|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
This book comprehensively reviews the cyber security and privacy
issues in transportation cyber-physical systems (TCPSs). It
examines theories and various state-of-the-art technologies and
methodologies. Starting with a survey of the latest solutions in
TCPSs, it introduces a smart-transport-system architecture design
based on cyber-physical systems. It then discusses in detail the
principles and metrics of evaluating safety and privacy in TCPSs
and elaborates the verification and analysis of secure, robust and
trustworthy TCPSs. Moreover, it demonstrates the advanced and novel
tools commonly used in practice by several researchers. Lastly it
provides an exhaustive case study on the authentication and
attestation in TCPSs. This book is of interest not only to readers
in the field of TCPSs, but also to those in interdisciplinary
fields, such as energy, healthcare, bio-engineering etc.
|
Computational Intelligence, Communications, and Business Analytics
- First International Conference, CICBA 2017, Kolkata, India, March 24 - 25, 2017, Revised Selected Papers, Part II
(Paperback, 1st ed. 2017)
J K Mandal, Paramartha Dutta, Somnath Mukhopadhyay
|
R3,472
Discovery Miles 34 720
|
Ships in 10 - 15 working days
|
|
The two volume set CCIS 775 and 776 constitutes the refereed
proceedings of the First International Conference on Computational
Intelligence, Communications, and Business Analytics, CICBA 2017,
held in Kolkata, India, in March 2017.The 90 revised full papers
presented in the two volumes were carefully reviewed and selected
from 276 submissions. The papers are organized in topical sections
on data science and advanced data analytics; signal processing and
communications; microelectronics, sensors, intelligent networks;
computational forensics (privacy and security); computational
intelligence in bio-computing; computational intelligence in mobile
and quantum computing; intelligent data mining and data
warehousing; computational intelligence.
This book introduces readers to the tools needed to protect IT
resources and communicate with security specialists when there is a
security problem. The book covers a wide range of security topics
including Cryptographic Technologies, Network Security, Security
Management, Information Assurance, Security Applications, Computer
Security, Hardware Security, and Biometrics and Forensics. It
introduces the concepts, techniques, methods, approaches, and
trends needed by security specialists to improve their security
skills and capabilities. Further, it provides a glimpse into future
directions where security techniques, policies, applications, and
theories are headed. The book represents a collection of carefully
selected and reviewed chapters written by diverse security experts
in the listed fields and edited by prominent security researchers.
Complementary slides are available for download on the book's
website at Springer.com.
This book is an introduction to both offensive and defensive
techniques of cyberdeception. Unlike most books on cyberdeception,
this book focuses on methods rather than detection. It treats
cyberdeception techniques that are current, novel, and practical,
and that go well beyond traditional honeypots. It contains features
friendly for classroom use: (1) minimal use of programming details
and mathematics, (2) modular chapters that can be covered in many
orders, (3) exercises with each chapter, and (4) an extensive
reference list.Cyberattacks have grown serious enough that
understanding and using deception is essential to safe operation in
cyberspace. The deception techniques covered are impersonation,
delays, fakes, camouflage, false excuses, and social engineering.
Special attention is devoted to cyberdeception in industrial
control systems and within operating systems. This material is
supported by a detailed discussion of how to plan deceptions and
calculate their detectability and effectiveness. Some of the
chapters provide further technical details of specific deception
techniques and their application. Cyberdeception can be conducted
ethically and efficiently when necessary by following a few basic
principles. This book is intended for advanced undergraduate
students and graduate students, as well as computer professionals
learning on their own. It will be especially useful for anyone who
helps run important and essential computer systems such as
critical-infrastructure and military systems.
The preservation of private data is a main concern of governments,
organizations, and individuals alike. For individuals, a breach in
personal information can mean dire consequences for an individual's
finances, medical information, and personal property. Identity
Theft: Breakthroughs in Research and Practice highlights emerging
perspectives and critical insights into the preservation of
personal data and the complications that can arise when one's
identity is compromised. This critical volume features key research
on methods and technologies for protection, the problems associated
with identity theft, and outlooks for the future. This publication
is an essential resource for information security professionals,
researchers, and graduate-level students in the fields of criminal
science, business, and computer science.
