|
Showing 1 - 4 of
4 matches in All Departments
This book provides awareness of methods used for functional
encryption in the academic and professional communities. The book
covers functional encryption algorithms and its modern applications
in developing secure systems via entity authentication, message
authentication, software security, cyber security, hardware
security, Internet of Thing (IoT), cloud security, smart card
technology, CAPTCHA, digital signature, and digital watermarking.
This book is organized into fifteen chapters; topics include
foundations of functional encryption, impact of group theory in
cryptosystems, elliptic curve cryptography, XTR algorithm, pairing
based cryptography, NTRU algorithms, ring units, cocks IBE schemes,
Boneh-Franklin IBE, Sakai-Kasahara IBE, hierarchical identity based
encryption, attribute based Encryption, extensions of IBE and
related primitives, and digital signatures. Explains the latest
functional encryption algorithms in a simple way with examples;
Includes applications of functional encryption in information
security, application security, and network security; Relevant to
academics, research scholars, software developers, etc.
This book provides awareness of methods used for functional
encryption in the academic and professional communities. The book
covers functional encryption algorithms and its modern applications
in developing secure systems via entity authentication, message
authentication, software security, cyber security, hardware
security, Internet of Thing (IoT), cloud security, smart card
technology, CAPTCHA, digital signature, and digital watermarking.
This book is organized into fifteen chapters; topics include
foundations of functional encryption, impact of group theory in
cryptosystems, elliptic curve cryptography, XTR algorithm, pairing
based cryptography, NTRU algorithms, ring units, cocks IBE schemes,
Boneh-Franklin IBE, Sakai-Kasahara IBE, hierarchical identity based
encryption, attribute based Encryption, extensions of IBE and
related primitives, and digital signatures. Explains the latest
functional encryption algorithms in a simple way with examples;
Includes applications of functional encryption in information
security, application security, and network security; Relevant to
academics, research scholars, software developers, etc.
Cyber security is the protection of information systems, hardware,
software, and information as well from theft, damages, interruption
or misdirection to any of these resources. In other words, cyber
security focuses on protecting computers, networks, programs and
data (in use, in rest, in motion) from unauthorized or unintended
access, change or destruction. Therefore, strengthening the
security and resilience of cyberspace has become a vital homeland
security mission. Cyber security attacks are growing exponentially.
Security specialists must occupy in the lab, concocting new schemes
to preserve the resources and to control any new attacks.
Therefore, there are various emerging algorithms and techniques
viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based
Cryptography McEliece, Niederreiter, NTRU,
Goldreich-Goldwasser-Halevi, Identity Based Encryption, and
Attribute Based Encryption. There are numerous applications of
security algorithms like cyber security, web security, e-commerce,
database security, smart card technology, mobile security, cloud
security, digital signature, etc. The book offers comprehensive
coverage of the most essential topics, including: Modular
Arithmetic, Finite Fields Prime Number, DLP, Integer Factorization
Problem Symmetric Cryptography Asymmetric Cryptography Post-Quantum
Cryptography Identity Based Encryption Attribute Based Encryption
Key Management Entity Authentication, Message Authentication
Digital Signatures Hands-On "SageMath" This book serves as a
textbook/reference book for UG, PG, PhD students, Teachers,
Researchers and Engineers in the disciplines of Information
Technology, Computer Science and Engineering, and Electronics and
Communication Engineering.
Opportunistic networks allow mobile users to share information
without any network infrastructure.This book is suitable for both
undergraduates and postgraduates as it discusses various aspects of
opportunistic networking including, foundations of ad hoc network;
taxonomy of mobility models, etc.
|
You may like...
The SABC 8
Foeta Krige
Paperback
R358
Discovery Miles 3 580
|