Advertisement

Advances in Cyber Security: Principles, Techniques, and Applications

  • Kuan-Ching Li
  • Xiaofeng Chen
  • Willy Susilo

Table of contents

  1. Front Matter
    Pages i-xix
  2. Joonsang Baek, Willy Susilo, Khaled Salah, Jun Su Ha, Ernesto Damiani, Ilsun You
    Pages 1-22
  3. Zijian Zhang, Jialing He, Liehuang Zhu, Kui Ren
    Pages 23-48
  4. Zuoxia Yu, Man Ho Au, Rupeng Yang
    Pages 49-68
  5. Yang-Wai Chow, Willy Susilo, Pairat Thorncharoensri
    Pages 69-92
  6. Joseph K. Liu
    Pages 93-114
  7. Jianghua Liu, Yang Xiang, Wanlei Zhou, Xinyi Huang, Jinhua Ma
    Pages 115-142
  8. Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodriguez, Moti Yung
    Pages 143-183
  9. Przemysław Błaśkiewicz, Lucjan Hanzlik, Kamil Kluczniak, Łukasz Krzywiecki, Mirosław Kutyłowski, Marcin Słowik et al.
    Pages 185-255

About this book

Introduction

This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes.

Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.


Keywords

Cryptology Information security Data privacy Network security Cyber security Data leak Physical layer security Cloud security Encryption Authentication Threat intelligence Insider attack Information Forensics Security Policies and Trust Management Formal Methods Application in Security

Editors and affiliations

  1. 1.Department of Computer Science and Information EngineeringProvidence UniversityTaichungTaiwan
  2. 2.School of Cyber EngineeringXidian UniversityXi'anChina
  3. 3.School of Computing and Information TechnologyUniversity of WollongongWollongongAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-981-13-1483-4
  • Copyright Information Springer Nature Singapore Pte Ltd. 2019
  • Publisher Name Springer, Singapore
  • eBook Packages Computer Science
  • Print ISBN 978-981-13-1482-7
  • Online ISBN 978-981-13-1483-4
  • Buy this book on publisher's site