<p>This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resou
Advances in Cyber Security: Principles, Techniques, and Applications
β Scribed by Kuan-Ching Li, Xiaofeng Chen, Willy Susilo
- Publisher
- Springer Singapore
- Year
- 2019
- Tongue
- English
- Leaves
- 270
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes.
Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.
β¦ Table of Contents
Front Matter ....Pages i-xix
Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment (Joonsang Baek, Willy Susilo, Khaled Salah, Jun Su Ha, Ernesto Damiani, Ilsun You)....Pages 1-22
Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid (Zijian Zhang, Jialing He, Liehuang Zhu, Kui Ren)....Pages 23-48
Accountable Anonymous Credentials (Zuoxia Yu, Man Ho Au, Rupeng Yang)....Pages 49-68
CAPTCHA Design and Security Issues (Yang-Wai Chow, Willy Susilo, Pairat Thorncharoensri)....Pages 69-92
Ring Signature (Joseph K. Liu)....Pages 93-114
Data Authentication with Privacy Protection (Jianghua Liu, Yang Xiang, Wanlei Zhou, Xinyi Huang, Jinhua Ma)....Pages 115-142
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions (Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodriguez, Moti Yung)....Pages 143-183
Pseudonymous Signature Schemes (PrzemysΕaw BΕaΕkiewicz, Lucjan Hanzlik, Kamil Kluczniak, Εukasz Krzywiecki, MirosΕaw KutyΕowski, Marcin SΕowik et al.)....Pages 185-255
β¦ Subjects
Computer Science; Coding and Information Theory
π SIMILAR VOLUMES
<p>This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resou
<p><p>This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for pr
<p>The book highlights innovative ideas, cutting-edge findings, and novel techniques, methods and applications touching on all aspects of technology and intelligence in smart city management and services. Above all, it explores developments and applications that are of practical use and value for Cy
The application of data warehousing and data mining techniques to computer security is an important emerging area, as information processing and internet accessibility costs decline and more and more organizations become vulnerable to cyber attacks. These security breaches include attacks on single