Handbook of research on modern cryptographic solutions for computer and cyber security:
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
Information Science Reference
[2016]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book s
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | xxvi, 589 Seiten Illustrationen, Diagramme |
ISBN: | 9781522501053 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043499472 | ||
003 | DE-604 | ||
005 | 20230418 | ||
007 | t | ||
008 | 160407s2016 a||| |||| 00||| eng d | ||
020 | |a 9781522501053 |c hbk. |9 978-1-5225-0105-3 | ||
035 | |a (OCoLC)949217265 | ||
035 | |a (DE-599)BVBBV043499472 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-706 | ||
082 | 0 | |a 005.82 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Handbook of research on modern cryptographic solutions for computer and cyber security |c Brij Gupta (National Institute of Technology Kurukshetra, India), Dharma P. Agrawal (University of Cincinnati, USA), Shingo Yamaguchi (Yamaguchi University, Japan) |
264 | 1 | |a Hershey, PA |b Information Science Reference |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a xxvi, 589 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book s | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Gupta, Brij |d 1982- |0 (DE-588)1103817469 |4 edt | |
700 | 1 | |a Agrawal, Dharma P. |d 1945- |0 (DE-588)11564587X |4 edt | |
700 | 1 | |a Yamaguchi, Shingo |d 1969- |0 (DE-588)1103817590 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-5225-0106-0 |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028915905&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028915905&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-028915905 |
Datensatz im Suchindex
_version_ | 1804176133797707776 |
---|---|
adam_text | Table of Contents
q
Preface............................................................................xx
Acknowledgment...................................................................xxvi
Chapter 1
Data Security in Wired and Wireless Systems.........................................1
Abhinav Prakash, University of Cincinnati, USA
Dharma Prakash Agarwal, University of Cincinnati, USA
Chapter 2
A New View of Privacy in Social Networks: Strengthening Privacy during Propagation...........28
Wei Chang, Saint Joseph’s University, USA
Jie Wu, Temple University, USA
Chapter 3
A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer: Detection and
Mitigation Approaches........................................................................52
Esraa Alomari, Universiti Sains Malaysia (USM), Malaysia University ofWasit, Iraq
Selvakumar Manickam, Universiti Sains Malaysia (USM), Malaysia
B. B. Gupta, National Institute of Technology Kurukshetra, India
Mohammed Anbar, Universiti Sains Malaysia (USM), Malaysia
Redhwan M. A. Saad, Universiti Sains Malaysia (USM), Malaysia Ibb University, Yemen
Samer Alsaleem, Universiti Sains Malaysia (USM), Malaysia
Chapter 4
Cyber Risk: A Big Challenge in Developed and Emerging Markets................................80
Maria Cristina Arcuri, University of Modena and Reggio Emilia, Italy
Marina Brogi, University of Roma “La Sapienza”, Italy
Gino Gandolfi, University of Parma, Italy
Chapter 5
Security in Ad Hoc Network and Computing Paradigms...........................................96
Poonam Saini, PEC University of Technology, India
Awadhesh Kumar Singh, National Institute of Technology Kurukshetra, India
Chapter 6
Audio Stego Intrusion Detection System through Hybrid Neural Tree Model...........
S. Geetha, VIT University - Chennai, India
Siva S. Sivatha Sindhu, Shan Systems, USA
Chapter 7
Introduction of Petri Nets: Its Applications and Security Challenges..............
Shingo Yamaguchi, Yamaguchi University, Japan
Mohd Anuaruddin Bin Ahmadon, Yamaguchi University, Japan
Qi-Wei Ge, Yamaguchi University, Japan
Chapter 8
Discovering Periodicity in Network Flows for Security Monitoring..................
Neminath Hubballi, Indian Institute of Technology Indore, India
Deepanshu Goyal, Indian Institute of Technology Guwahati, India
Chapter 9
Secure and Privacy Preserving Keyword Search over the Large Scale Cloud Data......
