Buch, Englisch, 470 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 727 g
Proceedings of ICCNSML 2022
Buch, Englisch, 470 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 727 g
Reihe: Algorithms for Intelligent Systems
ISBN: 978-981-99-2231-4
Verlag: Springer Nature Singapore
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 – 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion Ambient Intelligence, RFID, Internet der Dinge
- Mathematik | Informatik EDV | Informatik Angewandte Informatik
- Technische Wissenschaften Energietechnik | Elektrotechnik Elektrotechnik
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
Weitere Infos & Material
Role and Applications of Emerging Technologies in Smart City Architecture.- A Review on Blockchain based Electronic Health Record (EHR) system for Secure Data Storage.- SVM-RF: A hybrid machine learning model for detection of malicious network traffic and files.- Key-insulated Aggregate Proxy Signature.- On Comprehensive Study of Cryptocurrency Trend Analysis Based on a Novel Machine Learning Technique.- Flaws of a password-based three-party authenticated key agreement protocol in post-quantum environment Multivariate Aggregate and Multi Signature Scheme.- Optical Network Modeling and Performance using Random Graph Theory.- A Survey on Recent Progress in Blockchain Technology.- Cryptanalysis of lattice based threshold changeable multi-secret sharing scheme.- Amazon Web Service IOT And Authentication of Edge Devices.- On Picture Fuzzy Information Based Hybrid Cryptographic TOPSIS Approach for Best Suitable Cloud Storage & Security Level.- Network Layer Performance of Hybrid Buffer Based Optical Router.- Efficient and secure data aggregation for UAV-to-Ground Station Communication in Smart City Environment.- BBIWMS: A Secure Blockchain Based Framework for Integrated Water Management System for Smart City.- An Intelligent Network Intrusion Detection Framework for Reliable UAV-based Communication