Skip to main content

Page of 5
and
  1. No Access

    Chapter

    Asymmetric Key Cryptography

    The symmetric key cryptosystems have certain drawbacks which were highlighted in the previous chapter. To overcome the major disadvantage related to the compromise of one key being a potential threat to the wh...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  2. No Access

    Chapter

    Introduction

    The important requirement in the current cyber age is the need for empowering security that will provide tamper evident information exchange, i.e., information can be exchanged among any entity without any has...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  3. No Access

    Chapter

    Quantum Cryptography

    The content mentioned below has not been published anywhere but is only discussed internally and stored in repositories.

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  4. No Access

    Chapter

    Applications

    There have been many applications that have been identified that use Quantum computing.

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  5. No Access

    Chapter and Conference Paper

    Social Interaction-Enabled Industrial Internet of Things for Predictive Maintenance

    As Internet of Things (IoT) advances from interacting objects to smart objects. Further, adopting social networking concepts into IoT leads to social objects. Following this conception, the Social Internet of ...

    M. S. Roopa, B. Pallavi, Rajkumar Buyya, K. R. Venugopal in ICT Systems and Sustainability (2021)

  6. No Access

    Chapter

    Introduction

    The rapid growth in technology and the interconnectivity we have achieved among devices is largely due to the availability of small, highly inexpensive sensory devices. These sensors have helped us realize and...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  7. No Access

    Chapter

    IoT Security

    All IoT sensors and devices are prone to breach of the tenets of information security (confidentiality, integrity, and availability).

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  8. No Access

    Chapter

    Onboarding New IoT Devices

    Trust plays an integral part in network communications. In an IoT environment with multiple communicating entities, the need for trust is more pronounced. The presence of trust with the communicating entity en...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  9. No Access

    Chapter

    Symmetric Key Cryptography

    Symmetric key cryptography (or symmetric encryption) deals with the use of a single key for both the encryption and decryption of messages. It was the most prominent approach to secure information for decades ...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  10. No Access

    Chapter

    Industrial Involvement in the Use of Homomorphic Encryption

    Homomorphic encryption as discussed in the previous chapters has been a topic of great interest in untrusted systems like the cloud systems. There are various other applications of using the system as well. Ho...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  11. No Access

    Chapter

    Homomorphic Encryption

    Statistical methods and computational capabilities have grown tremendously in the past few decades. Along with the growing interest in Artificial Intelligence and Machine Learning, there is also significant de...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  12. No Access

    Chapter

    Implementation Details

    In order to see the effectiveness of the proposed idea in the previous chapter, we are implementing a Python-based library called PyTEDSP. Experiments were run on the implemented library to identify the performan...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  13. No Access

    Chapter

    Smart Objects in Cyber-Physical Systems

    Smart sensor discovery and advancement in the manufacturing techniques led to the design and development of novel devices and techniques that could successfully bridge the gap between humans and machines.

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  14. No Access

    Chapter

    Understanding the Smart Systems: IoT Protocol Stack

    The idea of a connected ecosystem with devices being capable to communicate and automatically work toward specified application goals has been around for a long time.

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  15. No Access

    Chapter

    Quantum Tools

    In this section will be developed all the tools necessary to be able to implement the best Quantum Cryptography solutions involved in the most modern applications of the new millennium.

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  16. Article

    Open Access

    CRUPA: collusion resistant user revocable public auditing of shared data in cloud

    Cloud repository is one of the most important services afforded by Cloud Computing where information is preserved, maintained, archived in distant servers and made available to the users over the Internet. Pro...

    Geeta C. Mara, Usharani Rathod, Shreyas Raju R. G. in Journal of Cloud Computing (2020)

  17. Chapter

    Conclusion

    Now more than ever machine learning and embedded AI will be essential in maintaining information assurance for all aspects of our nation’s security and defense, as well as every transaction we make in governme...

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  18. No Access

    Chapter

    General Framework of Mathematics

    With the explosive growth of data nowadays, a young and interdisciplinary field, data science , has emerged, which uses scientific methods, processes, algorithms, and systems to extract knowledge and insights fr...

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  19. No Access

    Chapter

    Development of Novel Techniques of CoCoSSC Method

    This chapter provides an introduction to our main contributions concerning the development of the novel methods of CoCoSSC.

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

  20. No Access

    Chapter

    Related Work on Geometry of Non-Convex Programs

    Over the past few years, there have been increasing interest in understanding the geometry of non-convex programs that naturally arise from machine learning problems. It is particularly interesting to study ad...

    Bin Shi, S. S. Iyengar in Mathematical Theories of Machine Learning … (2020)

Page of 5