home libri books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

li kuan-ching (curatore); chen xiaofeng (curatore); susilo willy (curatore) - advances in cyber security: principles, techniques, and applications

Advances in Cyber Security: Principles, Techniques, and Applications

; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
173,98 €
NICEPRICE
165,28 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 01/2019
Edizione: 1st ed. 2019





Trama

This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes.

Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.






Sommario

Lightweight Solutions for Public Key Encryption in Resource-Constrained Environments: A Survey of Stateful Public Key Encryption Schemes.- Non-Intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid.- Accountable Anonymous Credentials.- CAPTCHA Design and Security Issues.- Ring Signature.- Data Authentication with Privacy Protection.- A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions.- Pseudonymous Signature Schemes.




Autore

Kuan-Ching Li is a Professor of Computer Science and Engineering at Providence University, Taiwan. He is a recipient of guest and distinguished chair professorships from universities in China and other countries, and awards and funding support from a number of agencies and industrial companies. He has been actively involved in many major conferences and workshops in program/general/steering conference chairman positions, and has organized numerous conferences on high-performance computing and computational science and engineering. He is a fellow of the IET, senior member of the IEEE and a member of the AAAS; in addition, he is Editor-in-Chief of the International Journal of Computational Science and Engineering (IJCSE), International Journal of Embedded Systems (IJES), and International Journal of High Performance Computing and Networking (IJHPCN). Besides publishing numerous research papers, he is the co-author/co-editor of several technical professional books published by CRC Press, Springer, McGraw-Hill and IGI Global. His research interests include GPU/many-core computing, Big Data, Smart Grids and Cloud.

Xiaofeng Chen works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published over 200 research papers in refereed international conferences and journals. He serves on the editorial board of Security and Communication Networks (SCN), Telecommunication Systems (TELS), and Computing and Informatics (CAI), and as an Associate Editor for the International Journal of High Performance Computing and Networking (IJHPCN). He served as general chair of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016) and as program co-chair of the 5th International Conference on Provable Security (ProvSec 2011). Currently, he is a director of the Information Security Center, State Key Laboratory of Integrated Service Networks (ISN), Xidian University, China.

Willy Susilo is a Professor at the School of Computing and Information Technology and director of the Institute of Cybersecurity and Cryptology (iC2) at the University of Wollongong. His main research interests include cryptography and cybersecurity. He received a prestigious ARC Future Fellowship from the Australian Research Council. He also received the UOW Researcher Award (2016) in recognition of his research excellence. He has served as an Associate Editor for numerous international journals, such as IEEE Transactions in Information Forensics and Security, and the International Journal of Information Security.












Altre Informazioni

ISBN:

9789811314827

Condizione: Nuovo
Dimensioni: 235 x 155 mm Ø 582 gr
Formato: Copertina rigida
Illustration Notes:XIX, 255 p. 80 illus., 16 illus. in color.
Pagine Arabe: 255
Pagine Romane: xix


Dicono di noi