Suggested Topics within your search.
Suggested Topics within your search.
- Internet of things
- Artificial intelligence 19
- Security measures 14
- Embedded computer systems 13
- Computer engineering 12
- Computational intelligence 11
- Computer networks 9
- Blockchains (Databases) 8
- Telecommunication 8
- Big data 7
- Data encryption (Computer science) 7
- Machine learning 7
- Cryptography 6
- Computer security 5
- Cooperating objects (Computer systems) 5
- Industrial applications 5
- Cloud computing 4
- Computers 4
- Data protection 4
- Mobile communication systems 4
- Wireless communication systems 4
- Access control 3
- Artificial Intelligence 3
- Autonomous robots 3
- Electronic circuits 3
- Medical informatics 3
- Computer vision 2
- Electronics 2
- Quantitative research 2
- Sensor networks 2
-
1
New Frontiers in Cryptography Quantum, Blockchain, Lightweight, Chaotic and DNA / by Khaled Salah Mohamed.
Published 2020Table of Contents: “…New Trends in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA Cryptography -- Chapter 5. …”
Full text (Wentworth users only)
Electronic eBook -
2
-
3
-
4
Advances in applications of computational intelligence and the Internet of Things (IoT) : cryptography and network security in IoTs /...
Published 2022Table of Contents: “…A New Cryptographic Modus Operandi Approach Based on Amalgamation of Physics and Chemistry / Sukhwant Kumar, Smriti Kumari, and Rajdeep Chowdhury -- Application of Cryptography and Network Security in the Internet of Things (IoT) / K. …”
Full text (WIT users only)
Electronic eBook -
5
Blockchain Technology From Theory to Practice / by Sudeep Tanwar.
Published 2022Subjects: Full text (Wentworth users only)
Electronic eBook -
6
Authentication technologies for cloud technology, IoT, and big data / edited by Yasser M. Alginahi and Muhammad Nomani Kabir.
Published 2019Table of Contents: “…Information security -- Zubair Baig, Sherali Zeadally and Andrew Woodward; 2.1 Introduction; 2.2 Confidentiality; 2.2.1 Symmetric key cryptography; 2.2.2 Public key cryptography; 2.3 Integrity; 2.4 Availability; 2.5 Authenticity; 2.6 Non-repudiation; 2.7 Standards; 2.7.1 X.509; 2.7.2 Transport layer security; 2.7.3 Hashes; 2.7.4 Digital signatures; 2.7.5 Public key infrastructure; 2.7.6 Public key cryptography…”
Full text (Wentworth users only)
Electronic eBook -
7
-
8
AI and IoT-based intelligent automation in robotics / edited by Ashutosh Kumar Dubey, Abhishek Kumar, S. Rakesh Kumar, N. Gayathri, Prasenjit Das.
Published 2021Table of Contents: “…Securing cloud data by using blend cryptography with AWS services /…”
Full text (Wentworth users only)
Electronic eBook -
9
AI and IoT-based intelligent automation in robotics / edited by Ashutosh Kumar Dubey, Abhishek Kumar, S. Rakesh Kumar, N. Gayathri, Prasenjit Das.
Published 2021Table of Contents: “…Securing cloud data by using blend cryptography with AWS services /…”
Full text (Wentworth users only)
Electronic eBook -
10
AI and IoT-based intelligent automation in robotics / edited by Ashutosh Kumar Dubey, Abhishek Kumar, S. Rakesh Kumar, N. Gayathri, Prasenjit Das.
Published 2021Table of Contents: “…Securing cloud data by using blend cryptography with AWS services /…”
Full text (Wentworth users only)
Electronic eBook -
11
Perfect Secrecy in IoT A Hybrid Combinatorial-Boolean Approach / by Behrouz Zolfaghari, Khodakhast Bibak.
Published 2022Table of Contents: “…Introduction -- A Review on Perfect Secrecy -- Perfect Secrecy and Boolean Functions with Applications in Resource-Constrained IoT Environments -- Cryptography in IoT -- Resilient functions -- Modeling a General Cryptographic Algorithm -- Latin Squares and Cryptography -- Perfectly-Secure Encryption Modeled Using Latin Squares -- Conclusion.…”
Full text (Wentworth users only)
Electronic eBook -
12
Internet of Things Security : Challenges, Advances, and Analytics / by Chintan Patel and Nishant Doshi.
