Proceedings of International Conference on Network Security and Blockchain Technology
ICNSBT 2021
Herausgegeben:Giri, Debasis; Mandal, Jyotsna Kumar; Sakurai, Kouichi; De, Debashis
Proceedings of International Conference on Network Security and Blockchain Technology
ICNSBT 2021
Herausgegeben:Giri, Debasis; Mandal, Jyotsna Kumar; Sakurai, Kouichi; De, Debashis
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India-Kolkata Chapter, India, during December 2-4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.
Andere Kunden interessierten sich auch für
- Proceedings of International Conference on Network Security and Blockchain Technology168,99 €
- Cryptology and Network Security with Machine Learning161,99 €
- Abid YahyaSteganography Techniques for Digital Images74,99 €
- Abid YahyaSteganography Techniques for Digital Images88,99 €
- Cryptology and Network Security with Machine Learning170,99 €
- Cyber Security and Digital Forensics147,99 €
- Cryptology and Network Security with Machine Learning161,99 €
-
-
-
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India-Kolkata Chapter, India, during December 2-4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.
Produktdetails
- Produktdetails
- Lecture Notes in Networks and Systems 481
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-19-3181-9
- 1st ed. 2022
- Seitenzahl: 420
- Erscheinungstermin: 15. Juni 2022
- Englisch
- Abmessung: 235mm x 155mm x 23mm
- Gewicht: 633g
- ISBN-13: 9789811931819
- ISBN-10: 981193181X
- Artikelnr.: 63985714
- Lecture Notes in Networks and Systems 481
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-19-3181-9
- 1st ed. 2022
- Seitenzahl: 420
- Erscheinungstermin: 15. Juni 2022
- Englisch
- Abmessung: 235mm x 155mm x 23mm
- Gewicht: 633g
- ISBN-13: 9789811931819
- ISBN-10: 981193181X
- Artikelnr.: 63985714
Dr. Debasis Giri is currently working as Associate Professor in the Department of Information Technology, Maulana Abul Kalam Azad University of Technology (Formerly known as West Bengal University of Technology), West Bengal, India. Prior to this, he also held academic positions as Professor in the Department of Computer Science and Engineering and Dean in the School of Electronics, Computer Science and Informatics, Haldia Institute of Technology, Haldia, India. He did his masters (M.Tech and M.Sc.) both from IIT Kharagpur, India, and also completed his Ph.D. from IIT Kharagpur, India. He is tenth all India rank holder in Graduate Aptitude Test in Engineering in 1999. He has published more than 80 papers in international journal/ conference. His current research interests include cryptography, information security, E-commerce security, and design & analysis of algorithms. He is Editorial Board Member and Reviewer of many International Journals. He is also Program Committee Member of International Conferences. He is Life Member of Cryptology Research Society of India, Computer Society of India, the International Society for Analysis, its Applications and Computation (ISAAC), and IEEE Member. Jyotsna Kumar Mandal, M. Tech. in Computer Science from University of Calcutta in 1987, awarded Ph. D. (Engineering) in Computer Science and Engineering by Jadavpur University in 2000,is working as Professor of Computer Science & Engineering, former Dean, Faculty of Engineering, Technology & Management, KU for two consecutive terms during 2008-2012, Director, IQAC, Kalyani University, and Chairman, CIRM, and Placement Cell. Jyotsna Kumar Mandal served as Professor Computer Applications, KGEC, as Associate Professor Computer Science, Assistant Professor Computer Science North Bengal University for fifteen years, as Lecturer at NERIST, Itanagar for one year. Jyotsna Kumar Mandal has 34 years of teaching and research experience in coding theory, data and network security and authentication; remote sensing & GIS-based applications, data compression, error correction, visual cryptography, and steganography and has been awarded 26 Ph. D. degrees, one submitted, and 8 are pursuing. Jyotsna Kumar Mandal supervised 03 M.Phil., more than 80 M.Tech., and more than 150 M.C.A Dissertations. Jyotsna Kumar Mandal is Guest Editor of MST Journal (SCI indexed) of Springer, published more than 450 research articles out of which 190 articles in international journals, published 15 books from LAP Germany, IGI Global, Springer, etc., organized more than 50 International Conferences and Corresponding Editors of edited volumes and conference publications of Springer, IEEE, and Elsevier, etc., and edited more than 50 volumes as Volume Editor. Jyotsna Kumar Mandal received "Siksha Ratna" Award from Higher Education, Government of West Bengal, India, in the year 2018for outstanding teaching activities; Vidyasagar Award from International Society for Science Technology and management in the fifth International Conference on Computing, Communication and Sensor Network; Chapter Patron Award, CSI Kolkata Chapter, on 2014; "Bharat Jyoti Award" for meritorious services, outstanding performances, and remarkable role in the field of Computer Science & Engineering on 29 August 2012 from International Friendship Society (IIFS), New Delhi; and A. M. Bose Memorial Silver Medal and Kali Prasanna Dasgupta Memorial Silver Medal from Jadavpur University. Kouichi