Theory and Practice of Cryptography Solutions for Secure Information ... [PDF]

Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security tech

7 downloads 37 Views 116KB Size

Recommend Stories


Cryptography for Secure Channels
Ego says, "Once everything falls into place, I'll feel peace." Spirit says "Find your peace, and then

Stinson DR Cryptography.. Theory and practice
Those who bring sunshine to the lives of others cannot keep it from themselves. J. M. Barrie

Secure System Framework for Secure Visual Cryptography
We may have all come on different ships, but we're in the same boat now. M.L.King

Chaos Synchronization and Cryptography for Secure Communications
Open your mouth only if what you are going to say is more beautiful than the silience. BUDDHA

The Theory and Practice of Information Integration
What you seek is seeking you. Rumi

Secure solutions for
Don't watch the clock, do what it does. Keep Going. Sam Levenson

PdF Ethics: Theory and Practice
Respond to every call that excites your spirit. Rumi

[PDF] Cinematography: Theory and Practice
Don't watch the clock, do what it does. Keep Going. Sam Levenson

[PDF] Ethics: Theory and Practice
Life isn't about getting and having, it's about giving and being. Kevin Kruse

PdF Elements of Information Theory
We may have all come on different ships, but we're in the same boat now. M.L.King

Idea Transcript


Theory and Practice of Cryptography Solutions for Secure Information Systems Atilla Elçi (/affiliate/atilla-eli/240624/) (Aksaray University, Turkey), Josef Pieprzyk (/affiliate/josef-pieprzyk/75507/) (Macquarie University, Australia), Alexander G. Chefranov (/affiliate/alexander-g-chefranov/240625/) (Eastern Mediterranean University, North Cyprus), Mehmet A. Orgun (/affiliate/mehmet-a-orgun/240626/) (Macquarie University, Australia), Huaxiong Wang (/affiliate/huaxiong-wang/240628/) (Nanyang Technological University, Singapore) and Rajan Shankaran (/affiliate/rajan-shankaran/240627/) (Macquarie University, Australia) Indexed In: SCOPUS View 1 More Indices Release Date: May, 2013 | Copyright: © 2013 | Pages: 351 ISBN13: 9781466640306 | ISBN10: 1466640308 | EISBN13: 9781466640313 | DOI: 10.4018/978-1-4666-4030-6

$156.00

Hardcover:

List Price: $195.00

(/book/theory-practice-cryptography-solutions-secure/73568?f=hardcover) (/book/theory-practice-cryptographyE-Book: $156.00 solutions-secure/73568?f=e-book) List Price: $195.00

(/book/theory-practice-cryptography-solutions-secure/73568?f=hardcover-e-book)

nt aspect of the modern world, playing crucial roles in the fields of science and engineering, business and d many others. As such, identity theft and unauthorized access to these systems are serious concerns.

s for Secure Information Systems explores current trends in IS security technologies, techniques, and phic tools to safeguard valuable information resources. This reference book serves the needs of g dedicated information systems free from outside interference, as well as developers of secure IS n Information Security, Privacy, and Ethics series collection.

ation include, but are not limited to:

ontributors Reset View Full PDF (/pdf.aspx? tid=97936&ptid=73568&ctid=15&t=Editorial Advisory Board) View Full PDF (/pdf.aspx? tid=97937&ptid=73568&ctid=15&t=Table of Contents) View Full PDF (/pdf.aspx? tid=97938&ptid=73568&ctid=15&t=Detailed Table of Contents) View Full PDF (/pdf.aspx? tid=97939&ptid=73568&ctid=15&t=Foreword)

View Full PDF (/pdf.aspx? tid=97940&ptid=73568&ctid=15&t=Preface)

exander G. Chefranov, Huaxiong Wang, Rajan Shankaran

exander G. Chefranov, Huaxiong Wang, Rajan Shankaran

View Full PDF (/pdf.aspx? tid=97941&ptid=73568&ctid=15&t=Acknowledgment)

$37.50

dards and Possibilities of Their Harmonization (/chapter/ontology) (pages 1-33)

. Fedorchenko, Vladimir I. Vorobiev, Nickolay A. Moldovyan

g, and information resources are not balanced, inefficient, and poorly 568&t=Ontology-Based Analysis of Cryptography Standards and Possibilities of

$37.50

its Analysis (/chapter/gost-encryption-algorithm-approaches-

rina Maro

of the GOST 28147-89 encryption algorithm (also known as simply 568&t=GOST Encryption Algorithm and Approaches to its Analysis)

$37.50

apter/cryptography-forensics-investigator/76511) (pages 62-83)

tigator when it comes to digital evidence. These include the 568&t=Cryptography for the Forensics Investigator)

$37.50

and Practical Applications (/chapter/search-encrypted-data/76512)

ata (SED) has become a highlight in cryptography. A SED scheme 568&t=Search in Encrypted Data: Theoretical Models and Practical

