• Complain

Khaleel Ahmad - Emerging Security Algorithms and Techniques

Here you can read online Khaleel Ahmad - Emerging Security Algorithms and Techniques full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2019, publisher: CRC Press, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

Emerging Security Algorithms and Techniques: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Emerging Security Algorithms and Techniques" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Cyber security is the protection of information systems, hardware,software, andinformation as well from theft, damages, interruption or misdirectiontoany of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengtheningthe security and resilience of cyberspacehas becomea vital homeland security mission.
Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich-Goldwasser-Halevi, Identity Based Encryption, and Attribute Based Encryption.
There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.
The book offers comprehensive coverage of the most essential topics, including:
Modular Arithmetic, Finite Fields
Prime Number, DLP, Integer Factorization Problem
Symmetric Cryptography
Asymmetric Cryptography
Post-Quantum Cryptography
Identity Based Encryption
Attribute Based Encryption
Key Management
Entity Authentication, Message Authentication
Digital Signatures
Hands-On SageMath
This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

Khaleel Ahmad: author's other books


Who wrote Emerging Security Algorithms and Techniques? Find out the surname, the name of the author of the book and a list of all author's works by series.

Emerging Security Algorithms and Techniques — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Emerging Security Algorithms and Techniques" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents Landmarks Emerging Security Algorithms and Techniques Emerging - photo 1
Contents
Landmarks
Emerging Security
Algorithms and Techniques
Emerging Security
Algorithms and Techniques

Edited by

Khaleel Ahmad, M. N. Doja,
Nur Izura Udzir, and Manu Pratap Singh

CRC Press Taylor Francis Group 52 Vanderbilt Avenue New York NY 10017 2019 - photo 2

CRC Press

Taylor & Francis Group

52 Vanderbilt Avenue,

New York, NY 10017

2019 by Taylor & Francis Group, LLC

CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed on acid-free paper

International Standard Book Number-13: 978-0-8153-6145-9 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.

Library of Congress CataloginginPublication Data

Names: Ahmad, Khaleel, editor.

Title: Emerging security algorithms and techniques / editors, Khaleel Ahmad,

M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.

Description: Boca Raton : Taylor & Francis, a CRC title, part of the Taylor &

Francis imprint, a member of the Taylor & Francis Group, the academic

division of T&F Informa, plc, 2019. | Includes bibliographical references

and index.

Identifiers: LCCN 2019010556 | ISBN 9780815361459 (hardback : acid-free paper) |

ISBN 9781351021708 (ebook)

Subjects: LCSH: Computer security. | Data encryption (Computer science) |

Cryptography.

Classification: LCC QA76.9.A25 E466 2019 | DDC 005.8dc23

LC record available at https://lccn.loc.gov/2019010556

Visit the Taylor & Francis Web site at

http://www.taylorandfrancis.com

and the CRC Press Web site at

http://www.crcpress.com

Security is pervasive. It is estimated that 3.3 billion mobile phone users are registered worldwide, which is more than half of the global population. Most of the mobile phones are built-in with Bluetooth, Wi-Fi, cameras, sensors, and many other components. Hence, digital security is no longer limited to the scholarly community but is now the concern of all users of computers worldwide. As e-commerce and electronic transactions have grown exponentially, the development of secure systems has also increased rapidly to protect the digital world against adversaries, giving rise to a vast number of applications of emerging security algorithms, and more applications are developing in proportion to the increasing development and usage of smartphone technology, online banking, m-commerce, share market, cloud computing, etc.

This book covers symmetric, asymmetric and post-quantum cryptography algorithms, and their modern applications in developing secure systems, viz. digital signature, entity authentication, message authentication, cyber security, web security, cloud security, smart card technology, and CAPTCHA. The book has been structured well with simple explanations and illustrations. In other words, this book is designed to support students who are studying computer science and engineering, information technology, electronics and telecommunication engineering at undergraduate and postgraduate levels and teachers, researchers, scientists and engineers who are working in the field of digital security. This book is written with aims to bring out a new paradigm for learning emerging security algorithms and techniques.

This book is organized into 17 chapters. Each chapter covers the following important topics in brief: modular arithmetic, finite fields, prime numbers, discrete logarithm problems, integer factorization problems, symmetric algorithms, asymmetric algorithms, post-quantum cryptography, identity-based encryption, attribute-based encryption, key management, entity authentication, message authentication, digital signatures, applications, and hands-on SageMath.

Dr. Khaleel Ahmad is currently an assistant professor in the Department of Computer Science & Information Technology at Maulana Azad National Urdu University, Hyderabad, with over 6 years of experience in Academic and Research. He holds a PhD in computer science & engineering and M.Tech. in information security. His research interests include opportunistic network, information security, and cryptography. He has successfully completed a project of INR 1.05 lakh. He has supervised five M.Tech. dissertations and two PhDs under progress. He has published a total of 35 papers in refereed journals and conferences (viz. Elsevier, ACM, IEEE, and Springer), including 14 book chapters (Taylor & Francis Group, IGI Global). He has edited a book published by CRC Press/Taylor & Francis Group and Proceeding of International Conference published by McGraw Hill. He has authored a book titled Secure Communication in Opponents Using ECC published by Lap Lambert Academic Publishing. He has delivered guest lectures at the Central University of Haryana, India, and Telangana University, India. He has also chaired the technical sessions at an international conference in Malaysia and India. He is also a life member of various international/national research societies such as ISTE, CRSI, ISCA, IACSIT (Singapore), IAENG (Hong Kong), IARCS, and ISOC (USA). Besides this, he also serves as an editorial and review board member for several international research organizations.

Dr. M. N. Doja is currently a professor in the Department of Computer Engineering at Jamia Millia Islamia (A Central University), New Delhi, India. In addition, he is also the Honorary Director of FTK-Centre for Information Technology Jamia Millia Islamia (A Central University). He is the founder and first head of the Department of Computer Engineering. He has a total of 33 years of experience in teaching and 3 years in industry. He has been nominated as Chief Information Security by Ministry of Electronics & Information Technology, Government of India, and Nodal Officer of Digital India. He was chairman and member of a number of committees constituted by UGC, MHRD, AICTE, other universities, and other external agencies. He has completed a successful project of INR 65 lakhs and other projects of INR 8.74 crore and INR 40 lakhs are ongoing. His research interests include mobile ad hoc network, information security, computer network, and soft computing. He has supervised 16 PhDs and 8 PhDs under progress. He has filed a patent titled Method to Select Sext Best Mobility Anchor Point (MAP) before Band Off Process Reducing Handoff Latency vide application no. 581/DEL/2009 in 2009. He has published more than 150 papers in journal and conference proceedings of international and national repute. He has published two books. He is a reviewer and editor for a number of journals of international and national repute. He has also delivered keynote speeches and expert talks, and also as invited speaker at various international conferences in India and abroad.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Emerging Security Algorithms and Techniques»

Look at similar books to Emerging Security Algorithms and Techniques. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Emerging Security Algorithms and Techniques»

Discussion, reviews of the book Emerging Security Algorithms and Techniques and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.