Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Advances in Cyber Security: Principles, Techniques, and Applications -

Advances in Cyber Security: Principles, Techniques, and Applications (eBook)

eBook Download: PDF
2018 | 1st ed. 2019
XIX, 255 Seiten
Springer Singapore (Verlag)
978-981-13-1483-4 (ISBN)
Systemvoraussetzungen
160,49 inkl. MwSt
(CHF 156,80)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes.

Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.




Kuan-Ching Li is a Professor of Computer Science and Engineering at Providence University, Taiwan. He is a recipient of guest and distinguished chair professorships from universities in China and other countries, and awards and funding support from a number of agencies and industrial companies. He has been actively involved in many major conferences and workshops in program/general/steering conference chairman positions, and has organized numerous conferences on high-performance computing and computational science and engineering. He is a fellow of the IET, senior member of the IEEE and a member of the AAAS; in addition, he is Editor-in-Chief of the International Journal of Computational Science and Engineering (IJCSE), International Journal of Embedded Systems (IJES), and International Journal of High Performance Computing and Networking (IJHPCN). Besides publishing numerous research papers, he is the co-author/co-editor of several technical professional books published by CRC Press, Springer, McGraw-Hill and IGI Global. His research interests include GPU/many-core computing, Big Data, Smart Grids and Cloud.

Xiaofeng Chen works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published over 200 research papers in refereed international conferences and journals. He serves on the editorial board of Security and Communication Networks (SCN), Telecommunication Systems (TELS), and Computing and Informatics (CAI), and as an Associate Editor for the International Journal of High Performance Computing and Networking (IJHPCN). He served as general chair of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016) and as program co-chair of the 5th International Conference on Provable Security (ProvSec 2011). Currently, he is a director of the Information Security Center, State Key Laboratory of Integrated Service Networks (ISN), Xidian University, China.

Willy Susilo is a Professor at the School of Computing and Information Technology and director of the Institute of Cybersecurity and Cryptology (iC2) at the University of Wollongong. His main research interests include cryptography and cybersecurity. He received a prestigious ARC Future Fellowship from the Australian Research Council. He also received the UOW Researcher Award (2016) in recognition of his research excellence. He has served as an Associate Editor for numerous international journals, such as IEEE Transactions in Information Forensics and Security, and the International Journal of Information Security.



This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes.Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.

Kuan-Ching Li is a Professor of Computer Science and Engineering at Providence University, Taiwan. He is a recipient of guest and distinguished chair professorships from universities in China and other countries, and awards and funding support from a number of agencies and industrial companies. He has been actively involved in many major conferences and workshops in program/general/steering conference chairman positions, and has organized numerous conferences on high-performance computing and computational science and engineering. He is a fellow of the IET, senior member of the IEEE and a member of the AAAS; in addition, he is Editor-in-Chief of the International Journal of Computational Science and Engineering (IJCSE), International Journal of Embedded Systems (IJES), and International Journal of High Performance Computing and Networking (IJHPCN). Besides publishing numerous research papers, he is the co-author/co-editor of several technical professional books published by CRC Press, Springer, McGraw-Hill and IGI Global. His research interests include GPU/many-core computing, Big Data, Smart Grids and Cloud.Xiaofeng Chen works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published over 200 research papers in refereed international conferences and journals. He serves on the editorial board of Security and Communication Networks (SCN), Telecommunication Systems (TELS), and Computing and Informatics (CAI), and as an Associate Editor for the International Journal of High Performance Computing and Networking (IJHPCN). He served as general chair of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016) and as program co-chair of the 5th International Conference on Provable Security (ProvSec 2011). Currently, he is a director of the Information Security Center, State Key Laboratory of Integrated Service Networks (ISN), Xidian University, China. Willy Susilo is a Professor at the School of Computing and Information Technology and director of the Institute of Cybersecurity and Cryptology (iC2) at the University of Wollongong. His main research interests include cryptography and cybersecurity. He received a prestigious ARC Future Fellowship from the Australian Research Council. He also received the UOW Researcher Award (2016) in recognition of his research excellence. He has served as an Associate Editor for numerous international journals, such as IEEE Transactions in Information Forensics and Security, and the International Journal of Information Security.

Lightweight Solutions for Public Key Encryption in Resource-Constrained Environments: A Survey of Stateful Public Key Encryption Schemes.- Non-Intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid.- Accountable Anonymous Credentials.- CAPTCHA Design and Security Issues.- Ring Signature.- Data Authentication with Privacy Protection.- A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions.- Pseudonymous Signature Schemes.

Erscheint lt. Verlag 6.12.2018
Zusatzinfo XIX, 255 p. 80 illus., 16 illus. in color.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Naturwissenschaften
Schlagworte authentication • Cloud Security • Cryptology • cyber security • Data leak • data privacy • Encryption • Formal Methods Application in Security • Information Forensics • Information Security • insider attack • Network Security • Physical Layer Security • Security Policies and Trust Management • Threat intelligence
ISBN-10 981-13-1483-7 / 9811314837
ISBN-13 978-981-13-1483-4 / 9789811314834
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 5,6 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95