توضیحاتی در مورد کتاب Advances in Cyber Security: Principle, Techniques, and Applications
نام کتاب : Advances in Cyber Security: Principle, Techniques, and Applications
ویرایش : 2019
عنوان ترجمه شده به فارسی : پیشرفتها در امنیت سایبری: اصول، تکنیکها و کاربردها
سری :
نویسندگان : Kuan-ching Li (editor), Xiaofeng Chen (editor), Willy Susilo (editor)
ناشر : Springer-Nature New York Inc
سال نشر : 2019
تعداد صفحات : 270
ISBN (شابک) : 9811314829 , 9789811314827
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 5 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
توضیحاتی در مورد کتاب :
این کتاب پوشش پیشرفتهای از اصول، تکنیکها و مدیریت مسائل مربوط به امنیت سایبری، از جمله حملات تهدید، حریم خصوصی، امضا و طرحهای رمزگذاری را ارائه میکند. یکی از مهم ترین موضوعات مطرح شده مربوط به راه حل های سبک وزن برای رمزگذاری کلید عمومی در محیط های با محدودیت منابع است. این کتاب آخرین تحولات در این زمینه را برجسته می کند. احراز هویت یکی دیگر از مسائل اصلی در امنیت سایبری است. در این کتاب، ما به این جنبه و جنبههای فرعی از رویکردهای رمزنگاری تا مسائل طراحی عملی، مانند CAPTCHA میپردازیم. حریم خصوصی یکی دیگر از موضوعات اصلی است که به تفصیل مورد بحث قرار می گیرد، از تکنیک های افزایش حریم خصوصی گرفته تا طرح های مستعار.
این کتاب با پرداختن به مسائل کلیدی در زمینه نوظهور امنیت سایبری، به طور موثری شکاف بین امنیت رایانه و حملات تهدید را پر می کند. ، و برنامه های امیدوارکننده ای را که شامل رمزنگاری و امنیت است را به نمایش می گذارد.
فهرست مطالب :
Foreword I
Foreword II
Preface
Acknowledgements
Contents
Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment
1 Introduction
2 Preliminaries
2.1 Notations
2.2 Formal Definitions of Stateful Public-Key Encryption and Its Security
2.3 Symmetric Encryption
2.4 Computational Problems
2.5 Making Use of ``Advantages''
3 Taxonomy of Stateful Public-Key Encryption
4 Basic Schemes
4.1 Nongeneric Schemes
4.2 Generic Schemes
5 Extended Schemes
5.1 Nongeneric Schemes
5.2 Generic Schemes
6 Implementations and Applications
7 Open Problems
References
Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid
1 Introduction
2 General Process of the NILM Approach
2.1 Data Preprocess
2.2 Event Detection and Feature Extraction
2.3 Energy Consumption Learning and Appliance Inference
3 Examples
3.1 A Supervised Learning and Inferring Example
3.2 An Unsupervised Learning and Inferring Example
4 Applications of NILM
4.1 Optimization of Power Use Strategy
4.2 Fault Detection and Diagnosis
4.3 Demand Response
5 Conclusions and Future Work
References
Accountable Anonymous Credentials
1 Introduction
1.1 Organizations
2 Classification of ACS
3 Survey of Existing Schemes
4 Recent Research in Anonymous Credential Systems
4.1 Decentralized Anonymous Credential Systems
4.2 Post-Quantum Secure Anonymous Credential Systems
5 Applications of Anonymous Credential Systems to Cryptocurrencies
6 Conclusion
References
CAPTCHA Design and Security Issues
1 Introduction
2 Text-Based CAPTCHAs
2.1 Security and Usability
2.2 Attacking CAPTCHAs
2.3 Design Variants
3 Image-Based CAPTCHAs
4 Audio CAPTCHAs
5 Other Designs and Issues
6 Conclusion
References
Ring Signature
1 Introduction
1.1 Variants
1.2 Applications
2 Security Model
2.1 Ring Signature
2.2 Linkable Ring Signature
3 Construction of Basic Schemes
3.1 Ring Signature
3.2 Linkable Ring Signature
4 Ring Confidential Transaction
4.1 Formalization of RingCT
4.2 Security Definitions
4.3 Technical Description
4.4 Range Proof
5 Future Works
References
Data Authentication with Privacy Protection
1 Introduction
2 Formal Definition of General RSSs
2.1 Algorithm Definition
2.2 Security Definition
3 Overview of Arbitrary Redaction Control in RSSs
3.1 Problem Formulation
3.2 Countermeasures
4 Preliminaries
4.1 Access Structure
4.2 Monotone Span Program
4.3 Linear Secret-Sharing Scheme
4.4 Threshold Secret-Sharing Schemes
4.5 Access Tree
4.6 Quasi-commutative Accumulator
4.7 Digital Signature Schemes
5 Concrete Solutions of Redaction Control in RSSs
5.1 Solution Based on MSP and LSSS
5.2 Solution Based on TSSS
5.3 Solution Based on Access Tree
6 Analysis of the Proposed Constructions
6.1 Security Analysis
6.2 Efficiency Analysis
7 Conclusion
References
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions
1 Introduction
1.1 Organization
2 Related Work
3 Methodology
4 Preliminaries
5 The Reference e-Shopping Process
5.1 Identifying the Threats
5.2 Starting Point
6 System with a High Level of Privacy and Less Functionalities
6.1 Privacy Goal
6.2 Approach for Privacy Enhancements
6.3 System Processes
6.4 How to Proceed to the Next Step
7 Privacy-Enhanced System with Richer Functionality
7.1 Our Approach
7.2 System Description
8 Security
8.1 Security Properties
8.2 Security of Our System
9 Testing Environment and Results
10 Additional Functionality for the Full System
11 Conclusion and Future Work
11.1 Sketch on ZK Approach for Fraud
References
Pseudonymous Signature Schemes
1 Introduction
2 Application Scenarios and Requirements
2.1 Login Functionality
2.2 Record Authentication in Reputation Systems
2.3 Anonymization in a Filing System
2.4 Privacy-Preserving Self-organization
2.5 Direct Anonymous Attestation
3 Legal Framework
3.1 GDPR
3.2 EIDAS
3.3 Domain Signatures Versus EU Regulations
4 Taxonomy of Domain Signature Systems
4.1 Domain Creation
4.2 Joining
4.3 Revocation
4.4 Deanonymization
4.5 Continuity
4.6 Taxonomy for Example Application Cases
5 Security Models
5.1 Unforgeability
5.2 Seclusiveness
5.3 Unlinkability
6 Algorithms
6.1 Solutions Based on Whitelists
6.2 Pseudonymous Signatures (BSI)
6.3 Schemes Based on SDH Assumption
6.4 Schemes Based on LRSW Assumption
6.5 Certificate-Based Approach
6.6 Schemes Based on Pointcheval–Sanders Signatures
7 Deanonymization and Revocation
7.1 Deanonymization for Hash-Based dPK
7.2 Deanonymization for dPK with Known Discrete Logarithm
7.3 Two-Dimensional Domain Signatures
7.4 Pseudonym Conversion Between Domains
7.5 Revocation
8 Continuity
8.1 Two-Component Keys
8.2 Transition to a New Key
9 Trust and Subversion Resilience
9.1 Trapdoors Breaking Unlinkability
9.2 Leakage and Hidden Fingerprinting
References
توضیحاتی در مورد کتاب به زبان اصلی :
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes.
Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.