Published 2018Full text (WIT users only)
Electronic eBook -
13
Ransomware Revolution: The Rise of a Prodigious Cyber Threat by Matthew Ryan.
Published 2021Table of Contents: “…Introduction -- Genesis of Ransomware -- Evolution of Applied Cryptography -- Ransomware Economics -- Ransomware Case Studies -- Dangerous Convergences -- Auxiliary Impacts -- Failed Translations -- The Sociology of Ransomware -- Conclusion.…”
Full text (Wentworth users only)
Electronic eBook -
14
-
15
The "Essence" of Network Security: An End-to-End Panorama edited by Mohuya Chakraborty, Moutushi Singh, Valentina E. Balas, Indraneel Mukhopadhyay.
Published 2021Table of Contents: “…Introduction to Network Security Technologies -- A Systematic Review of Digital, Cloud and IoT Forensics -- Blockchain Based Framework for Managing Customer Consent in Open Banking -- A Comprehensive Study of Pros and Cons on Implementation of Block-chain for IoT device Security -- Role of Cryptography in Network Security -- Detection of Malicious URLs using Deep Learning Approach -- Software Defined Network Vulnerabilities -- Demystifying Security on NDN: A survey of Existing Attacks and Open Research Challenges -- Anonymous Traffic Network.…”
Full text (Wentworth users only)
Electronic eBook -
16
-
17
-
18
Internet of Things Security Architectures and Security Measures / by Chuan-Kun Wu.
Published 2021Table of Contents: “…1 Introduction -- 2 Architectures of the Internet of Things -- 3 IoT security architecture -- 4 Fundamentals of cryptography -- 5 Trust mechanism and key management in IoT -- 6 IoT perception layer security -- 7 IoT network layer security -- 8 IoT processing layer security -- 9 Privacy protection in IoT applications -- 10 RFID system security -- 11 On the IT security and the OT security in IoT -- 12 A comprehensive set of security measures for IoT.…”
Full text (Wentworth users only)
Electronic eBook -
19
System design using Internet of things with deep learning applications / edited by Arpan Deyasi, PhD, Angsuman Sarkar, PhD, Soumen Santra, MTech.
Published 2024Table of Contents: “…Usha Bhanu -- IoT in the Construction Industry / Jenifar Begam and Sweta Sarkar -- Object Detection from Video Sequence and Its Analysis for Application in Wildlife / Shruti Shovan Das and Soumyajit Pal -- Design of a Flow Detection Sensor for Single Phase Flow Through Porous Media / Talha Khan and Anustup Chatterjee -- Deep Neural Network-Based Brain Tumor Segmentation / Sayan Chatterjee, Moitri Chakraborty, Akash Maity, and Mainak Biswas -- Voice Command-Based Real-Time Automated Home Security System with Google Assistance Technology / Soumen Santra, Partha Mukherjee, Arpan Deyasi, and Angsuman Sarkar -- Applications of IoT and UAV in Smart Agriculture / Caprio Mistry and Arighna Basak -- A Study on Data Security in Cloud Computing: Traditional Cryptography to the Quantum Age Cryptography / Srinidhi Kulkarni, Rishabh Kumar Tripathi, and Meera Joshi -- Role of Hospitality Institutions in Development of Employability Expertises: Students' Perception Based on Data Analysis / Santanu Dasgupta -- Application of IoT and Big Data in Automated Healthcare / A. …”
Full text (WIT users only)
Electronic eBook -
20
Applications in Electronics Pervading Industry, Environment and Society APPLEPIES 2018 / edited by Sergio Saponara, Alessandro De Gloria.
Published 2019Table of Contents: “…Raspberry Pi 3 Performance Characterization in an Artificial Vision Automotive Application -- Analysis of Cybersecurity Weakness in Automotive In-Vehicle Networking and Hardware Accelerators for Real-time Cryptography -- Testing Facility for the Characterization of the Integration of E-Vehicles into Smart Grid in Presence of Renewable Energy -- On-the-fly Secure Group Communication on CAN Bus -- Neuromuscular Disorders Assessment by FPGA-based SVM Classification of Synchronized EEG/EMG -- Functional Near Infrared Spectroscopy system validation for simultaneous EEG-fNIRS measurements.…”
Full text (Wentworth users only)
Electronic eBook