Proceedings of International Conference on Network Security and Blockchain Technology
Springer Verlag, Singapore
978-981-99-4432-3 (ISBN)
- Titel nicht im Sortiment
- Artikel merken
Jyotsna Kumar Mandal completed M.Tech. (Computer Science, University of Calcutta) and Ph.D. (Engg., Jadavpur University) in the field of Data Compression and Error Correction Techniques and is Professor of Computer Science and Engineering, University of Kalyani, India; Former Director, IQAC, Kalyani University; Life Member of CSI, CRSI; Associate Member ACM, IEEE; Fellow Member of IETE; Former Dean Faculty of Engineering, Technology & Management, working in the field of Network Security, Steganography, Remote Sensing & GIS Application, and Image Processing; 35 years of teaching and research experiences; twenty-eight scholars were awarded Ph.D., four submitted, and eight are pursuing; the total number of publications is more than four hundred in addition of publication of twelve books from LAP Lambert, Germany, and IGI Global; organized 55 conferences of Springer Nature, Elsevier, IEEE, etc.; edited more than 55 proceedings as corresponding editor/editors; Member of NAAC Peer Teamand AICTE Expert Team of EVC; Academic auditor for universities and institutes; delivered more than 100 expert lectures across the globe; Former Member of Governing Council, IETE, Delhi; and received Siksha Ratna Award from Government of W.B. for outstanding performance of teaching and research. Biswapati Jana completed M.Tech. (Computer Science and Engineering, University of Calcutta) and Ph.D. (Computer Science, Vidyasagar University) in the field of Data Hiding Techniques; Associate Professor in Computer Science, Vidyasagar University, India; 20 years of teaching and research experiences; four scholars awarded Ph.D. and six are pursuing; the total number of publications is more than hundred; and delivered more than 25 expert lectures across the globe. He served as Reviewer for a good number of international journals and conferences. His research interest includes Data Hiding, Image Processing, Data Security, Steganography, and Watermarking. Tzu-Chuen Lu received the B.M. degree (1999) and MSIM degree (2001) in Information Management from Chaoyang University of Technology, Taiwan. She received her Ph.D. degree (2006) in Computer Engineering from National Chung Cheng University. Her current title is Professor in Department of Information Management at Chaoyang University of Technology. Debashis De is Professor in Department of Computer Science and Engineering at Maulana Abul Kalam Azad University of Technology, West Bengal, India. He received M.Tech. from the University of Calcutta, 2002, and a Ph.D. from Jadavpur University in 2005. He is Senior Member, IEEE; Fellow, IETE; and Life Member, CSI. He was awarded the prestigious Boyscast Fellowship by the Department of Science and Technology, Government of India, to work at the Heriot-Watt University, Scotland, UK. He received the Endeavour Fellowship Award from 2008–2009 by DEST Australia to work at the University of Western Australia. He received the Young Scientist Award both in 2005 at New Delhi and in 2011 in Istanbul, Turkey, from the International Union of Radio Science, Belgium. In 2016, he received the JC Bose Research Award by IETE, New Delhi. In 2019, he received Shiksha Ratna Award by the Government of West Bengal. He established the Center of Mobile Cloud Computing (CMCC) for IoT applications. He is Vice Chair of Dew Computing STC of IEEE Computer Society. He published in 320 journals and 200 conference papers, fifteen books, and filed ten patents. His h-index is 36; citation 6300; and listed in Top 2% Scientist List of the world, Stanford University, USA. His research interest is Cloud, IoT, and Quantum Computing.
Machine Learning Based Identification of DDoS Flood Attack in eHealth Cloud Environment.- Machine Learning Based Phishing E-mail Detection using Persuasion Principle and NLP Techniques.- Cryptanalysis and improvement of a mutual authentication scheme for smart grid communications.- Collision Avoidance and Drowsiness Detection System for Drivers.- A New Algorithm for Encryption and Decryption Using AUM Block Sum Labeling.- Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation.- Face Mask Detection Exploiting CNN and MOBILENETV.- Malicious Transaction URL Detection Using Logistic Regression.- Secured Information Communication exploiting Fuzzy weight strategy.- Secure Data Communication Through Improved Multi-Level Pixel Value Ordering using Center-Folding Strategy.- Perseverance of the Audio Data using RNN Implied Matrix Segmentation based Lossless Encoder.- SVD based Watermarking Scheme for Medical Image Authentication.- Watermark based Image Authentication with Coefficient Value Differencing and Histogram Shifting.- IEMS3: An Image Encryption Scheme Using Modified SNOW 3G Algorithm.
Erscheinungsdatum | 29.11.2023 |
---|---|
Reihe/Serie | Lecture Notes in Networks and Systems |
Zusatzinfo | 211 Illustrations, color; 63 Illustrations, black and white; XXVI, 537 p. 274 illus., 211 illus. in color. |
Verlagsort | Singapore |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Mathematik / Informatik ► Informatik ► Datenbanken |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Kryptologie | |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Schlagworte | Blockchain • cyber security • digital watermarking • ICNSBT 2023 Proceedings • Network Security • Social Networking • Supply Chain Management • Virtual Private Networks |
ISBN-10 | 981-99-4432-5 / 9819944325 |
ISBN-13 | 978-981-99-4432-3 / 9789819944323 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich