Showing 1 - 20 results of 64 for search '"cryptography"', query time: 0.11s Refine Results
  1. 1

    New Frontiers in Cryptography Quantum, Blockchain, Lightweight, Chaotic and DNA / by Khaled Salah Mohamed. by Mohamed, Khaled Salah

    Published 2020
    Table of Contents: “…New Trends in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA Cryptography -- Chapter 5. …”
    Full text (Wentworth users only)
    Electronic eBook
  2. 2
  3. 3
  4. 4

    Advances in applications of computational intelligence and the Internet of Things (IoT) : cryptography and network security in IoTs /...

    Published 2022
    Table of Contents: “…A New Cryptographic Modus Operandi Approach Based on Amalgamation of Physics and Chemistry / Sukhwant Kumar, Smriti Kumari, and Rajdeep Chowdhury -- Application of Cryptography and Network Security in the Internet of Things (IoT) / K. …”
    Full text (WIT users only)
    Electronic eBook
  5. 5

    Blockchain Technology From Theory to Practice / by Sudeep Tanwar. by Tanwar, Sudeep

    Published 2022
    Subjects:
    Full text (Wentworth users only)
    Electronic eBook
  6. 6

    Authentication technologies for cloud technology, IoT, and big data / edited by Yasser M. Alginahi and Muhammad Nomani Kabir.

    Published 2019
    Table of Contents: “…Information security -- Zubair Baig, Sherali Zeadally and Andrew Woodward; 2.1 Introduction; 2.2 Confidentiality; 2.2.1 Symmetric key cryptography; 2.2.2 Public key cryptography; 2.3 Integrity; 2.4 Availability; 2.5 Authenticity; 2.6 Non-repudiation; 2.7 Standards; 2.7.1 X.509; 2.7.2 Transport layer security; 2.7.3 Hashes; 2.7.4 Digital signatures; 2.7.5 Public key infrastructure; 2.7.6 Public key cryptography…”
    Full text (Wentworth users only)
    Electronic eBook
  7. 7
  8. 8

    AI and IoT-based intelligent automation in robotics / edited by Ashutosh Kumar Dubey, Abhishek Kumar, S. Rakesh Kumar, N. Gayathri, Prasenjit Das.

    Published 2021
    Table of Contents: “…Securing cloud data by using blend cryptography with AWS services /…”
    Full text (Wentworth users only)
    Electronic eBook
  9. 9

    AI and IoT-based intelligent automation in robotics / edited by Ashutosh Kumar Dubey, Abhishek Kumar, S. Rakesh Kumar, N. Gayathri, Prasenjit Das.

    Published 2021
    Table of Contents: “…Securing cloud data by using blend cryptography with AWS services /…”
    Full text (Wentworth users only)
    Electronic eBook
  10. 10

    AI and IoT-based intelligent automation in robotics / edited by Ashutosh Kumar Dubey, Abhishek Kumar, S. Rakesh Kumar, N. Gayathri, Prasenjit Das.

    Published 2021
    Table of Contents: “…Securing cloud data by using blend cryptography with AWS services /…”
    Full text (Wentworth users only)
    Electronic eBook
  11. 11

    Perfect Secrecy in IoT A Hybrid Combinatorial-Boolean Approach / by Behrouz Zolfaghari, Khodakhast Bibak. by Zolfaghari, Behrouz, Bibak, Khodakhast

    Published 2022
    Table of Contents: “…Introduction -- A Review on Perfect Secrecy -- Perfect Secrecy and Boolean Functions with Applications in Resource-Constrained IoT Environments -- Cryptography in IoT -- Resilient functions -- Modeling a General Cryptographic Algorithm -- Latin Squares and Cryptography -- Perfectly-Secure Encryption Modeled Using Latin Squares -- Conclusion.…”
    Full text (Wentworth users only)
    Electronic eBook
  12. 12
  13. 13

    Ransomware Revolution: The Rise of a Prodigious Cyber Threat by Matthew Ryan. by Ryan, Matthew

    Published 2021
    Table of Contents: “…Introduction -- Genesis of Ransomware -- Evolution of Applied Cryptography -- Ransomware Economics -- Ransomware Case Studies -- Dangerous Convergences -- Auxiliary Impacts -- Failed Translations -- The Sociology of Ransomware -- Conclusion.…”
    Full text (Wentworth users only)
    Electronic eBook
  14. 14
  15. 15

    The "Essence" of Network Security: An End-to-End Panorama edited by Mohuya Chakraborty, Moutushi Singh, Valentina E. Balas, Indraneel Mukhopadhyay.