Wei Zhang, Hunan University, China
Jie Wu, Temple University, USA
Yaping Lin, Hunan Univeristy, China
Chapter 10
Auditing Defense against XSS Worms in Online Social Network-Based Web Applications
Pooja Chaudhary, National Institute of Technology Kurukshetra, India
Shashank Gupta, National Institute of Technology Kurukshetra, India
B. B. Gupta, National Institute of Technology Kurukshetra, India
Chapter 11
Digital Image Watermarking: Techniques and Emerging Applications..................
Amit Kumar Singh, Jaypee University of Information Technology, India
Basant Kumar, Motilal Nehru National Institute of Technology, India
Mayank Dave, NIT Kurukshetra, India
Satya Prakash Ghrera, Jaypee University of Information Technology, India
Anand Mohan, IIT (BHU), India
Chapter 12
Security Issues and Countermeasures of Online Transaction in E-Commerce...........
Sarvesh Tanwar Harshita, Mody University of Science and Technology, India
Chapter 13
Securing the Human Cloud: Applying Biometrics to Wearable Technology..............
Pallavi Meharia, University of Cincinnati, USA
Dharma Prakash Agarwal, University of Cincinnati, USA
Chapter 14
Provable Security for Public Key Cryptosystems: How to Prove that the Cryptosystem is Secure... 317
Syed Taqi Ali, National Institute of Technology Kurukshetra, India
Chapter 15
Secure Key Establishment in Wireless Sensor Networks......................................342
Suntan Bala, Thapar University, India
Gaurav Sharma, Thapar University, India
Anil K. Verma, Thapar University, India
Chapter 16
Threats Classification: State of the Art..................................................368
Mouna Jouini, ISG Tunis, Tunisia
Latifa Ben Arfa Rabai, ISG Tunis, Tunisia
Chapter 17
Analysis of Various Security Issues and Challenges in Cloud Computing Environment:
A Survey..................................................................................393
Zhaolong Gou, Yamaguchi University, Japan
Shingo Yamaguchi, Yamaguchi University, Japan
B. B. Gupta, National Institute of Technology Kurukshetra, India
Chapter 18
Review of Link Structure Based Ranking Algorithms and Hanging Pages.......................420
Ravi P. Kumar, Curtin University, Australia
Ashutosh K. Singh, National Institute of Technology, India
Anand Mohan, National Institute of Technology, India
Chapter 19
Application of Face Recognition Techniques in Video for Biometric Security: A Review of Basic
Methods and Emerging Trends...............................................................460
Bijuphukan Bhagabati, Institute of Advanced Study in Science and Technology, India
Kandarpa Kumar Sarma, Gauhati University, India
Chapter 20
Reviewing the Security Features in Contemporary Security Policies and Models for Multiple
Platforms.................................................................................479
Omkar Badve, National Institute of Technology Kurukshetra, India
B. B. Gupta, National Institute of Technology Kurukshetra, India
Shashank Gupta, National Institute of Technology Kurukshetra, India
Chapter 21
DNA Sequence Based Cryptographic Solution for Secure Image Transmission............505
Grasha Jacob, Rani Anna Government College, Tamil Nadu, India
Murugan Annamalai, Dr. Ambedkar Government Arts College, India
Compilation of References..........................................................528
About the Contributors.............................................................577
Index..............................................................................586
Handbook of Research on
Modern Cryptographic Solutions
for Computer and Cyber Security
Internet usage has become a facet of everyday life, especially as more
technological advances have made it easier to connect to the web from virtually
anywhere in the developed world. However, with this increased usage comes
heightened threats to security within digital environments.
The Handbook of Research on Modern Cryptographic Solutions for
Computer and Cyber Security identifies emergent research and techniques
being utilized in the field of cryptology and cyber threat prevention. Featuring
theoretical perspectives, best practices, and future research directions, this
handbook of research is a vital resource for professionals, researchers, faculty
members, scientists, graduate students, scholars, and software developers
interested in threat identification and prevention.
