Anuj Kumar Singh - Böcker
Visar alla böcker från författaren Anuj Kumar Singh. Handla med fri frakt och snabb leverans.
8 produkter
8 produkter
1 952 kr
Skickas inom 10-15 vardagar
This new book discusses the concepts while also highlighting the challenges in thefield of quantum cryptography and also covering cryptographic techniques and cybersecurity techniques, in a single volume.It comprehensively covers important topics in the field of quantum cryptographywith applications, including quantum key distribution, position-based quantumcryptography, quantum teleportation, quantum e-commerce, quantum cloning, cybersecurity techniques’ architectures and design, cyber security techniques management,software-defined networks, and cyber security techniques for 5G communication.The text also discusses the security of practical quantum key distribution systems,applications and algorithms developed for quantum cryptography, as well as cybersecurity through quantum computing and quantum cryptography.The text will be beneficial for graduate students, academic researchers, andprofessionals working in the fields of electrical engineering, electronics andcommunications engineering, computer science, and information technology.
708 kr
Skickas inom 10-15 vardagar
This new book discusses the concepts while also highlighting the challenges in thefield of quantum cryptography and also covering cryptographic techniques and cybersecurity techniques, in a single volume.It comprehensively covers important topics in the field of quantum cryptographywith applications, including quantum key distribution, position-based quantumcryptography, quantum teleportation, quantum e-commerce, quantum cloning, cybersecurity techniques’ architectures and design, cyber security techniques management,software-defined networks, and cyber security techniques for 5G communication.The text also discusses the security of practical quantum key distribution systems,applications and algorithms developed for quantum cryptography, as well as cybersecurity through quantum computing and quantum cryptography.The text will be beneficial for graduate students, academic researchers, andprofessionals working in the fields of electrical engineering, electronics andcommunications engineering, computer science, and information technology.
1 883 kr
Skickas inom 10-15 vardagar
This book explores opportunities and challenges in the field of Internet of Everything (IoE) security and privacy under the umbrella of distributed ledger technologies and blockchain technology including distributed consensus mechanisms, crypto-sensors, encryption algorithms, and fault tolerance mechanisms for devices and systems. It focusses on the applicability of blockchain technology, including architectures and platforms for blockchain and IoE, authentication and encryption algorithms for IoE, malicious transactions detection, blockchain for forensics, and so forth. Outlines the major benefits as well as challenges associated with integration of blockchain with IoE; Describes detailed framework to provide security in IoE using blockchain technology; Reviews various issues while using distributed ledger technologies for IoE; Provides comprehensive coverage of blockchain for IoE in securing information including encryption schemes, authentication, security issues, and challenges;Includes case studies in realistic situations like healthcare informatics, smart industry, and smart transportation. This book is aimed at researchers and graduate students in computing, cryptography, IoT, computer engineering, and networks.
750 kr
Skickas inom 10-15 vardagar
This book explores opportunities and challenges in the field of Internet of Everything (IoE) security and privacy under the umbrella of distributed ledger technologies and blockchain technology including distributed consensus mechanisms, crypto-sensors, encryption algorithms, and fault tolerance mechanisms for devices and systems. It focusses on the applicability of blockchain technology, including architectures and platforms for blockchain and IoE, authentication and encryption algorithms for IoE, malicious transactions detection, blockchain for forensics, and so forth. Outlines the major benefits as well as challenges associated with integration of blockchain with IoE; Describes detailed framework to provide security in IoE using blockchain technology; Reviews various issues while using distributed ledger technologies for IoE; Provides comprehensive coverage of blockchain for IoE in securing information including encryption schemes, authentication, security issues, and challenges;Includes case studies in realistic situations like healthcare informatics, smart industry, and smart transportation. This book is aimed at researchers and graduate students in computing, cryptography, IoT, computer engineering, and networks.
1 761 kr
Skickas inom 10-15 vardagar
Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could unlock the door for cybercriminals to penetrate hospital networks. This book covers the fundamental concepts of security and privacy in WBANs including security requirements, issues, and challenges.Security, Privacy, and Trust in WBANs and E-Healthcare highlights the taxonomy of threats and attacks in WBANs and Internet of Medical Things (IoMT) and presents all technical aspects related to the security and privacy of WBANs. In addition to outlining viable solutions that take into account constrained resources at WBAN end-devices, hybrid network architecture, application characteristics, and communication protocols, the book covers the core concepts of WBAN security, privacy, and trust. It describes both theoretical and practical aspects for those working in security in the WBAN and IoMT, emphasizing the most significant potential WBAN security issues and challenges. The book also covers intrusion detection and security risk assessments in WBANs as well as lightweight security solutions for WBANs, blockchain-based solutions for WBANs, and authentication and access control in WBANs through various applications and case studies.This book is highly relevant to the graduate/postgraduate students, academicians, security system designers, security analysts, computer scientists, engineers, researchers, digital forensic experts, and other personnel working in information security, IoMT, and WBAN.
2 390 kr
Skickas inom 10-15 vardagar
This book presents explainability in edge AI, an amalgamation of edge computing and AI. First, this book explains the fundamental concepts of explainable artificial intelligence (XAI), then it describes the concept of explainable edge AI, and finally, it elaborates on the technicalities of explainability in edge AI.
2 390 kr
Skickas inom 10-15 vardagar
This book presents explainability in edge AI, an amalgamation of edge computing and AI. First, this book explains the fundamental concepts of explainable artificial intelligence (XAI), then it describes the concept of explainable edge AI, and finally, it elaborates on the technicalities of explainability in edge AI.
1 535 kr
Skickas inom 10-15 vardagar
This book explores Internet of Medical Things (IoMT) security and privacy in electronic healthcare, addressing vulnerabilities in medical devices that expose patient data to cyber-attacks. It covers IoMT security challenges, potential attacks, and solutions considering resource constraints, network architecture, and communication protocols.IoMT is revolutionizing the medical sector by providing personalized and targeted treatments and by facilitating seamless communication of medical data. IoMT devices are more trustworthy in monitoring and tracking due to higher accuracy levels, which also minimize human errors and inaccurate reporting. While the merits of IoMT devices are clear, they also pose severe privacy and security risks. Medical systems acquire, process, and perform decision-making based on this sensitive health information. Cyber attackers who exploit the flaws and weaknesses in these IoMT devices might well be able to penetrate the hospital network and gain unauthorized access to private patient data. Attacks on these IoMT devices also have the potential to endanger the patients' lives and cause serious physical harm.In addition to outlining viable solutions that take into account constrained resources at IoMT end-devices, hybrid network architecture, application characteristics, and communication protocols, the book covers the core concepts of IoMT security and privacy. It describes both theoretical and practical aspects for those working in security in the IoMT, emphasizing the most significant potential IoT security issues and challenges.