This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.
The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which includes IoT, Cloud Computing, Big Data, Light-Weight Cryptography for Block-chain, Data-Intensive techniques and how it can be applied to various applications for general and specific use.
Graduate and postgraduate students, researchers, and those working in the industry will find this book easy to understand and use for security applications and privacy issues.
weitere Ausgaben werden ermittelt
Gautam Kumar, PhD, working with Dept. of Computer Science and Engineering, Narsimha Reddy Engineering College, Hyderabad. He received his PhD degree in Computer Science and Engineering from Jaypee University of Information Technology, Himachal Pradesh, India in 2017. He did his M.Tech from Rajasthan Technical University, in 2012 and B.E. from Rajiv Gandhi Proudyogiki Vishwavidyalaya, Madhya Pradesh, in 2005. His research interests are in the field of Cryptography, Information Security, and Algorithms Design and Analysis. He has published more than 30 research journals and conferences papers of repute in Science Citation Indexed and Scopus Indexed Journals. He has Organized 3 workshops, Attended 7 Workshops and attended more than of 5 Faculty Development Programs. He is a Reviewer of (i) Security and Communication Networks, John Wiley & Sons[Indexed in Science Citation Indexed, SCOPUS], (ii) The Computer Journal, Oxford Academic [Indexed in Science Citation Indexed, SCOPUS], & many Reputes of IEEE/ACM International Conferences.
Dinesh Kumar Saini is an Associate Professor working with Faculty of Computing, Information Technology, Sohar University, Sultanate of Oman. He is having experience of more than 18+ years in academic. He has handled various administrative posts. He has published more than 120 research journals and conferences papers of repute. He is also part of the editorial and advisory board of several journals and has been editor of several special issues in books and journals. He has supervised various academic R&D projects. His area of expertise in Computer Science and Engineering, Information Technology, Software Systems, Business Administration and Human Resource Management.
Nguyen Ha Huy Cuong, PhD, working The University of Danang- College of Information Technology. Ha Huy Cuong Nguyen obtained his doctorate in Computer Science / Resource Allocation Cloud Computing in 2017 from the University of Da Nang. He has published over 30 research papers. His main research interests include the resource allocation, detection, prevention, and avoidance of cloud computing and distributed systems. He serves as a technical committee program member, track chair, session chair and reviewer of many international conferences and journals. He is a guest editor journal "International Journal of Information Technology Project Management (IJITPM)" with Special Issue On: Recent Works on Management and Technological Advancement. He is editor/reviewer for Machine Learning & Networked Collaborative Engineering Journal, Asian Journal For Convergence In Technology (AJCT) Journal, and some international conferences.
1. Cryptography, Information Security, Information Hiding, and Applications. 2. Security Vulnerabilities, Threats, Attacks and Defense Mechanisms. 3. Security Threat Analysis, Modeling and Attack Strategies and its Evaluation. 4. Internet-of-Things (IoT) and its Related Issues, Data-Intensive Security. 5. Design Principles and Privacy Techniques in IoT. 6. Privacy-Preserving Communication Protocol for IoT Applications. 7. Cloud Computing, Fog/Edge Computing, and Digital Right Management. 8. Location and Availability Privacy in Smart Mobility. 9. Big Data Analysis, Authentication and Integrity. 10. Smart-Grid Computing, Reduced Cost Computing. 11. Block-chain Technology, Advanced Techniques, and Dataflow. 12. Lightweight Cryptographic Techniques for Minimization of the Security. Overheads in Computing Infrastructures. 13. Signcryption, Proxy Signcryption.