Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2022

The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 – 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Net...

Full description

Bibliographic Details
Other Authors: Roy, Bimal Kumar (Editor), Chaturvedi, Atul (Editor), Tsaban, Boaz (Editor), Hasan, Sartaj Ul (Editor)
Format: eBook
Published: Singapore Springer Nature Singapore 2024, 2024
Edition:1st ed. 2024
Series:Algorithms for Intelligent Systems
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Role and Applications of Emerging Technologies in Smart City Architecture
  • A Review on Blockchain based Electronic Health Record (EHR) system for Secure Data Storage
  • SVM-RF: A hybrid machine learning model for detection of malicious network traffic and files
  • Key-insulated Aggregate Proxy Signature
  • On Comprehensive Study of Cryptocurrency Trend Analysis Based on a Novel Machine Learning Technique
  • Flaws of a password-based three-party authenticated key agreement protocol in post-quantum environment Multivariate Aggregate and Multi Signature Scheme
  • Optical Network Modeling and Performance using Random Graph Theory
  • A Survey on Recent Progress in Blockchain Technology
  • Cryptanalysis of lattice based threshold changeable multi-secret sharing scheme
  • Amazon Web Service IOT And Authentication of Edge Devices
  • On Picture Fuzzy Information Based Hybrid Cryptographic TOPSIS Approach for Best Suitable Cloud Storage & Security Level
  • Network Layer Performance of Hybrid Buffer Based Optical Router
  • Efficient and secure data aggregation for UAV-to-Ground Station Communication in Smart City Environment
  • BBIWMS: A Secure Blockchain Based Framework for Integrated Water Management System for Smart City
  • An Intelligent Network Intrusion Detection Framework for Reliable UAV-based Communication