Sakurai received the B.S. degree in mathematics from the Faculty of Science, Kyushu University, in 1986. He received the M.S. degree in applied science in 1988, and the Doctorate in engineering in 1993 from the Faculty of Engineering, Kyushu University. He was engaged in research and development on cryptography at the Computer and Information Systems Laboratory at Mitsubishi Electric Corporation from 1988 to 1994. From 1994, he worked for the Dept. of Computer Science of Kyushu University in the capacity of Associate Professor and became Full Professor there in 2002. Now he is also working also with Adaptive Communications Research Laboratories and Advanced Telecommunications Research Institute International (ATR) as Visiting Researcher with information security. Professor Sakurai has published more than 400 academic papers around cryptography and information security. Prof. Debashis De earned his M.Tech. from the University of Calcutta in 2002 and his Ph.D. (Engineering) from Jadavpur University in 2005. He is Professor and Director in the Department of Computer Science and Engineering of the West Bengal University of Technology, West Bengal, India, and Adjunct Research Fellow at the University of Western Australia, Australia. He is Senior Member of the IEEE, Life Member of CSI, andMember of the International Union of Radio science. He worked as R&D Engineer for Telektronics and Programmer at Cognizant Technology Solutions. He was awarded the prestigious Boyscast Fellowship by the Department of Science and Technology, Government of India, to work at the Herriot-Watt University, Scotland, UK. He received the Endeavour Fellowship Award during 2008-2009 by DEST Australia to work at the University of Western Australia. He received the Young Scientist Award both in 2005 at New Delhi and in 2011 at Istanbul, Turkey, from the International Union of Radio Science, Head Quarter, Belgium. His research interests include mobile cloud computing and green mobile networks. He has published in more than 250 peer-reviewed international journals in IEEE, IET, Elsevier, Springer, World Scientific, Wiley, IETE, Taylor Francis and ASP, 100 International conference papers, six researches monographs in Springer, CRC, NOVA, andten text books published by Pearson education. He is Associate Editor of journal IEEE ACCESS and Editor Hybrid computational intelligence, Journal Array, Elsevier.
Cyber-Defense Mechanism Considering Incomplete Information Using POMDP.- Monitoring, Recognition and Attendance Automation in Online Class: Combination of Image Processing, Cryptography in IoT Security.- Cyber Threat Phylogeny Assessment and vulnerabilities representation at thermal power station.- A novel data encryption technique based on DNA sequence.- Continuous Behavioral Authentication System for IoT Enabled Applications.- A secure 'e-Tendering' application based on secret image sharing.- Video based Graphical password authentication system.- Designing Robust Blind Color Image Watermarking-Based Authentication Scheme for Copyright Protection.- LSB Steganography using Three level Arnold Scrambling and Pseudo-Random Generator.- Part I: Network, Network Security and their Applications.- Performance Analysis of Retrial Queueing System in Wireless Local Area Network.- IBDNA -An Improved BDNA Algorithm Incorporating Huffman Coding Technique.- Obfuscation Techniques for a Secure Endorsement System in Hyperledger Fabric.- Mobile Operating System (Android) Vulnerability Analysis using Machine Learning.- Survey of Predictive Autoscaling and Security of Cloud Resources using Artificial Neural Networks.- Systematic literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkwe.- A Survey on Interoperability Issues at the SaaS Level Influencing the Adoption of Cloud Computing Technology.- Human Recognition based Decision Virtualization for Effecting Safety-as-a-Service using IoT Enabled Automated UV-C Sanitization System.- Part II: Blockchain Technology and its Applications.- Security Optimization of Resource-Constrained Internet of Healthcare Things (IoHT) Devices Using Asymmetric Cryptography for Blockchain Network.- Preserving Privacy using Blockchain Technology in Autonomous Vehicles.- Security Protocols for Blockchain Based Access Control in VANETS.- LIVECHAIN: Lightweight Blockchain for IOT Devices and it's Security.- Secure and scalable Attribute Based Access Control scheme for healthcare data on Blockchain platform.- Adaptive Neuro Fuzzy Inference System for Monitoring Activities in Electric Vehicles through a Hybrid Approach and Blockchain Technology.- Application of BLOCKCHAIN in Agriculture: An Instance of Secure Financial Service in Farming.- Adaptive Electronic Health Records Management And Secure Distribution Using Blockchain.- Non-Content Message Masking Model for Healthcare Data in Edge-IoT Ecosystem using Blockchain.- Voting based Consensus protocol for blockchain to maintain COVID patient records in Consortium Networks.- Blockchain Adaptation in Healthcare: SWOT Analysis.- Blockchain-IoT based Blood Supply Chain Management System.- Blockchain based COVID-19 Detection Framework Using Federated Deep Learning.- Systematic Review of Attribute-Based Access Control for a Smart City using Blockchain.- A methodical study on Blockchain technology.
