This book introduces nature-inspired algorithms and their applications to modern cryptography. It helps the readers to get into the field of nature-based approaches to solve complex cryptographic issues. This book provides a comprehensive view of nature-inspired research which could be applied in cryptography to strengthen security. It will also explore the novel research directives such as Clever algorithms and immune-based cyber resilience. New experimented nature-inspired approaches are having enough potential to make a huge impact in the field of cryptanalysis. This book gives a lucid…mehr
This book introduces nature-inspired algorithms and their applications to modern cryptography. It helps the readers to get into the field of nature-based approaches to solve complex cryptographic issues. This book provides a comprehensive view of nature-inspired research which could be applied in cryptography to strengthen security. It will also explore the novel research directives such as Clever algorithms and immune-based cyber resilience. New experimented nature-inspired approaches are having enough potential to make a huge impact in the field of cryptanalysis. This book gives a lucid introduction to this exciting new field and will promote further research in this domain. The book discusses the current landscape of cryptography and nature-inspired research and will be helpful to prospective students and professionals to explore further.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Shishir Kumar Shandilya is Professor of Computer Science and Engineering and is the Deputy Director of SECURE, the Center of Excellence in Cybersecurity at VIT Bhopal University. He is a Visiting Professor at Liverpool Hope University in the United Kingdom, a Cambridge University-certified professional teacher and trainer, a TEDx speaker, an ACM Distinguished Speaker, and a senior member of IEEE. Shishir is a NASSCOM-certified master trainer for security analysts in SOC (SSC/Q0909: NVEQF Level 7) and has received the IDA Teaching Excellence Award for distinctive use of technology in teaching by the Indian Didactics Association, Bangalore (2016), and the Young Scientist Award for two consecutive years, 2005 and 2006, by the Indian Science Congress and MP Council of Science and Technology. Springer, IGI-USA, River Denmark, and Prentice Hall of India have all published ten of his books. He has international and national patents and copyrights granted for adaptive cyber defence methods. Agni Datta is a computer science major at VIT Bhopal University in India with a minor in cybersecurity. He is a student member of ACM and SIAM. He was the co-founder as well as the first president of the SIAM student chapter at VIT Bhopal University. Furthermore, he is also a doctorate aspirant with preferences in cryptography, algorithmic number theory, and vulnerability evaluations of compilers and algorithms. His research concentrates on significant mathematical and theoretical problems such as fully homomorphic encryption, lattice-based cryptography, privacy-preserving algorithms, and social networking security. Early in his practice, he became interested in computational complexity and computability theory. Along with these interests, he also adores photography, old literature, classical music, and recreational athletics. Atulya K. Nagar holds the foundation chair as a Professor of Mathematical Sciences and is the Pro-Vice-Chancellor for research at Liverpool Hope University, United Kingdom. He has been the dean of the Faculty of Science and head of the School of Mathematics, Computer Science, and Engineering, which he established at the university. He was awarded a prestigious Commonwealth Fellowship in 1996 to pursue his doctorate (DPhil) in applied nonlinear mathematics at the University of York (UK). Furthermore, he holds a B.Sc. (Hons), an M.Sc. (Mathematics), and an MPhil (with distinction) in mathematical physics from the MDS University of Ajmer, India. Prior to joining Liverpool Hope, he was with the Department of Mathematical Sciences and later with the Department of Systems Engineering at Brunel University, London. He is an internationally respected scholar working at the cutting edge of theoretical computer science, applied mathematical analysis, and systems engineering, with research expertise spanning both applied mathematics and computational methods for nonlinear, complex, and intractable problems arising in science, engineering, and industry. He has edited volumes on intelligent systems and applied mathematics. Furthermore, he is the editor-in-chief of the International Journal of Artificial Intelligence and Soft Computing (IJAISC) and serves on the editorial boards of several prestigious journals. Likewise, he is well-published, with over 450 publications in prestigious publishing outlets. Prof. Nagar sits on several strategic UK-wide research bodies, including the JISC Research Strategy Group, and he is a fellow of the Institute of Mathematics and its Applications (FIMA) and a fellow of the Higher Education Academy (FHEA).
Inhaltsangabe
Introduction to Nature Inspired Algorithms. Cryptography Background and Primitives. Genetic Cryptography. Neural Cryptography. DNA based Cryptography. Optimization of Cryptosystems using Nature Inspired Algorithms. Bio inspired Lightweight Approaches to Cryptography. Chaos Cryptography.
Introduction to Nature Inspired Algorithms.- Cryptography Background and Primitives.- Genetic Cryptography.- Neural Cryptography.- DNA based Cryptography.- Optimization of Cryptosystems using Nature Inspired Algorithms.- Bio-inspired Lightweight Approaches to Cryptography.- Chaos Cryptography.
Introduction to Nature Inspired Algorithms. Cryptography Background and Primitives. Genetic Cryptography. Neural Cryptography. DNA based Cryptography. Optimization of Cryptosystems using Nature Inspired Algorithms. Bio inspired Lightweight Approaches to Cryptography. Chaos Cryptography.
Introduction to Nature Inspired Algorithms.- Cryptography Background and Primitives.- Genetic Cryptography.- Neural Cryptography.- DNA based Cryptography.- Optimization of Cryptosystems using Nature Inspired Algorithms.- Bio-inspired Lightweight Approaches to Cryptography.- Chaos Cryptography.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826