Oliynykov / Kuznetsov / Lemeshko | Information Security Technologies in the Decentralized Distributed Networks | E-Book | sack.de
E-Book

E-Book, Englisch, Band 115, 305 Seiten, eBook

Reihe: Lecture Notes on Data Engineering and Communications Technologies

Oliynykov / Kuznetsov / Lemeshko Information Security Technologies in the Decentralized Distributed Networks

E-Book, Englisch, Band 115, 305 Seiten, eBook

Reihe: Lecture Notes on Data Engineering and Communications Technologies

ISBN: 978-3-030-95161-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.
Oliynykov / Kuznetsov / Lemeshko Information Security Technologies in the Decentralized Distributed Networks jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Methods for Privacy Support in the Decentralized Environment.- Application of Bluetooth, Wi-Fi and Gps Technologies in the means of Contact Tracking.- Analysis and Research of Threat, Attacker and Security Models of Data Depersonalization in Decentralized Networks.- Cryptographic Transformations in a Decentralized Blockchain Environment.- Statistical and Signature Analysis Methods of Intrusion Detection.- Criteria and Indicators of Efficiency of Cryptographic Protection Mechanisms.- Methods of Evaluation and Comparative Research of Cryptographic Conversions.- Cryptographic Mechanisms that Ensure the Efficiency of SNARK-Systems.- Comparative Analysis of Consensus Algorithms that use a Directed Acyclic Graph Instead of a Blockchain, and Construction of Estimates of the SPECTRE Protocol Security to the Double Spend Attack.- Models and Methods of Secure Routing and Load Balancing in Infocommunication Networks.- The Methods of Data Comparison in Residue Numeral System.- Data Control in theSystem of Residual Classes.- Traffic Monitoring and Abnormality Detection Methods for Decentralized Distributed Networks.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.