Advances of DNA Computing in Cryptography


Book Description

This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.




Advances of DNA Computing in Cryptography


Book Description

This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.




Aspects of Molecular Computing


Book Description

Molecular computing is a rapidly growing subarea of natural computing. On the one hand, molecular computing is concerned with the use of bio-molecules for the purpose of actual computations while, on the other hand, it attempts to understand the computational nature of molecular processes going on in living cells. The book presents a unique and authorative state-of-the-art survey on current research in molecular computing: 30 papers by leading researchers in the area are drawn together on the occasion of the 70th birthday of Tom Head, a pioneer in molecular computing. Among the topics addressed are molecular tiling, DNA self-assembly, splicing systems, DNA-based cryptography, DNA word design, gene assembly, and membrane computing.




Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications


Book Description

Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.




Blockchain, Big Data and Machine Learning


Book Description

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.




A Nature-Inspired Approach to Cryptology


Book Description

This book introduces nature-inspired algorithms and their applications to modern cryptography. It helps the readers to get into the field of nature-based approaches to solve complex cryptographic issues. This book provides a comprehensive view of nature-inspired research which could be applied in cryptography to strengthen security. It will also explore the novel research directives such as Clever algorithms and immune-based cyber resilience. New experimented nature-inspired approaches are having enough potential to make a huge impact in the field of cryptanalysis. This book gives a lucid introduction to this exciting new field and will promote further research in this domain. The book discusses the current landscape of cryptography and nature-inspired research and will be helpful to prospective students and professionals to explore further.




Perspective of DNA Computing in Computer Science


Book Description

DNA or Deoxyribonucleic Acid computing is an emerging branch of computing that uses DNA sequence, biochemistry, and hardware for encoding genetic information in computers. Here, information is represented by using the four genetic alphabets or DNA bases, namely A (Adenine), G (Guanine), C (Cytosine), and T (Thymine), instead of the binary representation (1 and 0) used by traditional computers. This is achieved because short DNA molecules of any arbitrary sequence of A, G, C, and T can be synthesized to order. DNA computing is mainly popular for three reasons: (i) speed (ii) minimal storage requirements, and (iii) minimal power requirements. There are many applications of DNA computing in the field of computer science. Nowadays, DNA computing is widely used in cryptography for achieving a strong security technique, so that unauthorized users are unable to retrieve the original data content. In DNA-based encryption, data are encrypted by using DNA bases (A, T, G, and C) instead of 0 and 1. As four DNA bases are used in the encryption process, DNA computing supports more randomness and makes it more complex for attackers or malicious users to hack the data. DNA computing is also used for data storage because a large number of data items can be stored inside the condensed volume. One gram of DNA holds approx DNA bases or approx 700 TB. However, it takes approx 233 hard disks to store the same data on 3 TB hard disks, and the weight of all these hard disks can be approx 151 kilos. In a cloud environment, the Data Owner (DO) stores their confidential encrypted data outside of their own domain, which attracts many attackers and hackers. DNA computing can be one of the best solutions to protect the data of a cloud server. Here, the DO can use DNA bases to encrypt the data by generating a long DNA sequence. Another application of DNA computing is in Wireless Sensor Network (WSN). Many researchers are trying to improve the security of WSN by using DNA computing. Here, DNA cryptography is used along with Secure Socket Layer (SSL) that supports a secure medium to exchange information. However, recent research shows some limitations of DNA computing. One of the critical issues is that DNA cryptography does not have a strong mathematical background like other cryptographic systems. This edited book is being planned to bring forth all the information of DNA computing. Along with the research gaps in the currently available books/literature, this edited book presents many applications of DNA computing in the fields of computer science. Moreover, research challenges and future work directions in DNA computing are also provided in this edited book. - This edited book gives an overall detail of DNA computing and the fundamentals of cryptography - Many applications of DNA computing in computer science fields, such as cryptography, cloud computing, big data storage, Wireless Sensor Network (WSN) security, and many more, are presented in different chapters of this edited book - Research challenges along with many future work directions in DNA computing are presented in this edited book







Recent Advances in Applied Science and Engineering


Book Description

"Recent Advances in Applied Science and Engineering" represents a thorough and state-of-the-art exploration of the most recent developments across various disciplines within the fields of applied science and engineering. Each chapter provides in-depth analyses of emerging technologies, methodologies, and discoveries, emphasizing the practical applications of these advancements to address real-world challenges. Furthermore, the book not only showcases recent achievements but also engages in discussions about potential future directions and challenges in applied science and engineering. This forward-looking approach offers readers a roadmap for upcoming research areas and opportunities for innovation. Serving as an indispensable resource, this book provides a comprehensive overview of the latest developments in these rapidly evolving fields. Whether a researcher or student, readers will find this book to be a valuable reference for staying informed about the most recent advancements shaping the future of applied science and engineering.




Handbook of Research on Recent Developments in Intelligent Communication Application


Book Description

The communication field is evolving rapidly in order to keep up with society’s demands. As such, it becomes imperative to research and report recent advancements in computational intelligence as it applies to communication networks. The Handbook of Research on Recent Developments in Intelligent Communication Application is a pivotal reference source for the latest developments on emerging data communication applications. Featuring extensive coverage across a range of relevant perspectives and topics, such as satellite communication, cognitive radio networks, and wireless sensor networks, this book is ideally designed for engineers, professionals, practitioners, upper-level students, and academics seeking current information on emerging communication networking trends.