Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks


Book Description

This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.




Provable Security


Book Description

This book constitutes the refereed proceedings of the 13th International Conference on Provable Security, ProvSec 2019, held in Cairns, QLD, Australia, in October 2019. The 18 full and 6 short papers presented were carefully reviewed and selected from 51 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives, including a special theme on “Practical Security.”




2023 4th International Conference on E-Commerce and Internet Technology (ECIT 2023)


Book Description

This is an open access book. E-commerce is a commercial activity centered on commodity exchange by means of information network technology. In the open network environment of the Internet, based on the client/server application method, buyers and sellers carry out various commercial activities online, realizing online shopping for consumers, online transactions between merchants and online electronic payment, as well as various business activities, trading activities, financial activities and related comprehensive service activities of a new business operation mode. It is the electronicization, networking and informatization of all aspects of traditional business activities. Internet technology is the prerequisite for e-commerce to be realized. The development and popularization of Internet technology has also played a positive role in promoting the development of e-commerce. Internet technology is a double-edged sword, with advantages and disadvantages, since it can promote the development of e-commerce, it may also affect its normal construction, such as the existence of theft of information, tampering with information, counterfeiting, malicious damage and other security risks, but also through the firewall technology, data encryption technology, authentication technology, digital signature technology and other technologies to regulate the transaction process. Therefore, the influence of the two is mutual, and only through continuous friction can we continuously promote the development of both sides in a benign direction. ECIT 2023 provides a platform in order to Create a forum for sharing, research and exchange at the international level, so that participants can be informed of the latest research directions, results and contents of applied Internet technologies on e-commerce, thus stimulating them to generate new research ideas. Promote the development of e-commerce by studying its problems. To open up new perspectives, broaden horizons and examine the issues under discussion by the participants. Each accepted article requires at least one author to attend the meeting and present it.




Advances in Smart Vehicular Technology, Transportation, Communication and Applications


Book Description

This book includes selected papers from the fifth International Conference on Smart Vehicular Technology, Transportation, Communication and Applications (VTCA 2022), held in online mode during December 24–26, 2022. The book includes research works from engineers, researchers, and practitioners interested in the advances and applications in the field of vehicle technology and communication. The book covers four tracks, namely (1) vehicular networking security, (2) vehicular electronics, (3) intelligent transportation systems and applications, and (4) smart vehicular communication networks and telematics.




Healthcare Analytics and Advanced Computational Intelligence


Book Description

This book aims to apply state-of-the-art advanced computational intelligence frameworks in healthcare. It presents recent and real-life applications of computationally intelligent healthcare. It also discusses problems and solutions to remote healthcare and emergency healthcare services. Healthcare Analytics and Advanced Computational Intelligence highlights modern ambient intelligence-enabled healthcare models along with advanced topics like quantum computing in healthcare and cryptomedical systems. Healthcare Analytics and Advanced Computational Intelligence examines designing the latest medical systems and models that will allow the societal acceptance of ambiance computing in healthcare, medical imaging, health analytics, machine intelligence, sensory computing, medical data analytics, disease detection, telemedicine, and their applications. It includes diverse case studies dealing with various clinical-based applications. These intelligent models are primarily structured to deal with complex real-world issues in clinical data analytics, by means of state-of-the-art techniques with general implementation, domain-specific solutions, or hybrid methods which integrate computational intelligence with conventional statistical methods. The book is written for researchers and academicians in diverse areas. Engineers from technical disciplines such as computer engineering are likely to purchase the book. Various sub-streams such as machine learning, big data analytics, healthcare analytics, and computational intelligence will find the book significant for their curriculum.







Optimization Techniques for Decision-making and Information Security


Book Description

Optimization Techniques for Decision-making and Information Security is a scholarly compilation that has been edited by experts with specialized knowledge in the fields of decision theory and cybersecurity. Through the synthesis of an extensive array of information, this edited volume presents novel methodologies and approaches that forge a link between the critical domain of information security and the realm of decision-making processes. The publication commences with a fundamental investigation that establishes the theoretical foundations of information security-relevant decision-making models. The subsequent chapters present comprehensive evaluations of real-world applications, showcasing an assortment of optimization techniques. The book offers a wide range of perspectives on the practical implementation of data analysis in various domains, including but not limited to power generation and optimization, solid transportation problems, soft computing techniques, wireless sensor networks, parametric set-valued optimization problems, data aggregation optimization techniques, fuzzy linear programming problems, and nonlinear chaotic systems. The anthology concludes with a comprehensive summary of the most noteworthy observations and ramifications extracted from the projects of all contributors. Key features - Presents a wide variety of sophisticated optimization methodologies - Explores the intricate intersection of decision theory and the safeguarding of confidential information. - Emphasizes effectiveness in improving decision-making processes designed to strengthen information security measures. - Showcases practical examples in different industrial domains through case studies and real-world problems. - Provides guidance and contemplations on strengthening information security environments. - Includes scientific references for advanced reading This book serves as an essential reference for policymakers, researchers, and professionals who are learning about or working in information security roles.




Artificial Intelligence and Security


Book Description

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.




Network and System Security


Book Description

This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.




Advances in Electrical and Computer Technologies


Book Description

This book comprises select proceedings of the International Conference on Advances in Electrical and Computer Technologies 2020 (ICAECT 2020). The papers presented in this book are peer-reviewed and cover latest research in electrical, electronics, communication and computer engineering. Topics covered include smart grids, soft computing techniques in power systems, smart energy management systems, power electronics, feedback control systems, biomedical engineering, geo informative systems, grid computing, data mining, image and signal processing, video processing, computer vision, pattern recognition, cloud computing, pervasive computing, intelligent systems, artificial intelligence, neural network and fuzzy logic, broad band communication, mobile and optical communication, network security, VLSI, embedded systems, optical networks and wireless communication. The volume can be useful for students and researchers working in the different overlapping areas of electrical, electronics and communication engineering.