$37.50

ber Systems and Their Hardware-Oriented Implementation umber/76513) (pages 110-132)

Ahmed Mahmoud to be susceptible to the Known Plaintext-Ciphertext Attack (KPCA) 568&t=Encryption Schemes with Hyper-Complex Number Systems and Their

$37.50

istant Cipher Implementations (/chapter/design-time-engineering-

o De Santis, Filippo Melzani, Andrea Palomba, Gerardo Pelosi

have emerged as a crucial requirement in the specification of the 568&t=Design Time Engineering of Side Channel Resistant Cipher

$37.50

ication to Secure Attribute-Based Messaging System plication/76515) (pages 159-177)

present the signer’s identity is a challenging problem under standard 568&t=An Efficient Attribute-Based Signature with Application to Secure

$37.50

olution for Securing IPv6 Local Link Operations (/chapter/secure-

einel

sed to counteract threats to the Neighbor Discovery Protocol (NDP). 568&t=SEcure Neighbor Discovery: A Cryptographic Solution for Securing

$37.50

rks (/chapter/offline-online-security-mobile-hoc/76517) (pages 199-

of mobile nodes quickly forming an autonomous network for a 568&t=Offline/Online Security in Mobile Ad Hoc Networks)

$37.50

rks: Attacks and Defense Mechanisms (/chapter/survey-security51) ak, Mehmet Emin Dalkilic

technology that has attracted the interest of research in the last 568&t=A Survey on Security in Wireless Sensor Networks: Attacks and Defense

$37.50

olynomial Evaluation (/chapter/secure-multiparty-computation-via-

mputation has exponentially been increasing with growing 568&t=Secure Multiparty Computation via Oblivious Polynomial Evaluation)

$37.50 20) (pages 279-301)

s, procedures, and policies for propagating trust from where it initially

tlesample.aspx?id=76520&ptid=73568&t=PKI Trust Models)

$37.50

I Using Petname Systems (/chapter/entity-authentication-trust-

entity ownership are crucial factors for secure communication in 568&t=Entity Authentication and Trust Validation in PKI Using Petname

$37.50

plications (/chapter/building-trusted-environment-securityunno

, payment gateways, and firewalls) rely on correct program execution 568&t=Building a Trusted Environment for Security Applications)

$37.50

ble Task for Fingerprint Identification System (/chapter/enhancing4)

a small amount of research has been conducted. Most of the security 568&t=Enhancing Security at Email End Point: A Feasible Task for Fingerprint

$37.50 graphy-electronic-mail/76524) (pages 406-427)

einel

od of communicating across the Internet, but the protocols used to le.aspx?id=76524&ptid=73568&t=Cryptography in Electronic Mail)

$37.50 s (/chapter/theory-practice-secure-voting-systems/76525) (pages

ptographic and network techniques to e-government. Most of the 568&t=Theory and Practice of Secure E-Voting Systems)

$37.50

bid-auction-protocols/76526) (pages 460-498)

portant and popular industry. Electronic auctions provide a key /viewtitlesample.aspx?id=76526&ptid=73568&t=Sealed-Bid Auction Protocols)

$37.50 alth Monitoring Systems (/chapter/preserving-privacy-patient-

heung

nges of generic security protocols and platforms for securing 568&t=Preserving the Privacy of Patient Records in Health Monitoring

View Full PDF (/pdf.aspx? tid=97948&ptid=73568&ctid=17&t=About the Contributors) View Full PDF (/pdf.aspx? tid=97949&ptid=73568&ctid=17&t=Index)

epartment of Electrical and Electronics Engineering at Aksaray University, Aksaray, Turkey, since August mputer and educational technology at Süleyman Demirel University, Isparta, Turkey (May 2010 - June 2012). ring, the founding director of the Graduate School of Science and Technology, and the dean of Engineering 2010 - June 2011); with the Computer Engineering Program, Middle East Technical University (METU NCC, (2003-2009) where he established the Internet Technologies Research Center and semantic robotics lab; hair of the Computer Engineering Department (2000-2003); the International Telecommunication Union, (1985-1997); METU Ankara, Turkey, where he was chair and assistant chair of Computer Engineering Lafayette, Indiana, USA, as research assistant (1974-5). He has organized or served in the committees of en organizing IEEE Engineering Semantic Agent Systems Workshops since 2006, Security of Information CS Symposiums 2007&9. He has published over a hundred journal and conference papers; edited the book Theory and Practice of Cryptography Solutions for Secure Information Systems (IGI 2013); proceedings of E CS, and IJRCS 2009; special issues. He was the program chair for the 36th COMPSAC (2012). He at METU, Ankara, Turkey (1970), M.Sc. & Ph.D. in Computer Sciences at Purdue University, USA (1973, mia.edu/atillaelçi) emantics, agent-based systems, robotics, machine learning, knowledge representation and ontology, natural language translation.

