Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Lightweight Malicious Packet Classifier for IoT Networks

    Although the Internet of Things (IoT) devices simplify and automate everyday tasks, they also introduce a tremendous amount of security flaws. The current insufficient security measures for smart device protec...

    Seyedsina Nabavirazavi, S. S. Iyengar in Information Security, Privacy and Digital … (2024)

  2. No Access

    Book and Conference Proceedings

    Information Security, Privacy and Digital Forensics

    Select Proceedings of the International Conference, ICISPD 2022

    Sankita J. Patel in Lecture Notes in Electrical Engineering (2024)

  3. No Access

    Chapter and Conference Paper

    Sensor Fusion and Pontryagin Duality

    Boltzmann Machine (BM) and Brooks–Iyengar (BI) algorithm are solving similar problems in sensor fusion. Relationships between these two are established in detail. During 1984, BM was used as a toolset to solve...

    S. Jayakumar, S. S. Iyengar in Information Security, Privacy and Digital … (2024)

  4. No Access

    Chapter

    Introduction

    The greatest requirement in the modern age is the need for empowering security that will provide tamper evident information exchange. This brings up a prominent need for techniques that integrate modern crypto...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  5. No Access

    Chapter

    Popular Homomorphic Encryption Schemes

    There are many applications that can benefit from the adoption of homomorphic encryption schemes. However, one of the front runners in terms of consideration for adoption is cloud computing systems.

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  6. No Access

    Chapter

    Asymmetric Key Cryptography

    The symmetric key cryptosystems have certain drawbacks which were highlighted in the previous chapter. To overcome the major disadvantage related to the compromise of one key being a potential threat to the wh...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  7. No Access

    Chapter

    Introduction

    The important requirement in the current cyber age is the need for empowering security that will provide tamper evident information exchange, i.e., information can be exchanged among any entity without any has...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  8. No Access

    Chapter

    Quantum Cryptography

    The content mentioned below has not been published anywhere but is only discussed internally and stored in repositories.

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  9. No Access

    Chapter

    Applications

    There have been many applications that have been identified that use Quantum computing.

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  10. No Access

    Chapter

    Introduction

    The rapid growth in technology and the interconnectivity we have achieved among devices is largely due to the availability of small, highly inexpensive sensory devices. These sensors have helped us realize and...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  11. No Access

    Chapter

    IoT Security

    All IoT sensors and devices are prone to breach of the tenets of information security (confidentiality, integrity, and availability).

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  12. No Access

    Chapter

    Onboarding New IoT Devices

    Trust plays an integral part in network communications. In an IoT environment with multiple communicating entities, the need for trust is more pronounced. The presence of trust with the communicating entity en...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  13. No Access

    Chapter

    Symmetric Key Cryptography

    Symmetric key cryptography (or symmetric encryption) deals with the use of a single key for both the encryption and decryption of messages. It was the most prominent approach to secure information for decades ...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  14. No Access

    Chapter

    Industrial Involvement in the Use of Homomorphic Encryption

    Homomorphic encryption as discussed in the previous chapters has been a topic of great interest in untrusted systems like the cloud systems. There are various other applications of using the system as well. Ho...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  15. No Access

    Chapter

    Homomorphic Encryption

    Statistical methods and computational capabilities have grown tremendously in the past few decades. Along with the growing interest in Artificial Intelligence and Machine Learning, there is also significant de...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  16. No Access

    Chapter

    Implementation Details

    In order to see the effectiveness of the proposed idea in the previous chapter, we are implementing a Python-based library called PyTEDSP. Experiments were run on the implemented library to identify the performan...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  17. No Access

    Chapter

    Smart Objects in Cyber-Physical Systems

    Smart sensor discovery and advancement in the manufacturing techniques led to the design and development of novel devices and techniques that could successfully bridge the gap between humans and machines.

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  18. No Access

    Chapter

    Understanding the Smart Systems: IoT Protocol Stack

    The idea of a connected ecosystem with devices being capable to communicate and automatically work toward specified application goals has been around for a long time.

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  19. No Access

    Chapter

    Quantum Tools

    In this section will be developed all the tools necessary to be able to implement the best Quantum Cryptography solutions involved in the most modern applications of the new millennium.

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  20. No Access

    Chapter

    Interdependent Networks from Societal Perspective: MITS (Multi-Context Influence Tracking on Social Network)

    The real-world system can be represented in terms of multiple complex and semantically coherent networks. The networks have some correlation among each other and complement each other’s functionality. Such cor...

    Ramesh Baral, S. S. Iyengar, Asad M. Madni in Sustainable Interdependent Networks II (2019)

previous disabled Page of 2