Information Security, Privacy and Digital Forensics
Select Proceedings of the International Conference, ICISPD 2022
Chapter and Conference Paper
Although the Internet of Things (IoT) devices simplify and automate everyday tasks, they also introduce a tremendous amount of security flaws. The current insufficient security measures for smart device protec...
Book and Conference Proceedings
Select Proceedings of the International Conference, ICISPD 2022
Chapter and Conference Paper
Boltzmann Machine (BM) and Brooks–Iyengar (BI) algorithm are solving similar problems in sensor fusion. Relationships between these two are established in detail. During 1984, BM was used as a toolset to solve...
Chapter
The greatest requirement in the modern age is the need for empowering security that will provide tamper evident information exchange. This brings up a prominent need for techniques that integrate modern crypto...
Chapter
There are many applications that can benefit from the adoption of homomorphic encryption schemes. However, one of the front runners in terms of consideration for adoption is cloud computing systems.
Chapter
The symmetric key cryptosystems have certain drawbacks which were highlighted in the previous chapter. To overcome the major disadvantage related to the compromise of one key being a potential threat to the wh...
Chapter
The important requirement in the current cyber age is the need for empowering security that will provide tamper evident information exchange, i.e., information can be exchanged among any entity without any has...
Chapter
The content mentioned below has not been published anywhere but is only discussed internally and stored in repositories.
Chapter
There have been many applications that have been identified that use Quantum computing.
Chapter
The rapid growth in technology and the interconnectivity we have achieved among devices is largely due to the availability of small, highly inexpensive sensory devices. These sensors have helped us realize and...
Chapter
All IoT sensors and devices are prone to breach of the tenets of information security (confidentiality, integrity, and availability).
Chapter
Trust plays an integral part in network communications. In an IoT environment with multiple communicating entities, the need for trust is more pronounced. The presence of trust with the communicating entity en...
Chapter
Symmetric key cryptography (or symmetric encryption) deals with the use of a single key for both the encryption and decryption of messages. It was the most prominent approach to secure information for decades ...
Chapter
Homomorphic encryption as discussed in the previous chapters has been a topic of great interest in untrusted systems like the cloud systems. There are various other applications of using the system as well. Ho...
Chapter
Statistical methods and computational capabilities have grown tremendously in the past few decades. Along with the growing interest in Artificial Intelligence and Machine Learning, there is also significant de...
Chapter
In order to see the effectiveness of the proposed idea in the previous chapter, we are implementing a Python-based library called PyTEDSP. Experiments were run on the implemented library to identify the performan...
Chapter
Smart sensor discovery and advancement in the manufacturing techniques led to the design and development of novel devices and techniques that could successfully bridge the gap between humans and machines.
Chapter
The idea of a connected ecosystem with devices being capable to communicate and automatically work toward specified application goals has been around for a long time.
Chapter
In this section will be developed all the tools necessary to be able to implement the best Quantum Cryptography solutions involved in the most modern applications of the new millennium.
Chapter
The real-world system can be represented in terms of multiple complex and semantically coherent networks. The networks have some correlation among each other and complement each other’s functionality. Such cor...