Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

"Information Security and Privacy in the Digital World: Some Selected Topics" ed. by Jaydip Sen, Joceli Mayer

Posted By: exLib
"Information Security and Privacy in the Digital World: Some Selected Topics" ed. by Jaydip Sen, Joceli Mayer

"Information Security and Privacy in the Digital World: Some Selected Topics" ed. by Jaydip Sen, Joceli Mayer
ITexLi | 2023 | ISBN: 1837681961 9781837681969 1837699801 9781837699803 183768197X 9781837681976 | 155 pages | PDF | 21 MB

This book presents some of the state-of-the-art research in the field of cryptography and security in computing and communications. It is a useful resource for researchers, engineers, practitioners, and graduate and doctoral students in the field of cryptography, network security, data privacy issues, and machine learning applications in the security and privacy in the context of the IoT.

In the era of generative artificial intelligence and the Internet of Things (IoT) and while there is explosive growth in the volume of data and the associated need for processing, analysis, and storage, several new challenges have arisen in identifying spurious and fake information and protecting the privacy of sensitive data. This has led to an increasing demand for more robust and resilient schemes for authentication, integrity protection, encryption, non-repudiation, and privacy preservation of data.

Contents
1. Data Privacy Preservation on the Internet of Things
2. Adversarial Attacks on Image Classification Models: FGSM and Patch Attacks and Their Impact
3. Recent Results on Some Word Oriented Stream Ciphers: SNOW 1.0, SNOW 2.0 and SNOW 3G
4. Role of Access Control in Information Security: A Security Analysis Approach
5. Enhanced Hybrid Privacy Preserving Data Mining Technique
6. Review on Watermarking Techniques Aiming Authentication of Digital Image Artistic Works Minted as NFTs into Blockchains
7. Text Watermark Analysis – Concept, Technique, and Applications
8. Application of Computational Intelligence in Visual Quality Optimization Watermarking and Coding Tools to Improve the Medical IoT Platforms Using ECC Cybersecurity Based CoAP Protocol
9. Secured Storage Mechanism for the Cloud-Based Banking Applications Using ECC
10. Verification of Generalizability in Software Log Anomaly Detection Models

1st true PDF with TOC BookMarkLinks

More : You find here