    Published 2021
    Table of Contents: “…Introduction to Network Security Technologies -- A Systematic Review of Digital, Cloud and IoT Forensics -- Blockchain Based Framework for Managing Customer Consent in Open Banking -- A Comprehensive Study of Pros and Cons on Implementation of Block-chain for IoT device Security -- Role of Cryptography in Network Security -- Detection of Malicious URLs using Deep Learning Approach -- Software Defined Network Vulnerabilities -- Demystifying Security on NDN: A survey of Existing Attacks and Open Research Challenges -- Anonymous Traffic Network.…”
    Full text (Wentworth users only)
    Electronic eBook
  16. 16
  17. 17
  18. 18

    Internet of Things Security Architectures and Security Measures / by Chuan-Kun Wu. by Wu, Chuan-Kun

    Published 2021
    Table of Contents: “…1 Introduction -- 2 Architectures of the Internet of Things -- 3 IoT security architecture -- 4 Fundamentals of cryptography -- 5 Trust mechanism and key management in IoT -- 6 IoT perception layer security -- 7 IoT network layer security -- 8 IoT processing layer security -- 9 Privacy protection in IoT applications -- 10 RFID system security -- 11 On the IT security and the OT security in IoT -- 12 A comprehensive set of security measures for IoT.…”
    Full text (Wentworth users only)
    Electronic eBook
  19. 19

    System design using Internet of things with deep learning applications / edited by Arpan Deyasi, PhD, Angsuman Sarkar, PhD, Soumen Santra, MTech.

    Published 2024
    Table of Contents: “…Usha Bhanu -- IoT in the Construction Industry / Jenifar Begam and Sweta Sarkar -- Object Detection from Video Sequence and Its Analysis for Application in Wildlife / Shruti Shovan Das and Soumyajit Pal -- Design of a Flow Detection Sensor for Single Phase Flow Through Porous Media / Talha Khan and Anustup Chatterjee -- Deep Neural Network-Based Brain Tumor Segmentation / Sayan Chatterjee, Moitri Chakraborty, Akash Maity, and Mainak Biswas -- Voice Command-Based Real-Time Automated Home Security System with Google Assistance Technology / Soumen Santra, Partha Mukherjee, Arpan Deyasi, and Angsuman Sarkar -- Applications of IoT and UAV in Smart Agriculture / Caprio Mistry and Arighna Basak -- A Study on Data Security in Cloud Computing: Traditional Cryptography to the Quantum Age Cryptography / Srinidhi Kulkarni, Rishabh Kumar Tripathi, and Meera Joshi -- Role of Hospitality Institutions in Development of Employability Expertises: Students' Perception Based on Data Analysis / Santanu Dasgupta -- Application of IoT and Big Data in Automated Healthcare / A. …”
    Full text (WIT users only)
    Electronic eBook
  20. 20

    Applications in Electronics Pervading Industry, Environment and Society APPLEPIES 2018 / edited by Sergio Saponara, Alessandro De Gloria.

    Published 2019
    Table of Contents: “…Raspberry Pi 3 Performance Characterization in an Artificial Vision Automotive Application -- Analysis of Cybersecurity Weakness in Automotive In-Vehicle Networking and Hardware Accelerators for Real-time Cryptography -- Testing Facility for the Characterization of the Integration of E-Vehicles into Smart Grid in Presence of Renewable Energy -- On-the-fly Secure Group Communication on CAN Bus -- Neuromuscular Disorders Assessment by FPGA-based SVM Classification of Synchronized EEG/EMG -- Functional Near Infrared Spectroscopy system validation for simultaneous EEG-fNIRS measurements.…”
    Full text (Wentworth users only)
    Electronic eBook