Efficient And Provably Secure Schemes For Vehicular Ad Hoc Networks


Efficient And Provably Secure Schemes For Vehicular Ad Hoc Networks
DOWNLOAD

Download Efficient And Provably Secure Schemes For Vehicular Ad Hoc Networks PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Efficient And Provably Secure Schemes For Vehicular Ad Hoc Networks book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages. If the content not found or just blank you must refresh this page





Efficient And Provably Secure Schemes For Vehicular Ad Hoc Networks


Efficient And Provably Secure Schemes For Vehicular Ad Hoc Networks
DOWNLOAD

Author : Ikram Ali
language : en
Publisher: Springer Nature
Release Date : 2022-01-11

Efficient And Provably Secure Schemes For Vehicular Ad Hoc Networks written by Ikram Ali and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2022-01-11 with Technology & Engineering categories.


This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.



Provable Security


Provable Security
DOWNLOAD

Author : Ron Steinfeld
language : en
Publisher: Springer Nature
Release Date : 2019-09-26

Provable Security written by Ron Steinfeld and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2019-09-26 with Computers categories.


This book constitutes the refereed proceedings of the 13th International Conference on Provable Security, ProvSec 2019, held in Cairns, QLD, Australia, in October 2019. The 18 full and 6 short papers presented were carefully reviewed and selected from 51 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives, including a special theme on “Practical Security.”



Vehicular Ad Hoc Network Security And Privacy


Vehicular Ad Hoc Network Security And Privacy
DOWNLOAD

Author : Xiaodong Lin
language : en
Publisher: John Wiley & Sons
Release Date : 2015-06-02

Vehicular Ad Hoc Network Security And Privacy written by Xiaodong Lin and has been published by John Wiley & Sons this book supported file pdf, txt, epub, kindle and other format this book has been release on 2015-06-02 with Computers categories.


This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique Richly illustrated with detailed designs and results for all approaches used Introduces standardization and industry activities, and government regulation in secure vehicular networking



2023 4th International Conference On E Commerce And Internet Technology Ecit 2023


2023 4th International Conference On E Commerce And Internet Technology Ecit 2023
DOWNLOAD

Author : Vilas Gaikar
language : en
Publisher: Springer Nature
Release Date : 2023-07-24

2023 4th International Conference On E Commerce And Internet Technology Ecit 2023 written by Vilas Gaikar and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2023-07-24 with Computers categories.


This is an open access book. E-commerce is a commercial activity centered on commodity exchange by means of information network technology. In the open network environment of the Internet, based on the client/server application method, buyers and sellers carry out various commercial activities online, realizing online shopping for consumers, online transactions between merchants and online electronic payment, as well as various business activities, trading activities, financial activities and related comprehensive service activities of a new business operation mode. It is the electronicization, networking and informatization of all aspects of traditional business activities. Internet technology is the prerequisite for e-commerce to be realized. The development and popularization of Internet technology has also played a positive role in promoting the development of e-commerce. Internet technology is a double-edged sword, with advantages and disadvantages, since it can promote the development of e-commerce, it may also affect its normal construction, such as the existence of theft of information, tampering with information, counterfeiting, malicious damage and other security risks, but also through the firewall technology, data encryption technology, authentication technology, digital signature technology and other technologies to regulate the transaction process. Therefore, the influence of the two is mutual, and only through continuous friction can we continuously promote the development of both sides in a benign direction. ECIT 2023 provides a platform in order to Create a forum for sharing, research and exchange at the international level, so that participants can be informed of the latest research directions, results and contents of applied Internet technologies on e-commerce, thus stimulating them to generate new research ideas. Promote the development of e-commerce by studying its problems. To open up new perspectives, broaden horizons and examine the issues under discussion by the participants. Each accepted article requires at least one author to attend the meeting and present it.



Efficient Anonymous Authentication And Key Management Techniques For Vehicular Ad Hoc Networks


Efficient Anonymous Authentication And Key Management Techniques For Vehicular Ad Hoc Networks
DOWNLOAD

Author : Azees Maria
language : en
Publisher: Anchor Academic Publishing
Release Date : 2017-11-01

Efficient Anonymous Authentication And Key Management Techniques For Vehicular Ad Hoc Networks written by Azees Maria and has been published by Anchor Academic Publishing this book supported file pdf, txt, epub, kindle and other format this book has been release on 2017-11-01 with Computers categories.


The Vehicular ad-hoc network (VANET) is an important communication paradigm in modern-day transport systems for exchanging live messages regarding traffic congestion, weather conditions, road conditions, and targeted location-based advertisements to improve the driving comfort. In such environments, authentication and privacy are two important challenges that need to be addressed. There are many existing works to provide authentication and privacy in VANETs. However, most of the existing authentication schemes are suffering from high computational cost during authentication and high communication cost during secure key distribution to a group of vehicles. Moreover, in many existing schemes, there is no conditional tracking mechanism available to revoke the misbehaving vehicles from the VANET system. In order to overcome these issues, four new approaches have been developed in this research work: Firstly, a dual authentication scheme is developed to provide a high level of security on the vehicle side to effectively prevent the unauthorized vehicles entering into the VANET. Moreover, a dual group key management scheme is developed to efficiently distribute a group key to a group of users and to update such group keys during the users’ join and leave operations. Secondly, in order to preserve the privacy of vehicle users, a computationally efficient privacy preserving anonymous authentication scheme (CPAV) is developed to anonymously authenticate the vehicle users based on the use of anonymous certificates and signatures. Moreover, a conditional tracking mechanism is introduced to trace the real identity of vehicles and revoke them from VANET in the case of dispute. Thirdly, an efficient anonymous authentication scheme to preserve the privacy of RSUs is proposed in this research work: Each authenticated vehicle is required to authenticate the RSUs in an anonymous manner before communicating with it because each RSU provides the location based safety information (LBSI) to all authenticated vehicles when they are entering its region. By doing this, each RSU provides the knowledge to vehicle users about the obstacles within its coverage area. Finally, a computationally efficient group key distribution (CEKD) scheme for secure group communication is proposed in this research work based on bilinear pairing.



