Handbook of research on modern cryptographic solutions for computer and cyber security:
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher.
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
IGI Global,
[2016]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher. |
Beschreibung: | PDFs (589 pages) : illustrations. Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522501060 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00142132 | ||
003 | IGIG | ||
005 | 20160526142206.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 160520s2016 paua fob 001 0 eng d | ||
010 | |z 2016002930 | ||
020 | |a 9781522501060 |q electronic | ||
020 | |z 9781522501053 |q print | ||
024 | 7 | |a 10.4018/978-1-5225-0105-3 |2 doi | |
035 | |a (CaBNVSL)gtp00565763 | ||
035 | |a (OCoLC)950680427 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.A25 |b H364 2016e | |
082 | 7 | |a 005.8/2 |2 23 | |
245 | 0 | 0 | |a Handbook of research on modern cryptographic solutions for computer and cyber security |c Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : |b IGI Global, |c [2016] | |
300 | |a PDFs (589 pages) : |b illustrations. | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal -- | |
505 | 8 | |a Provable security for public key cryptosystems: how to prove that the cryptosystem is secure / Syed Taqi Ali -- Secure key establishment in wireless sensor networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- Threats classification: state of the art / Mouna Jouini, Latifa Ben Arfa Rabai -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Review of link structure based ranking algorithms and hanging pages / Ravi P. Kumar, Ashutosh K. Singh, Anand Mohan -- Application of face recognition techniques in video for biometric security: a review of basic methods and emerging trends / Bijuphukan Bhagabati, Kandarpa Kumar Sarma -- Reviewing the security features in contemporary security policies and models for multiple platforms / Omkar Badve, B. B. Gupta, Shashank Gupta -- DNA sequence based cryptographic solution for secure image transmission / Grasha Jacob, Murugan Annamalai. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 05/20/2016). | ||
650 | 0 | |a Computer security |x Government policy. | |
650 | 0 | |a Cyberterrorism. | |
650 | 0 | |a Cyberterrorism |x Prevention. | |
650 | 0 | |a Data encryption (Computer science) | |
653 | |a Ad hoc network security | ||
653 | |a Botnet detection | ||
653 | |a Cyber crime | ||
653 | |a Cyber warfare | ||
653 | |a Defense techniques | ||
653 | |a Forensic tools | ||
653 | |a Visual analytics | ||
653 | |a Wireless security | ||
700 | 1 | |a Agrawal, Dharma P. |q (Dharma Prakash) |d 1945- |e editor. | |
700 | 1 | |a Gupta, Brij |d 1982- |e editor. | |
700 | 1 | |a Yamaguchi, Shingo |d 1969- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2016002930 | |
776 | 0 | 8 | |i Print version: |z 1522501053 |z 9781522501053 |w (DLC) 2016002930 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00142132 |
---|---|
_version_ | 1804751452830171136 |
adam_text | |
any_adam_object | |
author2 | Agrawal, Dharma P. (Dharma Prakash) 1945- Gupta, Brij 1982- Yamaguchi, Shingo 1969- |
author2_role | edt edt edt |
author2_variant | d p a dp dpa b g bg s y sy |
author_facet | Agrawal, Dharma P. (Dharma Prakash) 1945- Gupta, Brij 1982- Yamaguchi, Shingo 1969- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 H364 2016e |
callnumber-search | QA76.9.A25 H364 2016e |
callnumber-sort | QA 276.9 A25 H364 42016E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal -- Provable security for public key cryptosystems: how to prove that the cryptosystem is secure / Syed Taqi Ali -- Secure key establishment in wireless sensor networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- Threats classification: state of the art / Mouna Jouini, Latifa Ben Arfa Rabai -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Review of link structure based ranking algorithms and hanging pages / Ravi P. Kumar, Ashutosh K. Singh, Anand Mohan -- Application of face recognition techniques in video for biometric security: a review of basic methods and emerging trends / Bijuphukan Bhagabati, Kandarpa Kumar Sarma -- Reviewing the security features in contemporary security policies and models for multiple platforms / Omkar Badve, B. B. Gupta, Shashank Gupta -- DNA sequence based cryptographic solution for secure image transmission / Grasha Jacob, Murugan Annamalai. |
ctrlnum | (CaBNVSL)gtp00565763 (OCoLC)950680427 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04892nam a2200601 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00142132</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20160526142206.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">160520s2016 paua fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2016002930</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522501060</subfield><subfield code="q">electronic</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522501053</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-0105-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)gtp00565763</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)950680427</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">H364 2016e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook of research on modern cryptographic solutions for computer and cyber security </subfield><subfield code="c">Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">PDFs (589 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal -- </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Provable security for public key cryptosystems: how to prove that the cryptosystem is secure / Syed Taqi Ali -- Secure key establishment in wireless sensor networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- Threats classification: state of the art / Mouna Jouini, Latifa Ben Arfa Rabai -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Review of link structure based ranking algorithms and hanging pages / Ravi P. Kumar, Ashutosh K. Singh, Anand Mohan -- Application of face recognition techniques in video for biometric security: a review of basic methods and emerging trends / Bijuphukan Bhagabati, Kandarpa Kumar Sarma -- Reviewing the security features in contemporary security policies and models for multiple platforms / Omkar Badve, B. B. Gupta, Shashank Gupta -- DNA sequence based cryptographic solution for secure image transmission / Grasha Jacob, Murugan Annamalai.