Muutke küpsiste eelistusi

E-raamat: Advances in Cyber Security: Principles, Techniques, and Applications

Edited by , Edited by , Edited by
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 06-Dec-2018
  • Kirjastus: Springer Verlag, Singapore
  • Keel: eng
  • ISBN-13: 9789811314834
  • Formaat - EPUB+DRM
  • Hind: 172,28 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 06-Dec-2018
  • Kirjastus: Springer Verlag, Singapore
  • Keel: eng
  • ISBN-13: 9789811314834

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes.





Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.
Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment
1(22)
Joonsang Baek
Willy Susilo
Khaled Salah
Jun Su Ha
Ernesto Damiani
Ilsun You
Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid
23(26)
Zijian Zhang
Jialing He
Liehuang Zhu
Kui Ren
Accountable Anonymous Credentials
49(20)
Zuoxia Yu
Man Ho Au
Rupeng Yang
CAPTCHA Design and Security Issues
69(24)
Yang-Wai Chow
Willy Susilo
Pairat Thorncharoensri
Ring Signature
93(22)
Joseph K. Liu
Data Authentication with Privacy Protection
115(28)
Jianghua Liu
Yang Xiang
Wanlei Zhou
Xinyi Huang
Jinhua Ma
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions
143(42)
Jesus Diaz
Seung Geol Choi
David Arroyo
Angelos D. Keromytis
Francisco B. Rodriguez
Moti Yung
Pseudonymous Signature Schemes
185
Przemyslaw Blaskiewicz
Lucjan Hanzlik
Kamil Kluczniak
Lukasz Krzywiecki
Miroslaw Kutylowski
Marcin Slowik
Marta Wszola
Kuan-Ching Li is a Professor of Computer Science and Engineering at Providence University, Taiwan. He is a recipient of guest and distinguished chair professorships from universities in China and other countries, and awards and funding support from a number of agencies and industrial companies. He has been actively involved in many major conferences and workshops in program/general/steering conference chairman positions, and has organized numerous conferences on high-performance computing and computational science and engineering. He is a fellow of the IET, senior member of the IEEE and a member of the AAAS; in addition, he is Editor-in-Chief of the International Journal of Computational Science and Engineering (IJCSE), International Journal of Embedded Systems (IJES), and International Journal of High Performance Computing and Networking (IJHPCN). Besides publishing numerous research papers, he is the co-author/co-editor of several technical professional books published by CRC Press, Springer, McGraw-Hill and IGI Global. His research interests include GPU/many-core computing, Big Data, Smart Grids and Cloud.

Xiaofeng Chen works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published over 200 research papers in refereed international conferences and journals. He serves on the editorial board of Security and Communication Networks (SCN), Telecommunication Systems (TELS), and Computing and Informatics (CAI), and as an Associate Editor for the International Journal of High Performance Computing and Networking (IJHPCN). He served as general chair of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016) and as program co-chair of the 5th International Conference on Provable Security (ProvSec 2011). Currently, he is a director of the Information Security Center, State Key Laboratory of Integrated Service Networks (ISN), Xidian University, China.

Willy Susilo is a Professor at the School of Computing and Information Technology and director of the Institute of Cybersecurity and Cryptology (iC2) at the University of Wollongong. His main research interests include cryptography and cybersecurity. He received a prestigious ARC Future Fellowship from the Australian Research Council. He also received the UOW Researcher Award (2016) in recognition of his research excellence. He has served as an Associate Editor for numerous international journals, such as IEEE Transactions in Information Forensics and Security, and the International Journal of Information Security.