Advances in Cyber Security: Principles, Techniques, and Applications -

Advances in Cyber Security: Principles, Techniques, and Applications

Buch | Hardcover
255 Seiten
2019 | 1st ed. 2019
Springer Verlag, Singapore
978-981-13-1482-7 (ISBN)
160,49 inkl. MwSt
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes.



Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.

Kuan-Ching Li is a Professor of Computer Science and Engineering at Providence University, Taiwan. He is a recipient of guest and distinguished chair professorships from universities in China and other countries, and awards and funding support from a number of agencies and industrial companies. He has been actively involved in many major conferences and workshops in program/general/steering conference chairman positions, and has organized numerous conferences on high-performance computing and computational science and engineering. He is a fellow of the IET, senior member of the IEEE and a member of the AAAS; in addition, he is Editor-in-Chief of the International Journal of Computational Science and Engineering (IJCSE), International Journal of Embedded Systems (IJES), and International Journal of High Performance Computing and Networking (IJHPCN). Besides publishing numerous research papers, he is the co-author/co-editor of several technical professional books published by CRC Press, Springer, McGraw-Hill and IGI Global. His research interests include GPU/many-core computing, Big Data, Smart Grids and Cloud. Xiaofeng Chen works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published over 200 research papers in refereed international conferences and journals. He serves on the editorial board of Security and Communication Networks (SCN), Telecommunication Systems (TELS), and Computing and Informatics (CAI), and as an Associate Editor for the International Journal of High Performance Computing and Networking (IJHPCN). He served as general chair of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016) and as program co-chair of the 5th International Conference on Provable Security (ProvSec 2011). Currently, he is a director of the Information Security Center, State Key Laboratory of Integrated Service Networks (ISN), Xidian University, China. Willy Susilo is a Professor at the School of Computing and Information Technology and director of the Institute of Cybersecurity and Cryptology (iC2) at the University of Wollongong. His main research interests include cryptography and cybersecurity. He received a prestigious ARC Future Fellowship from the Australian Research Council. He also received the UOW Researcher Award (2016) in recognition of his research excellence. He has served as an Associate Editor for numerous international journals, such as IEEE Transactions in Information Forensics and Security, and the International Journal of Information Security.

Lightweight Solutions for Public Key Encryption in Resource-Constrained Environments: A Survey of Stateful Public Key Encryption Schemes.- Non-Intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid.- Accountable Anonymous Credentials.- CAPTCHA Design and Security Issues.- Ring Signature.- Data Authentication with Privacy Protection.- A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions.- Pseudonymous Signature Schemes.

Erscheinungsdatum
Zusatzinfo 16 Illustrations, color; 64 Illustrations, black and white; XIX, 255 p. 80 illus., 16 illus. in color.
Verlagsort Singapore
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 981-13-1482-9 / 9811314829
ISBN-13 978-981-13-1482-7 / 9789811314827
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00