Cryptology and Network Security with Machine Learning -

Cryptology and Network Security with Machine Learning (eBook)

Proceedings of ICCNSML 2022
eBook Download: PDF
2023 | 1st ed. 2024
XII, 470 Seiten
Springer Nature Singapore (Verlag)
978-981-99-2229-1 (ISBN)
Systemvoraussetzungen
223,63 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 - 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.

Bimal Kumar Roy is a former Director of the Indian Statistical Institute (ISI), Kolkata. He is Founder and General-Secretary, Cryptology Research Society of India (CRSI). He is a cryptologist from the Cryptology Research Group of the Applied Statistics Unit of ISI, Kolkata. He received Ph.D. in Combinatorics and Optimization in 1982 from the University of Waterloo under the joint supervision of Ronald C. Mullin and Paul Jacob Schellenberg. Currently, he is working on Combinatorics, and application of Statistics in Cryptology and Design of Experiments. In 2015, He was awarded Padma Shri, India's fourth-highest civilian honour, recognizing his accomplishments and contribution to education. In 2019, He was appointed as the chairperson of the National Statistical Commission, Ministry of Statistics and Programme Implementation, Government of India. He has been a driving force in advancing the important field of cryptology in India, elevating its visibility to international level. He devoted his career to strengthening India's standing in this timely, fast advancing field.

 

Atul Chaturvedi is currently working as Professor in Mathematics at PSIT, Kanpur. He has received his M.Sc., M.Phil. and Ph.D from Dr.B.R.A University, Agra. His research interests include Cryptography and Network Security protocols particularly Lattice based cryptography and Non Commutative Ring based cryptography. He is a life member of Cryptology Research Society of India (CRSI), Indian Society for Technical Education (ISTE) and Indian Science Congress Association (ISCA). He has published various books, research papers in reputed journals and reviewer of many International journals. He has been convener of many national and international conferences/workshops in the area of Cryptology & Network Security under the aegis of various prestigious societies/ organizations like DRDO, ISI Kolkata, AICTE, ISTE etc. He is copyright owner of many cryptographic algorithms (from Department of Industrial policy and promotion, Ministry of Commerce, Government of India). He has/is guided/guiding many doctoral research fellows in the area of Cryptography and Network Security. 

 

Boaz Tsaban is an Israeli mathematician at the faculty of Bar-Ilan University working as a capacity of Professor. His research interests include selection principles within Set Theory and Nonabelian Cryptology, within Mathematical Cryptology. At the age of 16 he was selected with other high school students to attend the first cycle of a special preparation program in mathematics, at Bar-Ilan University, being admitted to regular mathematics courses at the University a year later. He has completed his B.Sc., M.Sc. and Ph.D. degrees with highest distinctions. Two years as a post-doctoral fellow at Hebrew University were followed by a three-year Koshland Fellowship at the Weizmann Institute of Science before he joined the Department of Mathematics, Bar-Ilan University in 2007. Tsaban's doctoral dissertation, supervised by Hillel Furstenberg, won, with Irit Dinur, the Nessyahu prize for the best Ph.D. in mathematics in Israel in 2003. In 2009 he won the Wolf Foundation Krill Prize for Excellence in Scientific Research.

 

Sartaj Ul Hasan is working as an Assistant Professor at IIT Jammu. Prior to joining IIT Jammu, he was a Scientist in DRDO, Delhi from February 2007 to January 2018. From September 2011 to December 2012, he was a postdoctoral fellow at Carleton University, Canada, where he worked with Professor Daniel Panario and Professor Qiang Wang. He received his Ph. D. in 2010 from the Indian Institute of Technology Mumbai, where he was a student of Professor Sudhir R. Ghorpade. His main areas of research interests include Finite Fields, Cryptography, and Coding Theory. He is guiding many doctoral candidates in the field of cryptology and editor of many international journals. He has delivered invited talks/guest lecturers in various institutions of international repute.


The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 - 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.
Erscheint lt. Verlag 17.10.2023
Reihe/Serie Algorithms for Intelligent Systems
Zusatzinfo XII, 470 p. 207 illus., 130 illus. in color.
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Naturwissenschaften
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte block chain • Cryptocurrency • Elliptic Curve Cryptography • Hash Functions • ICCNSML 2022 Proceedings • IoT security • lattice based cryptography • Non Commutative Ring Based Cryptography • post quantum cryptography • Public Key Cryptography • Quantum Computing • Security and Privacy in Machine Learning • Wireless Security Protocols
ISBN-10 981-99-2229-1 / 9819922291
ISBN-13 978-981-99-2229-1 / 9789819922291
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 12,1 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90