![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter
Asymmetric Key Cryptography
The symmetric key cryptosystems have certain drawbacks which were highlighted in the previous chapter. To overcome the major disadvantage related to the compromise of one key being a potential threat to the wh...
-
Chapter
Introduction
The important requirement in the current cyber age is the need for empowering security that will provide tamper evident information exchange, i.e., information can be exchanged among any entity without any has...
-
Chapter
Quantum Cryptography
The content mentioned below has not been published anywhere but is only discussed internally and stored in repositories.
-
Chapter
Applications
There have been many applications that have been identified that use Quantum computing.
-
Chapter and Conference Paper
Social Interaction-Enabled Industrial Internet of Things for Predictive Maintenance
As Internet of Things (IoT) advances from interacting objects to smart objects. Further, adopting social networking concepts into IoT leads to social objects. Following this conception, the Social Internet of ...
-
Chapter
Introduction
The rapid growth in technology and the interconnectivity we have achieved among devices is largely due to the availability of small, highly inexpensive sensory devices. These sensors have helped us realize and...
-
Chapter
IoT Security
All IoT sensors and devices are prone to breach of the tenets of information security (confidentiality, integrity, and availability).
-
Chapter
Onboarding New IoT Devices
Trust plays an integral part in network communications. In an IoT environment with multiple communicating entities, the need for trust is more pronounced. The presence of trust with the communicating entity en...
-
Chapter
Symmetric Key Cryptography
Symmetric key cryptography (or symmetric encryption) deals with the use of a single key for both the encryption and decryption of messages. It was the most prominent approach to secure information for decades ...
-
Chapter
Industrial Involvement in the Use of Homomorphic Encryption
Homomorphic encryption as discussed in the previous chapters has been a topic of great interest in untrusted systems like the cloud systems. There are various other applications of using the system as well. Ho...
-
Chapter
Homomorphic Encryption
Statistical methods and computational capabilities have grown tremendously in the past few decades. Along with the growing interest in Artificial Intelligence and Machine Learning, there is also significant de...
-
Chapter
Implementation Details
In order to see the effectiveness of the proposed idea in the previous chapter, we are implementing a Python-based library called PyTEDSP. Experiments were run on the implemented library to identify the performan...
-
Chapter
Smart Objects in Cyber-Physical Systems
Smart sensor discovery and advancement in the manufacturing techniques led to the design and development of novel devices and techniques that could successfully bridge the gap between humans and machines.
-
Chapter
Understanding the Smart Systems: IoT Protocol Stack
The idea of a connected ecosystem with devices being capable to communicate and automatically work toward specified application goals has been around for a long time.
-
Chapter
Quantum Tools
In this section will be developed all the tools necessary to be able to implement the best Quantum Cryptography solutions involved in the most modern applications of the new millennium.
-
Article
Open AccessCRUPA: collusion resistant user revocable public auditing of shared data in cloud
Cloud repository is one of the most important services afforded by Cloud Computing where information is preserved, maintained, archived in distant servers and made available to the users over the Internet. Pro...
-
Chapter
Conclusion
Now more than ever machine learning and embedded AI will be essential in maintaining information assurance for all aspects of our nation’s security and defense, as well as every transaction we make in governme...
-
Chapter
General Framework of Mathematics
With the explosive growth of data nowadays, a young and interdisciplinary field, data science , has emerged, which uses scientific methods, processes, algorithms, and systems to extract knowledge and insights fr...
-
Chapter
Development of Novel Techniques of CoCoSSC Method
This chapter provides an introduction to our main contributions concerning the development of the novel methods of CoCoSSC.
-
Chapter
Related Work on Geometry of Non-Convex Programs
Over the past few years, there have been increasing interest in understanding the geometry of non-convex programs that naturally arise from machine learning problems. It is particularly interesting to study ad...