Cyber-Defense Mechanism Considering Incomplete Information Using POMDP.- Monitoring, Recognition and Attendance Automation in Online Class: Combination of Image Processing, Cryptography in IoT Security.- Cyber Threat Phylogeny Assessment and vulnerabilities representation at thermal power station.- A novel data encryption technique based on DNA sequence.- Continuous Behavioral Authentication System for IoT Enabled Applications.- A secure 'e-Tendering' application based on secret image sharing.- Video based Graphical password authentication system.- Designing Robust Blind Color Image Watermarking-Based Authentication Scheme for Copyright Protection.- LSB Steganography using Three level Arnold Scrambling and Pseudo-Random Generator.- Part I: Network, Network Security and their Applications.- Performance Analysis of Retrial Queueing System in Wireless Local Area Network.- IBDNA –An Improved BDNA Algorithm Incorporating Huffman Coding Technique.- Obfuscation Techniques for a Secure Endorsement System in Hyperledger Fabric.- Mobile Operating System (Android) Vulnerability Analysis using Machine Learning.- Survey of Predictive Autoscaling and Security of Cloud Resources using Artificial Neural Networks.- Systematic literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkwe.- A Survey on Interoperability Issues at the SaaS Level Influencing the Adoption of Cloud Computing Technology.- Human Recognition based Decision Virtualization for Effecting Safety-as-a-Service using IoT Enabled Automated UV-C Sanitization System.- Part II: Blockchain Technology and its Applications.- Security Optimization of Resource-Constrained Internet of Healthcare Things (IoHT) Devices Using Asymmetric Cryptography for Blockchain Network.- Preserving Privacy using Blockchain Technology in Autonomous Vehicles.- Security Protocols for Blockchain Based Access Control in VANETS.- LIVECHAIN: Lightweight Blockchain for IOT Devices and it's Security.- Secure and scalable Attribute Based Access Control scheme for healthcare data on Blockchain platform.- Adaptive Neuro Fuzzy Inference System for Monitoring Activities in Electric Vehicles through a Hybrid Approach and Blockchain Technology.- Application of BLOCKCHAIN in Agriculture: An Instance of Secure Financial Service in Farming.- Adaptive Electronic Health Records Management And Secure Distribution Using Blockchain.- Non-Content Message Masking Model for Healthcare Data in Edge-IoT Ecosystem using Blockchain.- Voting based Consensus protocol for blockchain to maintain COVID patient records in Consortium Networks.- Blockchain Adaptation in Healthcare: SWOT Analysis.- Blockchain-IoT based Blood Supply Chain Management System.- Blockchain based COVID-19 Detection Framework Using Federated Deep Learning.- Systematic Review of Attribute-Based Access Control for a Smart City using Blockchain.- A methodical study on Blockchain technology.
