語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information Security Technologies in the Decentralized Distributed Networks
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Information Security Technologies in the Decentralized Distributed Networks/ edited by Roman Oliynykov, Oleksandr Kuznetsov, Oleksandr Lemeshko, Tamara Radivilova.
其他作者:
Radivilova, Tamara.
面頁冊數:
XIV, 305 p. 46 illus., 10 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Artificial Intelligence. -
電子資源:
https://doi.org/10.1007/978-3-030-95161-0
ISBN:
9783030951610
Information Security Technologies in the Decentralized Distributed Networks
Information Security Technologies in the Decentralized Distributed Networks
[electronic resource] /edited by Roman Oliynykov, Oleksandr Kuznetsov, Oleksandr Lemeshko, Tamara Radivilova. - 1st ed. 2022. - XIV, 305 p. 46 illus., 10 illus. in color.online resource. - Lecture Notes on Data Engineering and Communications Technologies,1152367-4520 ;. - Lecture Notes on Data Engineering and Communications Technologies,3.
Methods for Privacy Support in the Decentralized Environment -- Application of Bluetooth, Wi-Fi and Gps Technologies in the means of Contact Tracking -- Analysis and Research of Threat, Attacker and Security Models of Data Depersonalization in Decentralized Networks -- Cryptographic Transformations in a Decentralized Blockchain Environment -- Statistical and Signature Analysis Methods of Intrusion Detection -- Criteria and Indicators of Efficiency of Cryptographic Protection Mechanisms -- Methods of Evaluation and Comparative Research of Cryptographic Conversions -- Cryptographic Mechanisms that Ensure the Efficiency of SNARK-Systems -- Comparative Analysis of Consensus Algorithms that use a Directed Acyclic Graph Instead of a Blockchain, and Construction of Estimates of the SPECTRE Protocol Security to the Double Spend Attack -- Models and Methods of Secure Routing and Load Balancing in Infocommunication Networks -- The Methods of Data Comparison in Residue Numeral System -- Data Control in the System of Residual Classes -- Traffic Monitoring and Abnormality Detection Methods for Decentralized Distributed Networks.
The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.
ISBN: 9783030951610
Standard No.: 10.1007/978-3-030-95161-0doiSubjects--Topical Terms:
646849
Artificial Intelligence.
LC Class. No.: TA345-345.5
Dewey Class. No.: 620.00285
Information Security Technologies in the Decentralized Distributed Networks
LDR
:03594nam a22003975i 4500
001
1092111
003
DE-He213
005
20220403180021.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783030951610
$9
978-3-030-95161-0
024
7
$a
10.1007/978-3-030-95161-0
$2
doi
035
$a
978-3-030-95161-0
050
4
$a
TA345-345.5
072
7
$a
UN
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UN
$2
thema
082
0 4
$a
620.00285
$2
23
245
1 0
$a
Information Security Technologies in the Decentralized Distributed Networks
$h
[electronic resource] /
$c
edited by Roman Oliynykov, Oleksandr Kuznetsov, Oleksandr Lemeshko, Tamara Radivilova.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
XIV, 305 p. 46 illus., 10 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes on Data Engineering and Communications Technologies,
$x
2367-4520 ;
$v
115
505
0
$a
Methods for Privacy Support in the Decentralized Environment -- Application of Bluetooth, Wi-Fi and Gps Technologies in the means of Contact Tracking -- Analysis and Research of Threat, Attacker and Security Models of Data Depersonalization in Decentralized Networks -- Cryptographic Transformations in a Decentralized Blockchain Environment -- Statistical and Signature Analysis Methods of Intrusion Detection -- Criteria and Indicators of Efficiency of Cryptographic Protection Mechanisms -- Methods of Evaluation and Comparative Research of Cryptographic Conversions -- Cryptographic Mechanisms that Ensure the Efficiency of SNARK-Systems -- Comparative Analysis of Consensus Algorithms that use a Directed Acyclic Graph Instead of a Blockchain, and Construction of Estimates of the SPECTRE Protocol Security to the Double Spend Attack -- Models and Methods of Secure Routing and Load Balancing in Infocommunication Networks -- The Methods of Data Comparison in Residue Numeral System -- Data Control in the System of Residual Classes -- Traffic Monitoring and Abnormality Detection Methods for Decentralized Distributed Networks.
520
$a
The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Big Data.
$3
1017136
650
2 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Computational Intelligence.
$3
768837
650
1 4
$a
Data Engineering.
$3
1226308
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Big data.
$3
981821
650
0
$a
Data protection.
$3
557764
650
0
$a
Computational intelligence.
$3
568984
650
0
$a
Engineering—Data processing.
$3
1297966
700
1
$a
Radivilova, Tamara.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1316268
700
1
$a
Lemeshko, Oleksandr.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1399815
700
1
$a
Kuznetsov, Oleksandr.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1399814
700
1
$a
Oliynykov, Roman.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1399813
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030951603
776
0 8
$i
Printed edition:
$z
9783030951627
830
0
$a
Lecture Notes on Data Engineering and Communications Technologies,
$x
2367-4512 ;
$v
3
$3
1279482
856
4 0
$u
https://doi.org/10.1007/978-3-030-95161-0
912
$a
ZDB-2-INR
912
$a
ZDB-2-SXIT
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
950
$a
Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入