𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Advances in Cyber Security: Principles, Techniques, and Applications

✍ Scribed by Kuan-Ching Li, Xiaofeng Chen, Willy Susilo


Publisher
Springer Singapore
Year
2019
Tongue
English
Leaves
270
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes.

Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.


✦ Table of Contents


Front Matter ....Pages i-xix
Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment (Joonsang Baek, Willy Susilo, Khaled Salah, Jun Su Ha, Ernesto Damiani, Ilsun You)....Pages 1-22
Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid (Zijian Zhang, Jialing He, Liehuang Zhu, Kui Ren)....Pages 23-48
Accountable Anonymous Credentials (Zuoxia Yu, Man Ho Au, Rupeng Yang)....Pages 49-68
CAPTCHA Design and Security Issues (Yang-Wai Chow, Willy Susilo, Pairat Thorncharoensri)....Pages 69-92
Ring Signature (Joseph K. Liu)....Pages 93-114
Data Authentication with Privacy Protection (Jianghua Liu, Yang Xiang, Wanlei Zhou, Xinyi Huang, Jinhua Ma)....Pages 115-142
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions (Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodriguez, Moti Yung)....Pages 143-183
Pseudonymous Signature Schemes (PrzemysΕ‚aw BΕ‚aΕ›kiewicz, Lucjan Hanzlik, Kamil Kluczniak, Łukasz Krzywiecki, MirosΕ‚aw KutyΕ‚owski, Marcin SΕ‚owik et al.)....Pages 185-255

✦ Subjects


Computer Science; Coding and Information Theory


πŸ“œ SIMILAR VOLUMES


Advances in Cyber Security: Principle, T
✍ Kuan-Ching Li (editor), Xiaofeng Chen (editor), Willy Susilo (editor) πŸ“‚ Library πŸ“… 2019 πŸ› Springer Verlag, Singapore 🌐 English

<p>This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resou

Advances in Cyber Security: Principle, T
✍ Kuan-ching Li (editor), Xiaofeng Chen (editor), Willy Susilo (editor) πŸ“‚ Library πŸ“… 2019 πŸ› Springer-Nature New York Inc 🌐 English

<p>This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resou

International Conference on Applications
✍ Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam (eds.) πŸ“‚ Library πŸ“… 2018 πŸ› Edizioni della Normale 🌐 English

<p><p>This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for pr

International Conference on Applications
✍ Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzz πŸ“‚ Library πŸ“… 2019 πŸ› Springer International Publishing 🌐 English

<p>The book highlights innovative ideas, cutting-edge findings, and novel techniques, methods and applications touching on all aspects of technology and intelligence in smart city management and services. Above all, it explores developments and applications that are of practical use and value for Cy

Data Warehousing and Data Mining Techniq
✍ Anoop Singhal πŸ“‚ Library πŸ“… 2006 🌐 English

The application of data warehousing and data mining techniques to computer security is an important emerging area, as information processing and internet accessibility costs decline and more and more organizations become vulnerable to cyber attacks. These security breaches include attacks on single