Buch
Perfect Secrecy in IoT
-A Hybrid Combinatorial-Boolean Approach-Behrouz Zolfaghari; Khodakhast Bibak
106,99
EUR
Lieferzeit 12-13 Tage
Übersicht
Verlag | : | Springer International Publishing |
Buchreihe | : | Signals and Communication Technology |
Sprache | : | Englisch |
Erschienen | : | 29. 09. 2023 |
Seiten | : | 115 |
Einband | : | Kartoniert |
Höhe | : | 235 mm |
Breite | : | 155 mm |
Gewicht | : | 213 g |
ISBN | : | 9783031131936 |
Sprache | : | Englisch |
Illustrationen | : | XIII, 115 p. 26 illus., 25 illus. in color. |
Autorinformation
Behrouz Zolfaghari has received his Ph.D in Computer Engineering from Amirkabir University, Tehran, Iran. He has done a postdoc at IIT (Indian Institute of Technology) Guwahati, India.He is currently doing another postdoc in the University of Guelph, Canada. His research areas includes VLSI Design, High-Performance Computing, Information-Theoretic Cryptography,Hardware-Oriented Cryptography,  AI-assisted Cryptographyand Secure AI.Khodakhast Bibak is an Assistant Professor at the Department of Computer Science and Software Engineering at Miami University. Previously, he was a Postdoctoral Research Associate (September 2017 - August 2018) in the Coordinated Science Laboratory at the University of Illinois at Urbana-Champaign. Before this, Khodakhast was a Postdoctoral Research Fellow (May-August 2017) at the Department of Computer Science, University of Victoria, from where he also received his PhD (April 2017). He earned a Master of Mathematics degree (April 2013)at the Department of Combinatorics and Optimization, University of Waterloo, where he was also a member of the Centre for Applied Cryptographic Research (CACR). Khodakhast’s research interests are Cybersecurity, Applied Cryptography, Quantum Information Science (QIS), Artificial Intelligence, and the related areas.
Inhaltsverzeichnis
Introduction.- A Review on Perfect Secrecy.- Perfect Secrecy and Boolean Functions with Applications in Resource-Constrained IoT Environments.- Cryptography in IoT.- Resilient functions.- Modeling a General Cryptographic Algorithm.- Latin Squares and Cryptography.- Perfectly-Secure Encryption Modeled Using Latin Squares.- Conclusion.