|
Showing 1 - 11 of
11 matches in All Departments
This handbook is a selection of foundational aspects, security
analysis, platforms, and applications of blockchains that consists
of four parts. The first part introduces the basic building blocks
such as distributed computing and cryptography. Consensus
algorithms that form the basic backbone of blockchain protocols are
presented. Various cryptographic tools like hash functions, digital
signatures and commitment schemes are also introduced. Advanced
cryptographic techniques such as zero knowledge protocols, secret
sharing, verifiable random functions that are used for
privacy-preserving and secure design are discussed. The
second part of this handbook consists of popular blockchain designs
and platforms. Architecture of Bitcoin, Ethereum, Monero,
Tendermint and Algorand have been presented. Various important
issues like scalability and security are discussed in the third
part. Security design challenges, security vulnerabilities and
their analysis are discussed. The final part of this handbook
discusses various applications of blockchains. These include
supply-chain, identity and credential management, Internet of
Things (IoT), data-sharing, e-voting, e-governance, e-health, smart
cities, and Industry 4.0. Research challenges and directions of
future work are included in this handbook. This comprehensive
reference targets students and researchers, who are starting to
explore blockchain. Professionals working in blockchain security
and applications will find this handbook to be a valuable
reference.
|
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
|
R2,767
Discovery Miles 27 670
|
Ships in 10 - 15 working days
|
This two-volume set of LNCS 12146 and 12147 constitutes the
refereed proceedings of the 18th International Conference on
Applied Cryptography and Network Security, ACNS 2020, held in Rome,
Italy, in October 2020.The conference was held virtually due to the
COVID-19 pandemic. The 46 revised full papers presented were
carefully reviewed and selected from 214 submissions. The papers
were organized in topical sections named: cryptographic protocols
cryptographic primitives, attacks on cryptographic primitives,
encryption and signature, blockchain and cryptocurrency, secure
multi-party computation, post-quantum cryptography.
This book provides readers with up-to-date research of emerging
cyber threats and defensive mechanisms, which are timely and
essential. It covers cyber threat intelligence concepts against a
range of threat actors and threat tools (i.e. ransomware) in
cutting-edge technologies, i.e., Internet of Things (IoT), Cloud
computing and mobile devices. This book also provides the technical
information on cyber-threat detection methods required for the
researcher and digital forensics experts, in order to build
intelligent automated systems to fight against advanced
cybercrimes. The ever increasing number of cyber-attacks requires
the cyber security and forensic specialists to detect, analyze and
defend against the cyber threats in almost real-time, and with such
a large number of attacks is not possible without deeply perusing
the attack features and taking corresponding intelligent defensive
actions - this in essence defines cyber threat intelligence notion.
However, such intelligence would not be possible without the aid of
artificial intelligence, machine learning and advanced data mining
techniques to collect, analyze, and interpret cyber-attack
campaigns which is covered in this book. This book will focus on
cutting-edge research from both academia and industry, with a
particular emphasis on providing wider knowledge of the field,
novelty of approaches, combination of tools and so forth to
perceive reason, learn and act on a wide range of data collected
from different cyber security and forensics solutions. This book
introduces the notion of cyber threat intelligence and analytics
and presents different attempts in utilizing machine learning and
data mining techniques to create threat feeds for a range of
consumers. Moreover, this book sheds light on existing and emerging
trends in the field which could pave the way for future works. The
inter-disciplinary nature of this book, makes it suitable for a
wide range of audiences with backgrounds in artificial
intelligence, cyber security, forensics, big data and data mining,
distributed systems and computer networks. This would include
industry professionals, advanced-level students and researchers
that work within these related fields.
This book provides readers with up-to-date research of emerging
cyber threats and defensive mechanisms, which are timely and
essential. It covers cyber threat intelligence concepts against a
range of threat actors and threat tools (i.e. ransomware) in
cutting-edge technologies, i.e., Internet of Things (IoT), Cloud
computing and mobile devices. This book also provides the technical
information on cyber-threat detection methods required for the
researcher and digital forensics experts, in order to build
intelligent automated systems to fight against advanced
cybercrimes. The ever increasing number of cyber-attacks requires
the cyber security and forensic specialists to detect, analyze and
defend against the cyber threats in almost real-time, and with such
a large number of attacks is not possible without deeply perusing
the attack features and taking corresponding intelligent defensive
actions - this in essence defines cyber threat intelligence notion.
