Download or read book Efficient and Provably Secure Schemes for Vehicular Ad Hoc Networks written by Ikram Ali and published by Springer Nature. This book was released on 2022-01-11 with total page 237 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.
Download or read book Provable Security written by Ron Steinfeld and published by Springer Nature. This book was released on 2019-09-26 with total page 385 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the 13th International Conference on Provable Security, ProvSec 2019, held in Cairns, QLD, Australia, in October 2019. The 18 full and 6 short papers presented were carefully reviewed and selected from 51 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives, including a special theme on “Practical Security.”
Download or read book 2023 4th International Conference on E Commerce and Internet Technology ECIT 2023 written by Vilas Gaikar and published by Springer Nature. This book was released on 2023-07-24 with total page 406 pages. Available in PDF, EPUB and Kindle. Book excerpt: This is an open access book. E-commerce is a commercial activity centered on commodity exchange by means of information network technology. In the open network environment of the Internet, based on the client/server application method, buyers and sellers carry out various commercial activities online, realizing online shopping for consumers, online transactions between merchants and online electronic payment, as well as various business activities, trading activities, financial activities and related comprehensive service activities of a new business operation mode. It is the electronicization, networking and informatization of all aspects of traditional business activities. Internet technology is the prerequisite for e-commerce to be realized. The development and popularization of Internet technology has also played a positive role in promoting the development of e-commerce. Internet technology is a double-edged sword, with advantages and disadvantages, since it can promote the development of e-commerce, it may also affect its normal construction, such as the existence of theft of information, tampering with information, counterfeiting, malicious damage and other security risks, but also through the firewall technology, data encryption technology, authentication technology, digital signature technology and other technologies to regulate the transaction process. Therefore, the influence of the two is mutual, and only through continuous friction can we continuously promote the development of both sides in a benign direction. ECIT 2023 provides a platform in order to Create a forum for sharing, research and exchange at the international level, so that participants can be informed of the latest research directions, results and contents of applied Internet technologies on e-commerce, thus stimulating them to generate new research ideas. Promote the development of e-commerce by studying its problems. To open up new perspectives, broaden horizons and examine the issues under discussion by the participants. Each accepted article requires at least one author to attend the meeting and present it.
Download or read book Advances in Smart Vehicular Technology Transportation Communication and Applications written by Shaoquan Ni and published by Springer Nature. This book was released on 2023-05-14 with total page 578 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book includes selected papers from the fifth International Conference on Smart Vehicular Technology, Transportation, Communication and Applications (VTCA 2022), held in online mode during December 24–26, 2022. The book includes research works from engineers, researchers, and practitioners interested in the advances and applications in the field of vehicle technology and communication. The book covers four tracks, namely (1) vehicular networking security, (2) vehicular electronics, (3) intelligent transportation systems and applications, and (4) smart vehicular communication networks and telematics.
Download or read book Healthcare Analytics and Advanced Computational Intelligence written by Sushruta Mishra and published by CRC Press. This book was released on 2024-07-31 with total page 236 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book aims to apply state-of-the-art advanced computational intelligence frameworks in healthcare. It presents recent and real-life applications of computationally intelligent healthcare. It also discusses problems and solutions to remote healthcare and emergency healthcare services. Healthcare Analytics and Advanced Computational Intelligence highlights modern ambient intelligence-enabled healthcare models along with advanced topics like quantum computing in healthcare and cryptomedical systems. Healthcare Analytics and Advanced Computational Intelligence examines designing the latest medical systems and models that will allow the societal acceptance of ambiance computing in healthcare, medical imaging, health analytics, machine intelligence, sensory computing, medical data analytics, disease detection, telemedicine, and their applications. It includes diverse case studies dealing with various clinical-based applications. These intelligent models are primarily structured to deal with complex real-world issues in clinical data analytics, by means of state-of-the-art techniques with general implementation, domain-specific solutions, or hybrid methods which integrate computational intelligence with conventional statistical methods. The book is written for researchers and academicians in diverse areas. Engineers from technical disciplines such as computer engineering are likely to purchase the book. Various sub-streams such as machine learning, big data analytics, healthcare analytics, and computational intelligence will find the book significant for their curriculum.
Download or read book Security and Privacy in Communication Networks written by Haixin Duan and published by Springer Nature. This book was released on with total page 543 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Optimization Techniques for Decision making and Information Security written by Vinod Kumar and published by Bentham Science Publishers. This book was released on 2024-05-22 with total page 167 pages. Available in PDF, EPUB and Kindle. Book excerpt: Optimization Techniques for Decision-making and Information Security is a scholarly compilation that has been edited by experts with specialized knowledge in the fields of decision theory and cybersecurity. Through the synthesis of an extensive array of information, this edited volume presents novel methodologies and approaches that forge a link between the critical domain of information security and the realm of decision-making processes. The publication commences with a fundamental investigation that establishes the theoretical foundations of information security-relevant decision-making models. The subsequent chapters present comprehensive evaluations of real-world applications, showcasing an assortment of optimization techniques. The book offers a wide range of perspectives on the practical implementation of data analysis in various domains, including but not limited to power generation and optimization, solid transportation problems, soft computing techniques, wireless sensor networks, parametric set-valued optimization problems, data aggregation optimization techniques, fuzzy linear programming problems, and nonlinear chaotic systems. The anthology concludes with a comprehensive summary of the most noteworthy observations and ramifications extracted from the projects of all contributors. Key features - Presents a wide variety of sophisticated optimization methodologies - Explores the intricate intersection of decision theory and the safeguarding of confidential information. - Emphasizes effectiveness in improving decision-making processes designed to strengthen information security measures. - Showcases practical examples in different industrial domains through case studies and real-world problems. - Provides guidance and contemplations on strengthening information security environments. - Includes scientific references for advanced reading This book serves as an essential reference for policymakers, researchers, and professionals who are learning about or working in information security roles.
