Buch


Perfect Secrecy in IoT

Perfect Secrecy in IoT

-A Hybrid Combinatorial-Boolean Approach-

Behrouz Zolfaghari; Khodakhast Bibak

 

106,99 EUR
Lieferzeit 12-13 Tage



106,99 EUR
Lieferzeit 12-13 Tage



Autorinformation
Inhaltsverzeichnis


Übersicht


Verlag : Springer International Publishing
Buchreihe : Signals and Communication Technology
Sprache : Englisch
Erschienen : 29. 09. 2023
Seiten : 115
Einband : Kartoniert
Höhe : 235 mm
Breite : 155 mm
Gewicht : 213 g
ISBN : 9783031131936
Sprache : Englisch
Illustrationen : XIII, 115 p. 26 illus., 25 illus. in color.

Du und »Perfect Secrecy in IoT«




Autorinformation


Behrouz Zolfaghari has received his Ph.D in Computer Engineering from Amirkabir University, Tehran, Iran. He has done a postdoc at IIT (Indian Institute of Technology) Guwahati, India.He is currently doing another postdoc in the University of Guelph, Canada. His research areas includes VLSI Design, High-Performance Computing, Information-Theoretic Cryptography,Hardware-Oriented Cryptography,  AI-assisted Cryptographyand Secure AI.Khodakhast Bibak is an Assistant Professor at the Department of Computer Science and Software Engineering at Miami University. Previously, he was a Postdoctoral Research Associate (September 2017 - August 2018) in the Coordinated Science Laboratory at the University of Illinois at Urbana-Champaign. Before this, Khodakhast was a Postdoctoral Research Fellow (May-August 2017) at the Department of Computer Science, University of Victoria, from where he also received his PhD (April 2017). He earned a Master of Mathematics degree (April 2013)at the Department of Combinatorics and Optimization, University of Waterloo, where he was also a member of the Centre for Applied Cryptographic Research (CACR). Khodakhast’s research interests are Cybersecurity, Applied Cryptography, Quantum Information Science (QIS), Artificial Intelligence, and the related areas.

Inhaltsverzeichnis


Introduction.- A Review on Perfect Secrecy.- Perfect Secrecy and Boolean Functions with Applications in Resource-Constrained IoT Environments.- Cryptography in IoT.- Resilient functions.- Modeling a General Cryptographic Algorithm.- Latin Squares and Cryptography.- Perfectly-Secure Encryption Modeled Using Latin Squares.- Conclusion.

Dein Warenkorb




Artikel im Warenkorb




Deine Buchhandlung


Buchhandlung LeseLust
Inh. Gernod Siering

Georgenstraße 2
99817 Eisenach

03691/733822
kontakt@leselust-eisenach.de

Montag-Freitag 9-17 Uhr
Sonnabend 10-14 Uhr



Dein Warenkorb

Artikel im Warenkorb


Deine Buchhandlung
Buchhandlung LeseLust
Inh. Gernod Siering

Georgenstraße 2
99817 Eisenach

03691/733822
kontakt@leselust-eisenach.de

Montag-Freitag 9-17 Uhr
Sonnabend 10-14 Uhr