ng, at Macquarie University. His main research interest focus is Cryptology and Computer Security and gorithms (such as encryption, hashing and digital signatures), secure multiparty computations, cryptographic b security and cybercrime prevention. Professor Pieprzyk is a member of the editorial boards for International matical Cryptology, International Journal of Applied Cryptography, Fundamenta Informaticae, Journal of y, International Journal of Security and Networks and International Journal of Information and Computer creation of both Auscrypt and ACISP conference streams. The Auscrypt stream was re-named as Asiacrypt p conferences along with Eurocrypt and Crypto. The ACISP conference is the main cryptographic event in Program Chair of Asiacrypt 2008 (Melbourne, Australia). In 2010 he was serving the Program Chair of CTon many program committees of international conferences. Professor Pieprzyk published 5 books, edited 10 pringer-Verlag), 6 book chapters, and ~200 papers in refereed journals and refereed international w.comp.mq.edu.au/~josef)

Ph.D. (Computer Science) and a Doctor of Engineering Sciences. He is currently an Associate Professor of rn Mediterranean University, Famagusta, North Cyprus. There he was one of the founders of Internet s Director in 2008/09. Prior to joining Eastern Mediterranean University, he was a professor at the g State University of Radio-Engineering in Russia. His research interests in information security include on and key exchange protocols, database security. He served as a program committee chair of SIN 2009 mmittee co-chair of SIN Conferences held in Russia, Australia, and India in 2010-12. Website: Alexander G.

niversity, Sydney, Australia. He received his B.Sc. and M.Sc. degrees in computer science and engineering 82 & 1985 respectively; and his PhD degree in computer science from the University of Victoria, Canada in ptember 1992, he worked as a post-doctoral fellow at the University of Victoria. He was elevated to the 1996. He researches in the broad area of intelligent systems, with specific research interests in knowledge and industry applications of these research areas. He was the Program Committee co-chair of The 20th nce (AI'07) and the Conference co-chair of the 2nd International Conference on Security of Information and rogram Committee Co-Chair of the 14th Pacific-Rim International Conference on Artificial Intelligence f the 3rd International Conference on Security of Information and Networks (SIN 2010). He serves on the mputer Science, and Expert Systems: The Journal of Knowledge Engineering. Website: Mehmet A. Orgun

from University of Haifa, Israel in 1996 and a PhD in Computer Science from University of Wollongong, gical University, Singapore in 2006 and is currently an associate professor in the Division of Mathematical ral universities, including Macquarie University, Australia; City University of Hong Kong; University of ngapore, Kobe University, Japan. His research interests include cryptography, information security, coding science. He has been on the editorial boards of Designs, Codes and Cryptography, International Journal of ommunications (JCM) and Journal of Communications and Networks. He was the Program Co-Chair of 9th y and Privacy (ACISP'04), Sydney, Australia, 2004 and 4th International Conference on Cryptology and 05. He received the inaugural Award of Best Research Contribution awarded by the Computer Science axiong Wang (http://www3.ntu.edu.sg/home/hxwang/)

rie University, Sydney, Australia. He received the MBA (MIS) degree in Information Systems Maastricht urs) and PhD degrees in Computing from the University of Western Sydney in 1999 and 2005 respectively. 2001 and was promoted to senior lecturer in 2011. Prior to Macquarie University, he was employed, first as he University of Western Sydney. He mainly works in the areas of network security and trust in mobile e member for a number of conferences in computer networking and security. More recently, he has been l arrangements chair; of the 4th International Conference on Security of Information and Networks (SIN

CM Digital Library

(/books/indices/scopus/39/) (/books/indices/acm-digital-library/111/)

Hardcover + E-Book:

$188.00 List Price: $235.00

Learn More About IGI Global (/about/) | Partnerships (/publish/partnerships/) | Contact (/contact/) | Careers (/careers/) | FAQ (/faq/) | Staff (/staff/) Resources For Librarians (/librarians/) | Authors/Editors (/publish/) | Distributors (/distributors/) | Instructors (/course-adoption/) | Translators (/translators/) | Copy Editing Services (https://www.econtentpro.com/partners/referrer/2eeff007-a17ae611-80c4-0cc47a0d221d?url=/copyediting) Media Center Online Symposium (/symposium/) | Blogs (/newsroom/) | Catalogs (/catalogs/) | Newsletters (/newsletters/) Policies Privacy Policy (/policies/privacy/) | Content Reuse Policy (/policies/content-reuse/) | Ethics and Malpractice (/policies/ethics-and-malpractice/)

(https://2018.alamidwinter.org/)

(http://www.facebook.com/pages/IGI-Global/138206739534176?ref=sgm)

Copyright © 1988-2017, IGI Global - All Rights Reserved

(http://twitter.com/igiglobal)

(http://www.world-forgotten-children.org)

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.