However, such intelligence would not be possible without the aid of
artificial intelligence, machine learning and advanced data mining
techniques to collect, analyze, and interpret cyber-attack
campaigns which is covered in this book. This book will focus on
cutting-edge research from both academia and industry, with a
particular emphasis on providing wider knowledge of the field,
novelty of approaches, combination of tools and so forth to
perceive reason, learn and act on a wide range of data collected
from different cyber security and forensics solutions. This book
introduces the notion of cyber threat intelligence and analytics
and presents different attempts in utilizing machine learning and
data mining techniques to create threat feeds for a range of
consumers. Moreover, this book sheds light on existing and emerging
trends in the field which could pave the way for future works. The
inter-disciplinary nature of this book, makes it suitable for a
wide range of audiences with backgrounds in artificial
intelligence, cyber security, forensics, big data and data mining,
distributed systems and computer networks. This would include
industry professionals, advanced-level students and researchers
that work within these related fields.
The LNCS 13172 constitute the proceedings of the 13th International
Symposium on Cyberspace Safety and Security, CSS 2021, held online,
in November 2021.The 9 full papers and 5 short papers presented in
this book were carefully reviewed and selected from 35 submissions.
The conference focuses on Cyberspace Safety and Security, such as
authentication, access control, availability, integrity, privacy,
confidentiality, dependability and sustainability issues of
cyberspace.
|
Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings (Paperback, 1st ed. 2021)
Mauro Conti, Marc Stevens, Stephan Krenn
|
R2,789
Discovery Miles 27 890
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 20th
International Conference on Cryptology and Network Security, CANS
2021, which was held during December 13-15, 2021. The conference
was originally planned to take place in Vienna, Austria, and
changed to an online event due to the COVID-19 pandemic.The 25 full
and 3 short papers presented in these proceedings were carefully
reviewed and selected from 85 submissions. They were organized in
topical sections as follows: Encryption; signatures; cryptographic
schemes and protocols; attacks and counter-measures; and
attestation and verification.
|
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings (Paperback, 1st ed. 2020)
Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man-Ho Au, Lejla Batina, …
|
R3,309
Discovery Miles 33 090
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the satellite workshops
held around the 18th International Conference on Applied
Cryptography and Network Security, ACNS 2020, in Rome, Italy, in
October 2020. The 31 papers presented in this volume were carefully
reviewed and selected from 65 submissions. They stem from the
following workshops: AIBlock 2020: Second International Workshop on
Application Intelligence and Blockchain Security AIHWS 2020: First
International Workshop on Artificial Intelligence in Hardware
Security AIoTS 2020: Second International Workshop on Artificial
Intelligence and Industrial Internet-of-Things Security Cloud
S&P 2020: Second International Workshop on Cloud Security and
Privacy SCI 2020: First International Workshop on Secure
Cryptographic Implementation SecMT 2020: First International
Workshop on Security in Mobile Technologies SiMLA 2020: Second
International Workshop on Security in Machine Learning and its
Applications
|
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
|
R2,520
Discovery Miles 25 200
|
Ships in 10 - 15 working days
|
This two-volume set of LNCS 12146 and 12147 constitutes the
refereed proceedings of the 18th International Conference on
Applied Cryptography and Network Security, ACNS 2020, held in Rome,
Italy, in October 2020. The conference was held virtually due to
the COVID-19 pandemic. The 46 revised full papers presented were
carefully reviewed and selected from 214 submissions. The papers
were organized in topical sections named: cryptographic protocols
cryptographic primitives, attacks on cryptographic primitives,
encryption and signature, blockchain and cryptocurrency, secure
multi-party computation, post-quantum cryptography.
This book constitutes the proceedings of the 15th International
Workshop on Security and Trust Management, STM 2019, held in
Luxembourg City, Luxembourg, in September 2019, and co-located with
the 24th European Symposium Research in Computer Security, ESORICS
2019. The 9 full papers and 1 short paper were carefully reviewed
and selected from 23 submissions. The papers present novel research
on all theoretical and practical aspects of security and trust in
ICTs.
|
Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings (Paperback, 1st ed. 2015)
Mauro Conti, Matthias Schunter, Ioannis Askoxylakis
|
R2,554
Discovery Miles 25 540
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 8th
International Conference on Trust and Trustworthy Computing, TRUST
2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full
papers and 3 short papers presented in this volume were carefully
reviewed and selected from 42 submissions. They were organized in
topical sections named: hardware-enhanced trusted execution; trust
and users; trusted systems and services; trust and privacy; and
building blocks for trust. There are 7 two-page abstracts of poster
papers included in the back matter of the volume.
|
Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings (Paperback, 1st ed. 2016)
Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti
|
R3,235
Discovery Miles 32 350
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 12th
International Conference on Information Systems Security, ICISS
2016, held in Jaipur, India, in December 2016. The 24 revised full
papers and 8 short papers presented together with 4 invited papers
were carefully reviewed and selected from 196 submissions. The
papers address the following topics: attacks and mitigation;
authentication; authorization and information flow control; crypto
systems and protocols; network security and intrusion detection;
privacy; software security; and wireless, mobile and IoT security.
|
|