Topics Covered:
■ Ad Hoc Network Security
■ Botnet Detection
■ Cyber Crime
■ Cyber Warfare
■ Defense Techniques
■ Forensic Tools
■ Visual Analytics
■ Wireless Security
ISBN ^70-1-5225-0105-3
|
any_adam_object | 1 |
author2 | Gupta, Brij 1982- Agrawal, Dharma P. 1945- Yamaguchi, Shingo 1969- |
author2_role | edt edt edt |
author2_variant | b g bg d p a dp dpa s y sy |
author_GND | (DE-588)1103817469 (DE-588)11564587X (DE-588)1103817590 |
author_facet | Gupta, Brij 1982- Agrawal, Dharma P. 1945- Yamaguchi, Shingo 1969- |
building | Verbundindex |
bvnumber | BV043499472 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)949217265 (DE-599)BVBBV043499472 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02172nam a2200421 c 4500</leader><controlfield tag="001">BV043499472</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230418 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160407s2016 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522501053</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-1-5225-0105-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)949217265</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043499472</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of research on modern cryptographic solutions for computer and cyber security</subfield><subfield code="c">Brij Gupta (National Institute of Technology Kurukshetra, India), Dharma P. Agrawal (University of Cincinnati, USA), Shingo Yamaguchi (Yamaguchi University, Japan)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxvi, 589 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book s</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Brij</subfield><subfield code="d">1982-</subfield><subfield code="0">(DE-588)1103817469</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agrawal, Dharma P.</subfield><subfield code="d">1945-</subfield><subfield code="0">(DE-588)11564587X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yamaguchi, Shingo</subfield><subfield code="d">1969-</subfield><subfield code="0">(DE-588)1103817590</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-5225-0106-0</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028915905&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028915905&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028915905</subfield></datafield></record></collection> |
id | DE-604.BV043499472 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:27:21Z |
institution | BVB |
isbn | 9781522501053 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028915905 |
oclc_num | 949217265 |
open_access_boolean | |
owner | DE-703 DE-706 |
owner_facet | DE-703 DE-706 |
physical | xxvi, 589 Seiten Illustrationen, Diagramme |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Information Science Reference |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book s |
spelling | Handbook of research on modern cryptographic solutions for computer and cyber security Brij Gupta (National Institute of Technology Kurukshetra, India), Dharma P. Agrawal (University of Cincinnati, USA), Shingo Yamaguchi (Yamaguchi University, Japan) Hershey, PA Information Science Reference [2016] © 2016 xxvi, 589 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Advances in information security, privacy, and ethics (AISPE) book s Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Kryptologie (DE-588)4033329-2 s DE-604 Gupta, Brij 1982- (DE-588)1103817469 edt Agrawal, Dharma P. 1945- (DE-588)11564587X edt Yamaguchi, Shingo 1969- (DE-588)1103817590 edt Erscheint auch als Online-Ausgabe 978-1-5225-0106-0 Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028915905&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028915905&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Handbook of research on modern cryptographic solutions for computer and cyber security Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4033329-2 |
title | Handbook of research on modern cryptographic solutions for computer and cyber security |
title_auth | Handbook of research on modern cryptographic solutions for computer and cyber security |
title_exact_search | Handbook of research on modern cryptographic solutions for computer and cyber security |
title_full | Handbook of research on modern cryptographic solutions for computer and cyber security Brij Gupta (National Institute of Technology Kurukshetra, India), Dharma P. Agrawal (University of Cincinnati, USA), Shingo Yamaguchi (Yamaguchi University, Japan) |
title_fullStr | Handbook of research on modern cryptographic solutions for computer and cyber security Brij Gupta (National Institute of Technology Kurukshetra, India), Dharma P. Agrawal (University of Cincinnati, USA), Shingo Yamaguchi (Yamaguchi University, Japan) |
title_full_unstemmed | Handbook of research on modern cryptographic solutions for computer and cyber security Brij Gupta (National Institute of Technology Kurukshetra, India), Dharma P. Agrawal (University of Cincinnati, USA), Shingo Yamaguchi (Yamaguchi University, Japan) |
title_short | Handbook of research on modern cryptographic solutions for computer and cyber security |
title_sort | handbook of research on modern cryptographic solutions for computer and cyber security |
topic | Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computersicherheit Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028915905&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028915905&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT guptabrij handbookofresearchonmoderncryptographicsolutionsforcomputerandcybersecurity AT agrawaldharmap handbookofresearchonmoderncryptographicsolutionsforcomputerandcybersecurity AT yamaguchishingo handbookofresearchonmoderncryptographicsolutionsforcomputerandcybersecurity |