came into possession of an illuminated cipher manuscript once belonging to Emperor Rudolf II, who was obsessed with alchemy and the occult. Wartime codebreakers tried--and failed--to unlock the book's secrets, and it remains an enigma to this day. In this lively and entertaining book, Craig Bauer examines these and other vexing ciphers yet to be cracked. Some may reveal the identity of a spy or serial killer, provide the location of buried treasure, or expose a secret society--while others may be elaborate hoaxes. Unsolved! begins by explaining the basics of cryptology, and then explores the history behind an array of unsolved ciphers. It looks at ancient ciphers, ciphers created by artists and composers, ciphers left by killers and victims, Cold War ciphers, and many others. Some are infamous, like the ciphers in the Zodiac letters, while others were created purely as intellectual challenges by figures such as Nobel Prize-winning physicist Richard P. Feynman. Bauer lays out the evidence surrounding each cipher, describes the efforts of geniuses and eccentrics--in some cases both--to decipher it, and invites readers to try their hand at puzzles that have stymied so many others. Unsolved! takes readers from the ancient world to the digital age, providing an amazing tour of many of history's greatest unsolved ciphers\"-- Provided by publisher.
The Political Activism of Anthropologist Franz Boas, Citizen Scientist
This book chronicles the life and political action of Franz Boas, a ground-breaking anthropologist whose work denied the notion of racial superiority and introduced the notion of cultural relativity. In addition, he was a fierce pacifist who opposed the entry of the United States into World War I, and organized a powerful organization protecting the free speech of those accused of left-wing sympathies. He was among the first to recognize the strength of a scientist speaking out on political issues. The book will appeal to those interested in issues of race relations and free speech, and those interested in the role of science and scientists in the larger society.
An IoT based remote medical diagnosis system using one time pad cipher over MQTT protocol
Internet of Things (IoT) is an emerging technology that consists of tiny sensors embedded with IoT devices used in e-Health, smart cities and assisted living. IoT devices are equipped with constrained power, memory, and computing capabilities, which creates new security challenges. By integrating sensors and wireless technologies, this cutting-edge technology automates numerous routine tasks in different domains. The main goal of advancing IoT in the existing healthcare system is to automate the monitoring of hospitals and patients’ health by spreading goodwill toward the IoT vision. IoT has gained popularity on practically all platforms that are available. This paper presents a remote patient health monitoring and diagnosis system that uses Message Queuing Telemetry Transport protocol (MQTT) and Internet of Things (IoT) devices with one time pad cryptography. The proposed plan offers end-to-end data secrecy for an IoT system using MQTT that enables e-health and mobility. Patients’ movements inside nursing homes and healthcare facilities are also managed safely without the need for periodic reconfigurations. Prior to communicating through the MQTT protocol, this secure crypto scheme encrypts the message on both the publisher and subscriber ends. According to the results, the proposed scheme is more efficient than delegation-based architecture in terms of security and lightweight communication. The proposed system established communication between patients and medical experts using IoT technologies to alleviate the hospital strain caused by congestion in medical treatment and enable an expressway of medical responses. According to our results the proposed scheme has low computational overhead compared to other solutions that use conventional encryption to guarantee robust protection against most of the IoT security attacks.
Secret history : the story of cryptology
\"Codes are a part of everyday life, from the ubiquitous Universal Price Code (UPC) to postal zip codes. They need not be intended for secrecy. They generally use groups of letters (sometimes pronounceable code words) or numbers to represent other words or phrases. There is typically no mathematical rule to pair an item with its representation in code. A few more examples will serve to illustrate the range of codes\"-- Provided by publisher.
Script and Society
By the 13th century BC, the Syrian city of Ugarit hosted an extremely diverse range of writing practices. As well as two main scripts – alphabetic and logographic cuneiform - the site has also produced inscriptions in a wide range of scripts and languages, including Hurrian, Sumerian, Hittite, Egyptian hieroglyphs, Luwian hieroglyphs and Cypro-Minoan. This variety in script and language is accompanied by writing practices that blend influences from Mesopotamian, Anatolian and Levantine traditions together with what seem to be distinctive local innovations. Script and Society: The Social Context of Writing Practices in Late Bronze Age Ugarit explores the social and cultural context of these complex writing traditions from the perspective of writing as a social practice. It combines archaeology, epigraphy, history and anthropology to present a highly interdisciplinary exploration of social questions relating to writing at the site, including matters of gender, ethnicity, status and other forms of identity, the relationship between writing and place, and the complex relationships between inscribed and uninscribed objects. This forms a case- study for a wider discussion of interdisciplinary approaches to the study of writing practices in the ancient world.