Advances in Security in Computing and Communications

Advances in Security in Computing and Communications

Author: Jaydip Sen

Publisher: BoD – Books on Demand

Published: 2017-07-19

Total Pages: 194

ISBN-13: 9535133454

DOWNLOAD EBOOK

In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.


Advances in Data Computing, Communication and Security

Advances in Data Computing, Communication and Security

Author: Pankaj Verma

Publisher: Springer Nature

Published: 2022-03-28

Total Pages: 703

ISBN-13: 9811684030

DOWNLOAD EBOOK

This book is a collection of high-quality peer reviewed contributions from the academicians, researchers, practitioners, and industry professionals, accepted in the International Conference on Advances in Data Computing, Communication and Security (I3CS2021) organized by the Department of Electronics and Communication Engineering in collaboration with the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India during 08-10 Sep 2021. The fast pace of advancing technologies and growing expectations of the next-generation requires that the researchers must continuously reinvent themselves through new investigations and development of the new products. The theme of this conference is devised as "Embracing Innovations" for the next-generation data computing and secure communication system.


Security, Privacy and Reliability in Computer Communications and Networks

Security, Privacy and Reliability in Computer Communications and Networks

Author: Kewei Sha

Publisher: River Publishers

Published: 2016-11-30

Total Pages: 446

ISBN-13: 8793379897

DOWNLOAD EBOOK

Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication networks to address the numerous threat and privacy concerns. New research technologies are essential to preserve privacy, prevent attacks, and achieve the requisite reliability. Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols. Technical topics discussed in the book include: Vulnerabilities and Intrusion DetectionCryptographic Algorithms and EvaluationPrivacy Reliable Routing Protocols This book is ideal for personnel in computer communication and networking industries as well as academic staff and collegial, master, Ph.D. students in computer science, computer engineering, cyber security, information insurance and telecommunication systems.


Smart Intelligent Computing and Communication Technology

Smart Intelligent Computing and Communication Technology

Author: V.D. Ambeth Kumar

Publisher: IOS Press

Published: 2021-10-07

Total Pages: 650

ISBN-13: 1643682032

DOWNLOAD EBOOK

Recent developments in the fields of intelligent computing and communication have paved the way for the handling of current and upcoming problems and brought about significant technological advancements. This book presents the proceedings of IConIC 2021, the 4th International Conference on Intelligent Computing, held on 26 and 27 March 2021 in Chennai, India. The principle objective of the annual IConIC conference is to provide an international scientific forum where participants can exchange innovative ideas in relevant fields and interact in depth through discussion with their peer group. The theme of the 2021 conference and this book is ‘Smart Intelligent Computing and Communication Technology’, and the 109 papers included here focus on the technological innovations and trendsetting initiatives in medicine, industry, education and security that are improving and optimizing business and technical processes and enabling inclusive growth. The papers are grouped under 2 headings: Evolution of Computing Intelligence; and Computing and Communication, and cover a broad range of intelligent-computing research and applications. The book provides an overview of the cutting-edge developments and emerging areas of study in the technological fields of intelligent computing, and will be of interest to researchers and practitioners from both academia and industry.


Proceedings of Second International Conference on Computing, Communications, and Cyber-Security

Proceedings of Second International Conference on Computing, Communications, and Cyber-Security

Author: Pradeep Kumar Singh

Publisher: Springer Nature

Published: 2021-05-24

Total Pages: 1027

ISBN-13: 9811607338

DOWNLOAD EBOOK

This book features selected research papers presented at the Second International Conference on Computing, Communications, and Cyber-Security (IC4S 2020), organized in Krishna Engineering College (KEC), Ghaziabad, India, along with Academic Associates; Southern Federal University, Russia; IAC Educational, India; and ITS Mohan Nagar, Ghaziabad, India during 3–4 October 2020. It includes innovative work from researchers, leading innovators, and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.


Advances in Intelligent Computing and Communication

Advances in Intelligent Computing and Communication

Author: Mihir Narayan Mohanty

Publisher: Springer Nature

Published: 2020-01-13

Total Pages: 563

ISBN-13: 9811527741

DOWNLOAD EBOOK

This book features high-quality research papers presented at the 2nd International Conference on Intelligent Computing and Advances in Communication (ICAC 2019), held at Siksha ‘O’ Anusandhan Deemed to be University, Bhubaneswar, Odisha, India, in November 2019. Covering a wide variety of topics, including management of clean and smart energy systems and environmental challenges, it is a valuable resource for researchers and practicing engineers working in various fields of renewable energy generation, and clean and smart energy management.


Innovative Security Solutions for Information Technology and Communications

Innovative Security Solutions for Information Technology and Communications

Author: Diana Maimut

Publisher: Springer Nature

Published: 2021-02-03

Total Pages: 312

ISBN-13: 3030692558

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020. The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more.


At the Nexus of Cybersecurity and Public Policy

At the Nexus of Cybersecurity and Public Policy

Author: National Research Council

Publisher: National Academies Press

Published: 2014-06-16

Total Pages: 170

ISBN-13: 0309303214

DOWNLOAD EBOOK

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.