This book focuses on techniques that can be applied at the physical
and data-link layers of communication systems in order to secure
transmissions against eavesdroppers. It discusses topics ranging
from information theory-based security to coding for security and
cryptography, and presents cutting-edge research and innovative
findings from leading researchers. The characteristic feature of
all the contributions in this book is their relevance for the
practical application of security principles to a variety of widely
used communication techniques, including: multiantenna systems,
ultra-wide-band communication systems, power line communications,
and quantum key distribution techniques. A further distinctive
aspect is the attention paid to both unconditional and
computational security techniques, building a bridge between two
usually distinct worlds. The book gathers extended versions of
contributions delivered at the Second Workshop on Communication
Security, held in Paris, France, in April 2017 and affiliated with
the conference EUROCRYPT 2017.
The book summarizes key concepts and theories in trusted computing,
e.g., TPM, TCM, mobile modules, chain of trust, trusted software
stack etc, and discusses the configuration of trusted platforms and
network connections. It also emphasizes the application of such
technologies in practice, extending readers from computer science
and information science researchers to industrial engineers.
Technological innovation and evolution continues to improve
personal and professional lifestyles, as well as general
organizational and business practices; however, these advancements
also create potential issues in the security and privacy of the
user's information. Innovative Solutions for Access Control
Management features a comprehensive discussion on the trending
topics and emergent research in IT security and governance.
Highlighting theoretical frameworks and best practices, as well as
challenges and solutions within the topic of access control and
management, this publication is a pivotal reference source for
researchers, practitioners, students, database vendors, and
organizations within the information technology and computer
science fields.
This book constitutes the thoroughly refereed post-conference
proceedings of the 23rd International Conference on Fast Software
Encryption, held in Bochum, Germany, in March 2016. The 29 revised
full papers presented were carefully reviewed and selected from 86
initial submissions. The papers are organized in topical sections
on operating modes; stream-cipher cryptanalysis; components;
side-channels and implementations; automated tools for
cryptanalysis; designs; block-cipher cryptanalysis; foundations and
theory; and authenticated-encryption and hash function
cryptanalysis.
The two-volume set LNCS 10174 and 10175 constitutes the refereed
proceedings of the 20th IACR International Conference on the
Practice and Theory in Public-Key Cryptography, PKC 2017, held in
Amsterdam, The Netherlands, in March 2017. The 34 revised papers
presented were carefully reviewed and selected from 160
submissions. They are organized in topical sections such as
Cryptanalysis, Protocols, Encryption Schemes, Leakage-Resilient and
Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption
with Access Control, Special Signatures, Fully Homomorphic
Encryption, Real-World Schemes, Multiparty Computation and
Primitives.
The two-volume set LNCS 10174 and 10175 constitutes the refereed
proceedings of the 20th IACR International Conference on the
Practice and Theory in Public-Key Cryptography, PKC 2017, held in
Amsterdam, The Netherlands, in March 2017. The 34 revised papers
presented were carefully reviewed and selected from 160
submissions. They are organized in topical sections such as
Cryptanalysis, Protocols, Encrpytion Schemes, Leakage-Resilient and
Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption
with Access Control, Special Signatures, Fully Homomorphic
Encryption, Real-World Schemes, Multiparty Computation and
Primitives.
This book provides a survey on different kinds of Feistel ciphers,
with their definitions and mathematical/computational properties.
Feistel ciphers are widely used in cryptography in order to obtain
pseudorandom permutations and secret-key block ciphers. In Part 1,
we describe Feistel ciphers and their variants. We also give a
brief story of these ciphers and basic security results. In Part 2,
we describe generic attacks on Feistel ciphers. In Part 3, we give
results on DES and specific Feistel ciphers. Part 4 is devoted to
improved security results. We also give results on
indifferentiability and indistinguishability.
|
You may like...
Database Security
Melissa Zgola, Alfred Basta
Paperback
R1,158
R1,038
Discovery Miles 10 380
|