Evolution of Smart Sensing Ecosystems with Tamper Evident Security (Record no. 78777)

000 -LEADER
fixed length control field 04268nam a22005415i 4500
001 - CONTROL NUMBER
control field 978-3-030-77764-7
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801220634.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211130s2021 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783030777647
-- 978-3-030-77764-7
082 04 - CLASSIFICATION NUMBER
Call Number 621.382
100 1# - AUTHOR NAME
Author Sniatala, Pawel.
245 10 - TITLE STATEMENT
Title Evolution of Smart Sensing Ecosystems with Tamper Evident Security
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2021.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIX, 155 p. 80 illus., 70 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Part I: Growth of Sensory devices and their proliferation into daily life -- Smart Objects in Cyber-Physical Systems -- IoT Security -- Part II: Securing the Internet-of-Things enabled Smart Environments -- Understanding the smart systems -- Onboarding new IoT Devices -- Part III Cryptosystems - Foundations and the current state-of-the-art -- Symmetric key Cryptography -- Asymmetric Key Cryptography -- Part IV Modern Encryption Schemes -- Homomorphic Encryption -- Popular Homomorphic Encryption Schemes -- Industrial involvement in the use of Homomorphic Encryption -- Non-malleable cryptosystem -- Machine Learning based Cryptosystems -- Neural Cryptography -- Part V: Creating a Tamper Evident System for the Cyber Era -- Tamper evident system – Our Major Proposition -- Part VI: Feasibility and Performance Analysis -- Implementation Details -- Threat Model -- Part VII: Future Directions -- Quantum Cryptography -- Quantum Tools -- Applications -- Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc This book presents an overview on security and privacy issues in dynamic sensor networks and Internet of Things (IoT) networks and provides a novel tamper evident technique to counter and defend against these security related issues. The mission of this book is to explain the evolution of techniques and strategies in securing information transfer and storage thus facilitating a digital transition towards the modern tamper evident systems. The goal is also to aid business organizations that are dependent on the analysis of the large volumes of generated data in securing and addressing the associated growing threat of attackers relentlessly waging attacks and the challenges in protecting the confidentiality, integrity and provenance of data. The book also provides a comprehensive insight into the secure communication techniques and tools that have evolved and the impact they have had in supporting and flourishing the business through the cyber era. This book also includes chapters that discuss the most primitive encryption schemes to the most recent use of homomorphism in ensuring the privacy of the data thus leveraging greater use of new technologies like cloud computing and others. .
700 1# - AUTHOR 2
Author 2 Iyengar, S.S.
700 1# - AUTHOR 2
Author 2 Ramani, Sanjeev Kaushik.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-030-77764-7
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2021.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Telecommunication.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electric power production.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electrical Power Engineering.
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.