Advances in cyber security : principles, techniques, and applications /: principles, techniques, and applications. ([2019])
- Record Type:
- Book
- Title:
- Advances in cyber security : principles, techniques, and applications /: principles, techniques, and applications. ([2019])
- Main Title:
- Advances in cyber security : principles, techniques, and applications
- Further Information:
- Note: Kuan-Ching Li, Xiaofeng Chen, Willy Susilo, editors.
- Editors:
- Li, Kuan-Ching
Chen, Xiaofeng
Susilo, Willy - Contents:
- Intro; Foreword I; Foreword II; Preface; Acknowledgements; Contents; Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment; 1 Introduction; 2 Preliminaries; 2.1 Notations; 2.2 Formal Definitions of Stateful Public-Key Encryption and Its Security; 2.3 Symmetric Encryption; 2.4 Computational Problems; 2.5 Making Use of ``Advantages''; 3 Taxonomy of Stateful Public-Key Encryption; 4 Basic Schemes; 4.1 Nongeneric Schemes; 4.2 Generic Schemes; 5 Extended Schemes; 5.1 Nongeneric Schemes; 5.2 Generic Schemes; 6 Implementations and Applications; 7 Open Problems ReferencesNon-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid; 1 Introduction; 2 General Process of the NILM Approach; 2.1 Data Preprocess; 2.2 Event Detection and Feature Extraction; 2.3 Energy Consumption Learning and Appliance Inference; 3 Examples; 3.1 A Supervised Learning and Inferring Example; 3.2 An Unsupervised Learning and Inferring Example; 4 Applications of NILM; 4.1 Optimization of Power Use Strategy; 4.2 Fault Detection and Diagnosis; 4.3 Demand Response; 5 Conclusions and Future Work; References; Accountable Anonymous Credentials; 1 Introduction 1.1 Organizations2 Classification of ACS; 3 Survey of Existing Schemes; 4 Recent Research in Anonymous Credential Systems; 4.1 Decentralized Anonymous Credential Systems; 4.2 Post-Quantum Secure Anonymous Credential Systems; 5 Applications of Anonymous Credential Systems to Cryptocurrencies; 6 Conclusion;Intro; Foreword I; Foreword II; Preface; Acknowledgements; Contents; Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment; 1 Introduction; 2 Preliminaries; 2.1 Notations; 2.2 Formal Definitions of Stateful Public-Key Encryption and Its Security; 2.3 Symmetric Encryption; 2.4 Computational Problems; 2.5 Making Use of ``Advantages''; 3 Taxonomy of Stateful Public-Key Encryption; 4 Basic Schemes; 4.1 Nongeneric Schemes; 4.2 Generic Schemes; 5 Extended Schemes; 5.1 Nongeneric Schemes; 5.2 Generic Schemes; 6 Implementations and Applications; 7 Open Problems ReferencesNon-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid; 1 Introduction; 2 General Process of the NILM Approach; 2.1 Data Preprocess; 2.2 Event Detection and Feature Extraction; 2.3 Energy Consumption Learning and Appliance Inference; 3 Examples; 3.1 A Supervised Learning and Inferring Example; 3.2 An Unsupervised Learning and Inferring Example; 4 Applications of NILM; 4.1 Optimization of Power Use Strategy; 4.2 Fault Detection and Diagnosis; 4.3 Demand Response; 5 Conclusions and Future Work; References; Accountable Anonymous Credentials; 1 Introduction 1.1 Organizations2 Classification of ACS; 3 Survey of Existing Schemes; 4 Recent Research in Anonymous Credential Systems; 4.1 Decentralized Anonymous Credential Systems; 4.2 Post-Quantum Secure Anonymous Credential Systems; 5 Applications of Anonymous Credential Systems to Cryptocurrencies; 6 Conclusion; References; CAPTCHA Design and Security Issues; 1 Introduction; 2 Text-Based CAPTCHAs; 2.1 Security and Usability; 2.2 Attacking CAPTCHAs; 2.3 Design Variants; 3 Image-Based CAPTCHAs; 4 Audio CAPTCHAs; 5 Other Designs and Issues; 6 Conclusion; References; Ring Signature; 1 Introduction 1.1 Variants1.2 Applications; 2 Security Model; 2.1 Ring Signature; 2.2 Linkable Ring Signature; 3 Construction of Basic Schemes; 3.1 Ring Signature; 3.2 Linkable Ring Signature; 4 Ring Confidential Transaction; 4.1 Formalization of RingCT; 4.2 Security Definitions; 4.3 Technical Description; 4.4 Range Proof; 5 Future Works; References; Data Authentication with Privacy Protection; 1 Introduction; 2 Formal Definition of General RSSs; 2.1 Algorithm Definition; 2.2 Security Definition; 3 Overview of Arbitrary Redaction Control in RSSs; 3.1 Problem Formulation; 3.2 Countermeasures 4 Preliminaries4.1 Access Structure; 4.2 Monotone Span Program; 4.3 Linear Secret-Sharing Scheme; 4.4 Threshold Secret-Sharing Schemes; 4.5 Access Tree; 4.6 Quasi-commutative Accumulator; 4.7 Digital Signature Schemes; 5 Concrete Solutions of Redaction Control in RSSs; 5.1 Solution Based on MSP and LSSS; 5.2 Solution Based on TSSS; 5.3 Solution Based on Access Tree; 6 Analysis of the Proposed Constructions; 6.1 Security Analysis; 6.2 Efficiency Analysis; 7 Conclusion; References; A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions; 1 Introduction 1.1 Organization … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2019
- Extent:
- 1 online resource (270 pages)
- Subjects:
- 005.8
Computer security
Computer security
Electronic books - Languages:
- English
- ISBNs:
- 9789811314834
9811314837 - Related ISBNs:
- 9789811314827
9811314829 - Notes:
- Note: Description based on online resource; title from digital title page (viewed on February 12, 2019).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.407529
- Ingest File:
- 02_479.xml