Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2022

The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 – 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Net...

Full description

Bibliographic Details
Other Authors: Roy, Bimal Kumar (Editor), Chaturvedi, Atul (Editor), Tsaban, Boaz (Editor), Hasan, Sartaj Ul (Editor)
Format: eBook
Language:English
Published: Singapore Springer Nature Singapore 2024, 2024
Edition:1st ed. 2024
Series:Algorithms for Intelligent Systems
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03776nmm a2200421 u 4500
001 EB002183662
003 EBX01000000000000001321149
005 00000000000000.0
007 cr|||||||||||||||||||||
008 231103 ||| eng
020 |a 9789819922291 
100 1 |a Roy, Bimal Kumar  |e [editor] 
245 0 0 |a Cryptology and Network Security with Machine Learning  |h Elektronische Ressource  |b Proceedings of ICCNSML 2022  |c edited by Bimal Kumar Roy, Atul Chaturvedi, Boaz Tsaban, Sartaj Ul Hasan 
250 |a 1st ed. 2024 
260 |a Singapore  |b Springer Nature Singapore  |c 2024, 2024 
300 |a XII, 470 p. 207 illus., 130 illus. in color  |b online resource 
505 0 |a Role and Applications of Emerging Technologies in Smart City Architecture -- A Review on Blockchain based Electronic Health Record (EHR) system for Secure Data Storage -- SVM-RF: A hybrid machine learning model for detection of malicious network traffic and files -- Key-insulated Aggregate Proxy Signature -- On Comprehensive Study of Cryptocurrency Trend Analysis Based on a Novel Machine Learning Technique -- Flaws of a password-based three-party authenticated key agreement protocol in post-quantum environment Multivariate Aggregate and Multi Signature Scheme -- Optical Network Modeling and Performance using Random Graph Theory -- A Survey on Recent Progress in Blockchain Technology -- Cryptanalysis of lattice based threshold changeable multi-secret sharing scheme -- Amazon Web Service IOT And Authentication of Edge Devices -- On Picture Fuzzy Information Based Hybrid Cryptographic TOPSIS Approach for Best Suitable Cloud Storage & Security Level -- Network Layer Performance of Hybrid Buffer Based Optical Router -- Efficient and secure data aggregation for UAV-to-Ground Station Communication in Smart City Environment -- BBIWMS: A Secure Blockchain Based Framework for Integrated Water Management System for Smart City -- An Intelligent Network Intrusion Detection Framework for Reliable UAV-based Communication 
653 |a Computer networks / Security measures 
653 |a Mobile and Network Security 
653 |a Internet of things 
653 |a Cryptography 
653 |a Blockchains (Databases) 
653 |a Data encryption (Computer science) 
653 |a Internet of Things 
653 |a Telecommunication 
653 |a Communications Engineering, Networks 
653 |a Cryptology 
653 |a Blockchain 
700 1 |a Chaturvedi, Atul  |e [editor] 
700 1 |a Tsaban, Boaz  |e [editor] 
700 1 |a Hasan, Sartaj Ul  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Algorithms for Intelligent Systems 
028 5 0 |a 10.1007/978-981-99-2229-1 
856 4 0 |u https://doi.org/10.1007/978-981-99-2229-1?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 621.382 
520 |a The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 – 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning