語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Evolution of Smart Sensing Ecosystem...
~
SpringerLink (Online service)
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Evolution of Smart Sensing Ecosystems with Tamper Evident Security/ by Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani.
作者:
Sniatala, Pawel.
其他作者:
Ramani, Sanjeev Kaushik.
面頁冊數:
XIX, 155 p. 80 illus., 70 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Energy Systems. -
電子資源:
https://doi.org/10.1007/978-3-030-77764-7
ISBN:
9783030777647
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
Sniatala, Pawel.
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
[electronic resource] /by Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani. - 1st ed. 2021. - XIX, 155 p. 80 illus., 70 illus. in color.online resource.
Introduction -- Part I: Growth of Sensory devices and their proliferation into daily life -- Smart Objects in Cyber-Physical Systems -- IoT Security -- Part II: Securing the Internet-of-Things enabled Smart Environments -- Understanding the smart systems -- Onboarding new IoT Devices -- Part III Cryptosystems - Foundations and the current state-of-the-art -- Symmetric key Cryptography -- Asymmetric Key Cryptography -- Part IV Modern Encryption Schemes -- Homomorphic Encryption -- Popular Homomorphic Encryption Schemes -- Industrial involvement in the use of Homomorphic Encryption -- Non-malleable cryptosystem -- Machine Learning based Cryptosystems -- Neural Cryptography -- Part V: Creating a Tamper Evident System for the Cyber Era -- Tamper evident system – Our Major Proposition -- Part VI: Feasibility and Performance Analysis -- Implementation Details -- Threat Model -- Part VII: Future Directions -- Quantum Cryptography -- Quantum Tools -- Applications -- Conclusion.
This book presents an overview on security and privacy issues in dynamic sensor networks and Internet of Things (IoT) networks and provides a novel tamper evident technique to counter and defend against these security related issues. The mission of this book is to explain the evolution of techniques and strategies in securing information transfer and storage thus facilitating a digital transition towards the modern tamper evident systems. The goal is also to aid business organizations that are dependent on the analysis of the large volumes of generated data in securing and addressing the associated growing threat of attackers relentlessly waging attacks and the challenges in protecting the confidentiality, integrity and provenance of data. The book also provides a comprehensive insight into the secure communication techniques and tools that have evolved and the impact they have had in supporting and flourishing the business through the cyber era. This book also includes chapters that discuss the most primitive encryption schemes to the most recent use of homomorphism in ensuring the privacy of the data thus leveraging greater use of new technologies like cloud computing and others. .
ISBN: 9783030777647
Standard No.: 10.1007/978-3-030-77764-7doiSubjects--Topical Terms:
785876
Energy Systems.
LC Class. No.: TK1-9971
Dewey Class. No.: 621.382
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
LDR
:03570nam a22003975i 4500
001
1057444
003
DE-He213
005
20211130175625.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030777647
$9
978-3-030-77764-7
024
7
$a
10.1007/978-3-030-77764-7
$2
doi
035
$a
978-3-030-77764-7
050
4
$a
TK1-9971
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
621.382
$2
23
100
1
$a
Sniatala, Pawel.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1316812
245
1 0
$a
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
$h
[electronic resource] /
$c
by Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XIX, 155 p. 80 illus., 70 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Part I: Growth of Sensory devices and their proliferation into daily life -- Smart Objects in Cyber-Physical Systems -- IoT Security -- Part II: Securing the Internet-of-Things enabled Smart Environments -- Understanding the smart systems -- Onboarding new IoT Devices -- Part III Cryptosystems - Foundations and the current state-of-the-art -- Symmetric key Cryptography -- Asymmetric Key Cryptography -- Part IV Modern Encryption Schemes -- Homomorphic Encryption -- Popular Homomorphic Encryption Schemes -- Industrial involvement in the use of Homomorphic Encryption -- Non-malleable cryptosystem -- Machine Learning based Cryptosystems -- Neural Cryptography -- Part V: Creating a Tamper Evident System for the Cyber Era -- Tamper evident system – Our Major Proposition -- Part VI: Feasibility and Performance Analysis -- Implementation Details -- Threat Model -- Part VII: Future Directions -- Quantum Cryptography -- Quantum Tools -- Applications -- Conclusion.
520
$a
This book presents an overview on security and privacy issues in dynamic sensor networks and Internet of Things (IoT) networks and provides a novel tamper evident technique to counter and defend against these security related issues. The mission of this book is to explain the evolution of techniques and strategies in securing information transfer and storage thus facilitating a digital transition towards the modern tamper evident systems. The goal is also to aid business organizations that are dependent on the analysis of the large volumes of generated data in securing and addressing the associated growing threat of attackers relentlessly waging attacks and the challenges in protecting the confidentiality, integrity and provenance of data. The book also provides a comprehensive insight into the secure communication techniques and tools that have evolved and the impact they have had in supporting and flourishing the business through the cyber era. This book also includes chapters that discuss the most primitive encryption schemes to the most recent use of homomorphism in ensuring the privacy of the data thus leveraging greater use of new technologies like cloud computing and others. .
650
2 4
$a
Energy Systems.
$3
785876
650
2 4
$a
Systems and Data Security.
$3
677062
650
1 4
$a
Communications Engineering, Networks.
$3
669809
650
0
$a
Energy systems.
$3
1253529
650
0
$a
Computer security.
$3
557122
650
0
$a
Electrical engineering.
$3
596380
700
1
$a
Ramani, Sanjeev Kaushik.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1362913
700
1
$a
Iyengar, S.S.
$e
editor.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1289330
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030777630
776
0 8
$i
Printed edition:
$z
9783030777654
776
0 8
$i
Printed edition:
$z
9783030777661
856
4 0
$u
https://doi.org/10.1007/978-3-030-77764-7
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入