full screen
Home > Computer & Internet > Computer security > Emerging Security Algorithms and Techniques
Emerging Security Algorithms and Techniques

Emerging Security Algorithms and Techniques


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
About the Book

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.

Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich-Goldwasser-Halevi, Identity Based Encryption, and Attribute Based Encryption.

There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.

The book offers comprehensive coverage of the most essential topics, including:

  • Modular Arithmetic, Finite Fields
  • Prime Number, DLP, Integer Factorization Problem
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Post-Quantum Cryptography
  • Identity Based Encryption
  • Attribute Based Encryption
  • Key Management
  • Entity Authentication, Message Authentication
  • Digital Signatures
  • Hands-On SageMath

This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.


About the Author:

Dr. M N Doja is currently a Professor in the Department of Computer Engineering at Jamia Millia Islamia (A Central University), New Delhi, India. In addition, he is also Honorary Honorary Director, FTK-Centre for Information Technology Jamia Milllia Islamia (A Central University). He is a founder Head, Department of Computer Engineering. He has 33 years teaching and 3 years industry experience. He has nominated as Chief Information Security by Ministry of Electronics & Information Technology, Government Of India and Nodal Officer of Digital India. He was Chairman and Member of a number of committees constituted by UGC, MHRD, AICTE, other universities and other external agencies. He has completed successfully project of Rs. 65 Lakhs (INR) and other projects of 8.74 Crore (INR) and 40 Lakhs are going on. His areas of specialization are Mobile Ad hoc Network, Information security, Computer Network, Soft Computing. He has supervised 16 PhD and 8PhD under progress. He has filed a patent entitled "Method to select sext best mobility anchor point (MAP) before band off process reducing handoff latency" vide aplication no. 581/DEL/2009 in 2009. He has published more than 150 papers in Journal and Conference proceedings of International and National repute. He has published two books. He is a reviewer and editor for a number of Journals of International and National repute. He has also delivered keynote speeches and expert talks, and also as invited speaker at various international conferences in India and abroad.

Assoc. Prof. Dr. Nur Izura Udzir is an academic staff at the Faculty of Computer Science and Information Technology, Universiti Putra Malaysia (UPM) since 1998. She received her Bachelor of Computer Science (1995) and Master of Science (1998) from UPM, and her PhD in Computer Science from the University of York, UK (2006). Her areas of specialization are access control, intrusion detection systems, secure operating systems, coordination models and languages, and distributed systems. She has served as the Head of Department of Computer Science and is currently a member of the Information Security Group (which she led in 2008-2013) at the faculty. She is a member of IEEE Computer Society, Malaysian Society for Cryptology Research (MSCR), the Society of Digital Information and Wireless Communications (SDIWC), and currently served as a Committee Member of the Information Security Professionals Association of Malaysia (ISPA.my). Dr. Nur Izura has supervised and co-supervised over 30 PhD students and over 15 Master (by research) students. She has written a book, "Pengenalan kepada Pengaturcaraan C++" (Introduction to C++ Programming) (2001), and has published over 60 articles in journals and as book chapters, and over 80 international conference proceedings, thus earning a H-index of 9 in Scopus (H-index 15 in Google Scholar) as of March 2016. In addition, she has won various awards for her contributions in academic and research, including six Best Paper Awards at international conferences and the MIMOS Prestigious Award 2015 for the supervision of her student's doctoral thesis. She has also delivered keynote speeches and expert talks, and also as invited speaker at various international conferences.

Dr. Khaleel Ahmad is currently an Assistant Professor in the Department of Computer Science & Information Technology at Maulana Azad National Urdu University, Hyderabad with over 6 years of experience in Academic and Research. He holds a PhD in Computer Science & Engineering and M.Tech in Information Security. His research area is Opportunistic Network, Information Security and Cryptography. He has completed successfully project of Rs. 1.05 Lakh (INR). He has supervised 5 M.Tech. Dissertations and 2 PhD under progress. He has 35 published papers in refereed Journals and conferences (viz. Elsevier, ACM, IEEE, and Springer), 14 book chapters (Taylor & Francis Group, IGI Global). He has edited a book published by Taylor & Francis, Proceeding of International Conference published by McGraw Hill. He has authored of one book titled "Secure Communication in oppnets Using ECC" published by Lap Lambert Academic Publishing. He has delivered guest lectures at the Central University of Haryana, India and Telangana University, India and also chaired the technical session at an international conference in Malaysia and India. He is also the life member of various international/national research societies viz. ISTE, CRSI, ISCA, IACSIT (Singapore), IAENG (Hong Kong), IARCS, ISOC (USA). In addition, he is associated with many international research organizations as editorial board member and reviewer.

Assoc. Prof. Dr. Manu Pratap Singh received his Ph.D. in Computer science from Kumaun University Nanital, Uthrakhand, India, in 2001. He has completed his Master of Science in Computer Science from Allahabad University, Allahabad in 1995. Further he obtained the M. Tech. in Information technology from Mysore. He is currently as Associate Professor in Department of Computer Science, Institute of Engineering and Technology, Dr. B.R. Ambedkar University, Agra, UP, India since 2008. He is engaged in teaching and research since last 17 years. He has more than 90 research papers in journals of international and national repute. His work has been recognized widely around the world in the form of citations of my research papers. He also has received the Young Scientist Award in computer science by international Academy of Physical sciences, Allahabad in year 2005. He has guided 18 students for their doctorate in computer science. He is also referee of various international and national journals like International Journal of Uncertainty, Fuzziness and Knowledge Based Systems by World scientific publishing cooperation Ltd, International Journal of Engineering, Iran, IEEE Transaction of fuzzy systems and European journal of operation research by Elsevier. His research interests are focused on Neural networks, pattern recognition and machine intelligence He is a member of technical committee of IASTED, Canada since 2004. He is also the regular member of machine intelligence Research Labs (MIR Labs), scientific network for innovation and research excellence (SNIRE), Auburn, Washington, USE, http: //www.mirlabs.org, since 2012. His Google citation indices are 9, i10-index is 8 and he has 257 citations. He has been invited as keynote speaker and invited guest speaker in various institutions in India and Abroad.


Best Sellers



Product Details
  • ISBN-13: 9780815361459
  • Publisher: CRC Press
  • Publisher Imprint: Crc Press
  • Height: 254 mm
  • No of Pages: 318
  • Spine Width: 0 mm
  • Width: 178 mm
  • ISBN-10: 0815361459
  • Publisher Date: 04 Jun 2019
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Weight: 110 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Emerging Security Algorithms and Techniques
CRC Press -
Emerging Security Algorithms and Techniques
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Emerging Security Algorithms and Techniques

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Booksbay (the "CRR Service").


    By submitting any content to Booksbay, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Booksbay (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Booksbay a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Booksbay may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Booksbay's sole discretion. Booksbay reserves the right to change, condense, withhold publication, remove or delete any content on Booksbay's website that Booksbay deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Booksbay does not guarantee that you will have any recourse through Booksbay to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Booksbay reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Booksbay, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Booksbay, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!