Advances In Smart Vehicular Technology Transportation Communication And Applications


Advances In Smart Vehicular Technology Transportation Communication And Applications
DOWNLOAD

Author : Shaoquan Ni
language : en
Publisher: Springer Nature
Release Date : 2023-05-14

Advances In Smart Vehicular Technology Transportation Communication And Applications written by Shaoquan Ni and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2023-05-14 with Technology & Engineering categories.


This book includes selected papers from the fifth International Conference on Smart Vehicular Technology, Transportation, Communication and Applications (VTCA 2022), held in online mode during December 24–26, 2022. The book includes research works from engineers, researchers, and practitioners interested in the advances and applications in the field of vehicle technology and communication. The book covers four tracks, namely (1) vehicular networking security, (2) vehicular electronics, (3) intelligent transportation systems and applications, and (4) smart vehicular communication networks and telematics.



Optimization Techniques For Decision Making And Information Security


Optimization Techniques For Decision Making And Information Security
DOWNLOAD

Author : Vinod Kumar
language : en
Publisher: Bentham Science Publishers
Release Date : 2024-05-22

Optimization Techniques For Decision Making And Information Security written by Vinod Kumar and has been published by Bentham Science Publishers this book supported file pdf, txt, epub, kindle and other format this book has been release on 2024-05-22 with Computers categories.


Optimization Techniques for Decision-making and Information Security is a scholarly compilation that has been edited by experts with specialized knowledge in the fields of decision theory and cybersecurity. Through the synthesis of an extensive array of information, this edited volume presents novel methodologies and approaches that forge a link between the critical domain of information security and the realm of decision-making processes. The publication commences with a fundamental investigation that establishes the theoretical foundations of information security-relevant decision-making models. The subsequent chapters present comprehensive evaluations of real-world applications, showcasing an assortment of optimization techniques. The book offers a wide range of perspectives on the practical implementation of data analysis in various domains, including but not limited to power generation and optimization, solid transportation problems, soft computing techniques, wireless sensor networks, parametric set-valued optimization problems, data aggregation optimization techniques, fuzzy linear programming problems, and nonlinear chaotic systems. The anthology concludes with a comprehensive summary of the most noteworthy observations and ramifications extracted from the projects of all contributors. Key features - Presents a wide variety of sophisticated optimization methodologies - Explores the intricate intersection of decision theory and the safeguarding of confidential information. - Emphasizes effectiveness in improving decision-making processes designed to strengthen information security measures. - Showcases practical examples in different industrial domains through case studies and real-world problems. - Provides guidance and contemplations on strengthening information security environments. - Includes scientific references for advanced reading This book serves as an essential reference for policymakers, researchers, and professionals who are learning about or working in information security roles.



Artificial Intelligence And Security


Artificial Intelligence And Security
DOWNLOAD

Author : Xingming Sun
language : en
Publisher: Springer
Release Date : 2019-07-18

Artificial Intelligence And Security written by Xingming Sun and has been published by Springer this book supported file pdf, txt, epub, kindle and other format this book has been release on 2019-07-18 with Computers categories.


The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.



Network And System Security


Network And System Security
DOWNLOAD

Author : Joseph K. Liu
language : en
Publisher: Springer Nature
Release Date : 2019-12-10

Network And System Security written by Joseph K. Liu and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2019-12-10 with Computers categories.


This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.



Advances In Electrical And Computer Technologies


Advances In Electrical And Computer Technologies
DOWNLOAD

Author : Thangaprakash Sengodan
language : en
Publisher: Springer Nature
Release Date : 2021-02-26

Advances In Electrical And Computer Technologies written by Thangaprakash Sengodan and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2021-02-26 with Technology & Engineering categories.


This book comprises select proceedings of the International Conference on Advances in Electrical and Computer Technologies 2020 (ICAECT 2020). The papers presented in this book are peer-reviewed and cover latest research in electrical, electronics, communication and computer engineering. Topics covered include smart grids, soft computing techniques in power systems, smart energy management systems, power electronics, feedback control systems, biomedical engineering, geo informative systems, grid computing, data mining, image and signal processing, video processing, computer vision, pattern recognition, cloud computing, pervasive computing, intelligent systems, artificial intelligence, neural network and fuzzy logic, broad band communication, mobile and optical communication, network security, VLSI, embedded systems, optical networks and wireless communication. The volume can be useful for students and researchers working in the different overlapping areas of electrical, electronics and communication engineering.