Cyber-Defense Mechanism Considering Incomplete Information Using POMDP.- Monitoring, Recognition and Attendance Automation in Online Class: Combination of Image Processing, Cryptography in IoT Security.- Cyber Threat Phylogeny Assessment and vulnerabilities representation at thermal power station.- A novel data encryption technique based on DNA sequence.- Continuous Behavioral Authentication System for IoT Enabled Applications.- A secure 'e-Tendering' application based on secret image sharing.- Video based Graphical password authentication system.- Designing Robust Blind Color Image Watermarking-Based Authentication Scheme for Copyright Protection.- LSB Steganography using Three level Arnold Scrambling and Pseudo-Random Generator.- Part I: Network, Network Security and their Applications.- Performance Analysis of Retrial Queueing System in Wireless Local Area Network.- IBDNA -An Improved BDNA Algorithm Incorporating Huffman Coding Technique.- Obfuscation Techniques for a Secure Endorsement System in Hyperledger Fabric.- Mobile Operating System (Android) Vulnerability Analysis using Machine Learning.- Survey of Predictive Autoscaling and Security of Cloud Resources using Artificial Neural Networks.- Systematic literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkwe.- A Survey on Interoperability Issues at the SaaS Level Influencing the Adoption of Cloud Computing Technology.- Human Recognition based Decision Virtualization for Effecting Safety-as-a-Service using IoT Enabled Automated UV-C Sanitization System.- Part II: Blockchain Technology and its Applications.- Security Optimization of Resource-Constrained Internet of Healthcare Things (IoHT) Devices Using Asymmetric Cryptography for Blockchain Network.- Preserving Privacy using Blockchain Technology in Autonomous Vehicles.- Security Protocols for Blockchain Based Access Control in VANETS.- LIVECHAIN: Lightweight Blockchain for IOT Devices and it's Security.- Secure and scalable Attribute Based Access Control scheme for healthcare data on Blockchain platform.- Adaptive Neuro Fuzzy Inference System for Monitoring Activities in Electric Vehicles through a Hybrid Approach and Blockchain Technology.- Application of BLOCKCHAIN in Agriculture: An Instance of Secure Financial Service in Farming.- Adaptive Electronic Health Records Management And Secure Distribution Using Blockchain.- Non-Content Message Masking Model for Healthcare Data in Edge-IoT Ecosystem using Blockchain.- Voting based Consensus protocol for blockchain to maintain COVID patient records in Consortium Networks.- Blockchain Adaptation in Healthcare: SWOT Analysis.- Blockchain-IoT based Blood Supply Chain Management System.- Blockchain based COVID-19 Detection Framework Using Federated Deep Learning.- Systematic Review of Attribute-Based Access Control for a Smart City using Blockchain.- A methodical study on Blockchain technology.
Cyber-Defense Mechanism Considering Incomplete Information Using POMDP.- Monitoring, Recognition and Attendance Automation in Online Class: Combination of Image Processing, Cryptography in IoT Security.- Cyber Threat Phylogeny Assessment and vulnerabilities representation at thermal power station.- A novel data encryption technique based on DNA sequence.- Continuous Behavioral Authentication System for IoT Enabled Applications.- A secure 'e-Tendering' application based on secret image sharing.- Video based Graphical password authentication system.- Designing Robust Blind Color Image Watermarking-Based Authentication Scheme for Copyright Protection.- LSB Steganography using Three level Arnold Scrambling and Pseudo-Random Generator.- Part I: Network, Network Security and their Applications.- Performance Analysis of Retrial Queueing System in Wireless Local Area Network.- IBDNA –An Improved BDNA Algorithm Incorporating Huffman Coding Technique.- Obfuscation Techniques for a Secure Endorsement System in Hyperledger Fabric.- Mobile Operating System (Android) Vulnerability Analysis using Machine Learning.- Survey of Predictive Autoscaling and Security of Cloud Resources using Artificial Neural Networks.- Systematic literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkwe.- A Survey on Interoperability Issues at the SaaS Level Influencing the Adoption of Cloud Computing Technology.- Human Recognition based Decision Virtualization for Effecting Safety-as-a-Service using IoT Enabled Automated UV-C Sanitization System.- Part II: Blockchain Technology and its Applications.- Security Optimization of Resource-Constrained Internet of Healthcare Things (IoHT) Devices Using Asymmetric Cryptography for Blockchain Network.- Preserving Privacy using Blockchain Technology in Autonomous Vehicles.- Security Protocols for Blockchain Based Access Control in VANETS.- LIVECHAIN: Lightweight Blockchain for IOT Devices and it's Security.- Secure and scalable Attribute Based Access Control scheme for healthcare data on Blockchain platform.- Adaptive Neuro Fuzzy Inference System for Monitoring Activities in Electric Vehicles through a Hybrid Approach and Blockchain Technology.- Application of BLOCKCHAIN in Agriculture: An Instance of Secure Financial Service in Farming.- Adaptive Electronic Health Records Management And Secure Distribution Using Blockchain.- Non-Content Message Masking Model for Healthcare Data in Edge-IoT Ecosystem using Blockchain.- Voting based Consensus protocol for blockchain to maintain COVID patient records in Consortium Networks.- Blockchain Adaptation in Healthcare: SWOT Analysis.- Blockchain-IoT based Blood Supply Chain Management System.- Blockchain based COVID-19 Detection Framework Using Federated Deep Learning.- Systematic Review of Attribute-Based Access Control for a Smart City using Blockchain.- A methodical study on Blockchain technology.