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 05/20/2016).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Government policy.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ad hoc network security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Botnet detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber crime</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber warfare</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Defense techniques</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Forensic tools</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Visual analytics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Wireless security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agrawal, Dharma P.</subfield><subfield code="q">(Dharma Prakash)</subfield><subfield code="d">1945-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Brij</subfield><subfield code="d">1982-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yamaguchi, Shingo</subfield><subfield code="d">1969-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2016002930</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522501053</subfield><subfield code="z">9781522501053</subfield><subfield code="w">(DLC) 2016002930</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00142132 |
illustrated | Illustrated |
indexdate | 2024-07-16T15:51:47Z |
institution | BVB |
isbn | 9781522501060 |
language | English |
oclc_num | 950680427 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | PDFs (589 pages) : illustrations. Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | IGI Global, |
record_format | marc |
spelling | Handbook of research on modern cryptographic solutions for computer and cyber security Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016] PDFs (589 pages) : illustrations. text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal -- Provable security for public key cryptosystems: how to prove that the cryptosystem is secure / Syed Taqi Ali -- Secure key establishment in wireless sensor networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- Threats classification: state of the art / Mouna Jouini, Latifa Ben Arfa Rabai -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Review of link structure based ranking algorithms and hanging pages / Ravi P. Kumar, Ashutosh K. Singh, Anand Mohan -- Application of face recognition techniques in video for biometric security: a review of basic methods and emerging trends / Bijuphukan Bhagabati, Kandarpa Kumar Sarma -- Reviewing the security features in contemporary security policies and models for multiple platforms / Omkar Badve, B. B. Gupta, Shashank Gupta -- DNA sequence based cryptographic solution for secure image transmission / Grasha Jacob, Murugan Annamalai. Restricted to subscribers or individual electronic text purchasers. "This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 05/20/2016). Computer security Government policy. Cyberterrorism. Cyberterrorism Prevention. Data encryption (Computer science) Ad hoc network security Botnet detection Cyber crime Cyber warfare Defense techniques Forensic tools Visual analytics Wireless security Agrawal, Dharma P. (Dharma Prakash) 1945- editor. Gupta, Brij 1982- editor. Yamaguchi, Shingo 1969- editor. IGI Global, publisher. (Original) (DLC)2016002930 Print version: 1522501053 9781522501053 (DLC) 2016002930 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3 Volltext |
spellingShingle | Handbook of research on modern cryptographic solutions for computer and cyber security Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal -- Provable security for public key cryptosystems: how to prove that the cryptosystem is secure / Syed Taqi Ali -- Secure key establishment in wireless sensor networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- Threats classification: state of the art / Mouna Jouini, Latifa Ben Arfa Rabai -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Review of link structure based ranking algorithms and hanging pages / Ravi P. Kumar, Ashutosh K. Singh, Anand Mohan -- Application of face recognition techniques in video for biometric security: a review of basic methods and emerging trends / Bijuphukan Bhagabati, Kandarpa Kumar Sarma -- Reviewing the security features in contemporary security policies and models for multiple platforms / Omkar Badve, B. B. Gupta, Shashank Gupta -- DNA sequence based cryptographic solution for secure image transmission / Grasha Jacob, Murugan Annamalai. Computer security Government policy. Cyberterrorism. Cyberterrorism Prevention. Data encryption (Computer science) |
title | Handbook of research on modern cryptographic solutions for computer and cyber security |
title_auth | Handbook of research on modern cryptographic solutions for computer and cyber security |
title_exact_search | Handbook of research on modern cryptographic solutions for computer and cyber security |
title_full | Handbook of research on modern cryptographic solutions for computer and cyber security Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors. |
title_fullStr | Handbook of research on modern cryptographic solutions for computer and cyber security Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors. |
title_full_unstemmed | Handbook of research on modern cryptographic solutions for computer and cyber security Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors. |
title_short | Handbook of research on modern cryptographic solutions for computer and cyber security |
title_sort | handbook of research on modern cryptographic solutions for computer and cyber security |
topic | Computer security Government policy. Cyberterrorism. Cyberterrorism Prevention. Data encryption (Computer science) |
topic_facet | Computer security Government policy. Cyberterrorism. Cyberterrorism Prevention. Data encryption (Computer science) |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3 |
work_keys_str_mv | AT agrawaldharmap handbookofresearchonmoderncryptographicsolutionsforcomputerandcybersecurity AT guptabrij handbookofresearchonmoderncryptographicsolutionsforcomputerandcybersecurity AT yamaguchishingo handbookofresearchonmoderncryptographicsolutionsforcomputerandcybersecurity AT igiglobal handbookofresearchonmoderncryptographicsolutionsforcomputerandcybersecurity |