Download or read book Artificial Intelligence and Security written by Xingming Sun and published by Springer. This book was released on 2019-07-18 with total page 667 pages. Available in PDF, EPUB and Kindle. Book excerpt: The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.
Download or read book Network and System Security written by Joseph K. Liu and published by Springer Nature. This book was released on 2019-12-10 with total page 740 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
Download or read book Advances in Electrical and Computer Technologies written by Thangaprakash Sengodan and published by Springer Nature. This book was released on 2021-02-26 with total page 1335 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book comprises select proceedings of the International Conference on Advances in Electrical and Computer Technologies 2020 (ICAECT 2020). The papers presented in this book are peer-reviewed and cover latest research in electrical, electronics, communication and computer engineering. Topics covered include smart grids, soft computing techniques in power systems, smart energy management systems, power electronics, feedback control systems, biomedical engineering, geo informative systems, grid computing, data mining, image and signal processing, video processing, computer vision, pattern recognition, cloud computing, pervasive computing, intelligent systems, artificial intelligence, neural network and fuzzy logic, broad band communication, mobile and optical communication, network security, VLSI, embedded systems, optical networks and wireless communication. The volume can be useful for students and researchers working in the different overlapping areas of electrical, electronics and communication engineering.
Download or read book Intelligent Information Processing XII written by Zhongzhi Shi and published by Springer Nature. This book was released on with total page 518 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Cyberspace Safety and Security written by Weizhi Meng and published by Springer Nature. This book was released on 2022-01-11 with total page 226 pages. Available in PDF, EPUB and Kindle. Book excerpt: The LNCS 13172 constitute the proceedings of the 13th International Symposium on Cyberspace Safety and Security, CSS 2021, held online, in November 2021. The 9 full papers and 5 short papers presented in this book were carefully reviewed and selected from 35 submissions. The conference focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.
Download or read book Proceedings of Fourth International Conference on Communication Computing and Electronics Systems written by V. Bindhu and published by Springer Nature. This book was released on 2023-03-14 with total page 1048 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book includes high-quality research papers presented at the Fourth International Conference on Communication, Computing and Electronics Systems (ICCCES 2022), held at the PPG Institute of Technology, Coimbatore, India, on September 15–16, 2022. The book focuses mainly on the research trends in cloud computing, mobile computing, artificial intelligence and advanced electronics systems. The topics covered are automation, VLSI, embedded systems, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, communication networks, Internet of things, cyber-physical systems and healthcare informatics.
Download or read book The Cognitive Approach in Cloud Computing and Internet of Things Technologies for Surveillance Tracking Systems written by Dinesh Peter and published by Academic Press. This book was released on 2020-03-14 with total page 203 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Cognitive Approach in Cloud Computing and Internet of Things Technologies for Surveillance Tracking Systems discusses the recent, rapid development of Internet of things (IoT) and its focus on research in smart cities, especially on surveillance tracking systems in which computing devices are widely distributed and huge amounts of dynamic real-time data are collected and processed. Efficient surveillance tracking systems in the Big Data era require the capability of quickly abstracting useful information from the increasing amounts of data. Real-time information fusion is imperative and part of the challenge to mission critical surveillance tasks for various applications. This book presents all of these concepts, with a goal of creating automated IT systems that are capable of resolving problems without demanding human aid. - Examines the current state of surveillance tracking systems, cognitive cloud architecture for resolving critical issues in surveillance tracking systems, and research opportunities in cognitive computing for surveillance tracking systems - Discusses topics including cognitive computing architectures and approaches, cognitive computing and neural networks, complex analytics and machine learning, design of a symbiotic agent for recognizing real space in ubiquitous environments, and more - Covers supervised regression and classification methods, clustering and dimensionality reduction methods, model development for machine learning applications, intelligent machines and deep learning networks - includes coverage of cognitive computing models for scalable environments, privacy and security aspects of surveillance tracking systems, strategies and experiences in cloud architecture and service platform design
Download or read book Vehicular Ad Hoc Network Security and Privacy written by Xiaodong Lin and published by John Wiley & Sons. This book was released on 2015-06-05 with total page 228 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique Richly illustrated with detailed designs and results for all approaches used Introduces standardization and industry activities, and government regulation in secure vehicular networking
Download or read book Innovative Computing and Communications written by Aboul Ella Hassanien and published by Springer Nature. This book was released on with total page 694 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Advances in Data Driven Computing and Intelligent Systems written by Swagatam Das and published by Springer Nature. This book was released on with total page 536 pages. Available in PDF, EPUB and Kindle. Book excerpt: