A Nature-Inspired Approach to Cryptology

A Nature-Inspired Approach to Cryptology

Author: Shishir Kumar Shandilya

Publisher: Springer Nature

Published: 2024-01-15

Total Pages: 325

ISBN-13: 9819970814

DOWNLOAD EBOOK

This book introduces nature-inspired algorithms and their applications to modern cryptography. It helps the readers to get into the field of nature-based approaches to solve complex cryptographic issues. This book provides a comprehensive view of nature-inspired research which could be applied in cryptography to strengthen security. It will also explore the novel research directives such as Clever algorithms and immune-based cyber resilience. New experimented nature-inspired approaches are having enough potential to make a huge impact in the field of cryptanalysis. This book gives a lucid introduction to this exciting new field and will promote further research in this domain. The book discusses the current landscape of cryptography and nature-inspired research and will be helpful to prospective students and professionals to explore further.


A Nature-inspired Approach to Cryptology

A Nature-inspired Approach to Cryptology

Author: Shishir Kumar Shandilya

Publisher: Springer

Published: 2023-12-19

Total Pages: 0

ISBN-13: 9789819970803

DOWNLOAD EBOOK

This book introduces nature-inspired algorithms and their applications to modern cryptography. It helps the readers to get into the field of nature-based approaches to solve complex cryptographic issues. This book provides a comprehensive view of nature-inspired research which could be applied in cryptography to strengthen security. It will also explore the novel research directives such as Clever algorithms and immune-based cyber resilience. New experimented nature-inspired approaches are having enough potential to make a huge impact in the field of cryptanalysis. This book gives a lucid introduction to this exciting new field and will promote further research in this domain. The book discusses the current landscape of cryptography and nature-inspired research and will be helpful to prospective students and professionals to explore further.


Nature-Inspired Cyber Security and Resiliency

Nature-Inspired Cyber Security and Resiliency

Author: El-Sayed M. El-Alfy

Publisher: Institution of Engineering and Technology

Published: 2019-04-09

Total Pages: 480

ISBN-13: 1785616382

DOWNLOAD EBOOK

With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality environments. Maintaining their security, trustworthiness and resilience to cyber-attacks has become crucial which requires innovative and creative cyber security and resiliency solutions. Computing algorithms have been developed to mimic the operation of natural processes, phenomena and organisms such as artificial neural networks, swarm intelligence, deep learning systems, biomimicry, and more. The amazing characteristics of these systems offer a plethora of novel methodologies and opportunities to cope with emerging cyber challenges.


Harmony Search and Nature Inspired Optimization Algorithms

Harmony Search and Nature Inspired Optimization Algorithms

Author: Neha Yadav

Publisher: Springer

Published: 2018-08-23

Total Pages: 1209

ISBN-13: 981130761X

DOWNLOAD EBOOK

The book covers different aspects of real-world applications of optimization algorithms. It provides insights from the Fourth International Conference on Harmony Search, Soft Computing and Applications held at BML Munjal University, Gurgaon, India on February 7–9, 2018. It consists of research articles on novel and newly proposed optimization algorithms; the theoretical study of nature-inspired optimization algorithms; numerically established results of nature-inspired optimization algorithms; and real-world applications of optimization algorithms and synthetic benchmarking of optimization algorithms.


Advances in Nature-Inspired Cyber Security and Resilience

Advances in Nature-Inspired Cyber Security and Resilience

Author: Shishir Kumar Shandilya

Publisher: Springer Nature

Published: 2022-04-26

Total Pages: 194

ISBN-13: 3030907082

DOWNLOAD EBOOK

This book presents a comprehensive reference source for dynamic and innovative research in the field of cyber security, focusing on nature-inspired research and applications. The authors present the design and development of future-ready cyber security measures, providing a critical and descriptive examination of all facets of cyber security with a special focus on recent technologies and applications. The book showcases the advanced defensive cyber security mechanism that is a requirement in the industry and highlights measures that provide efficient and fast solutions. The authors explore the potential of AI-based and nature-inspired based computing compatibilities in establishing an adaptive defense mechanism system. The book focuses on current research while highlighting the empirical results along with theoretical concepts to provide a reference for students, researchers, scholars, professionals, and practitioners in the field of cyber security and analytics. This book features contributions from leading scholars from all over the world.


Nature-Inspired Algorithms and Applications

Nature-Inspired Algorithms and Applications

Author: S. Balamurugan

Publisher: John Wiley & Sons

Published: 2021-11-18

Total Pages: 384

ISBN-13: 1119681669

DOWNLOAD EBOOK

Mit diesem Buch soll aufgezeigt werden, wie von der Natur inspirierte Berechnungen eine praktische Anwendung im maschinellen Lernen finden, damit wir ein besseres Verständnis für die Welt um uns herum entwickeln. Der Schwerpunkt liegt auf der Darstellung und Präsentation aktueller Entwicklungen in den Bereichen, in denen von der Natur inspirierte Algorithmen speziell konzipiert und angewandt werden, um komplexe reale Probleme in der Datenanalyse und Mustererkennung zu lösen, und zwar durch Anwendung fachspezifischer Lösungen. Mit einer detaillierten Beschreibung verschiedener, von der Natur inspirierter Algorithmen und ihrer multidisziplinären Anwendung (beispielsweise in Maschinenbau und Elektrotechnik, beim maschinellen Lernen, in der Bildverarbeitung, beim Data Mining und in Drahtlosnetzwerken) ist dieses Buch ein praktisches Nachschlagewerk.


Nature Inspired Computing

Nature Inspired Computing

Author: Bijaya Ketan Panigrahi

Publisher: Springer

Published: 2017-10-03

Total Pages: 214

ISBN-13: 9811067473

DOWNLOAD EBOOK

This volume comprises the select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volumes cover diverse topics ranging from communications networks to big data analytics, and from system architecture to cyber security. This volume focuses on Nature Inspired Computing. The contents of this book will be useful to researchers and students alike.


Nature Inspired Optimization Techniques for Image Processing Applications

Nature Inspired Optimization Techniques for Image Processing Applications

Author: Jude Hemanth

Publisher: Springer

Published: 2018-09-19

Total Pages: 305

ISBN-13: 3319960024

DOWNLOAD EBOOK

This book provides a platform for exploring nature-inspired optimization techniques in the context of imaging applications. Optimization has become part and parcel of all computational vision applications, and since the amount of data used in these applications is vast, the need for optimization techniques has increased exponentially. These accuracy and complexity are a major area of concern when it comes to practical applications. However, these optimization techniques have not yet been fully explored in the context of imaging applications. By presenting interdisciplinary concepts, ranging from optimization to image processing, the book appeals to a broad readership, while also encouraging budding engineers to pursue and employ innovative nature-inspired techniques for image processing applications.


Advances in Cryptology - CRYPTO 2024

Advances in Cryptology - CRYPTO 2024

Author: Leonid Reyzin

Publisher: Springer Nature

Published: 2024

Total Pages: 511

ISBN-13: 3031683919

DOWNLOAD EBOOK

Zusammenfassung: The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments.


Improving Information Security Practices through Computational Intelligence

Improving Information Security Practices through Computational Intelligence

Author: Awad, Wasan Shaker

Publisher: IGI Global

Published: 2015-08-26

Total Pages: 348

ISBN-13: 1466694270

DOWNLOAD EBOOK

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.