97,95 €
97,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
49 °P sammeln
97,95 €
97,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
49 °P sammeln
Als Download kaufen
97,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
49 °P sammeln
Jetzt verschenken
97,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
49 °P sammeln
  • Format: PDF

This book is a timely document of state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this topic has recently received attention from governments, industries and academic communities due to the COVID-19 pandemic. This book provides a link between new proposals related to contact tracing applications and a contextual literature review primarily from the cryptologic viewpoint. As these applications are related to security and privacy of individuals, analyzing them from cryptologic viewpoint is of utmost importance. Therefore,…mehr

Produktbeschreibung
This book is a timely document of state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this topic has recently received attention from governments, industries and academic communities due to the COVID-19 pandemic. This book provides a link between new proposals related to contact tracing applications and a contextual literature review primarily from the cryptologic viewpoint. As these applications are related to security and privacy of individuals, analyzing them from cryptologic viewpoint is of utmost importance. Therefore, present developments from cryptologic aspects of most proposals around the world, including Singapore, Europe, USA, Australia and India, have been discussed. Providing an in-depth study on the design rationale of each protocol, this book is of value to researchers, students and professionals alike.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
PRANAB CHAKRABORTY is Senior Manager at the Learning and Development team of Wipro Limited, Bengaluru, India. He earned his graduate degree in computer science from the Indian Statistical Institute, Kolkata, India, and undergraduate degree in electronics and telecommunications engineering from Jadavpur University, Kolkata, India. He has implemented various network protocol stacks including TCP/IP and played different organizational roles including that of a technical architect and technical delivery manager apart from his current involvement in the behavioral and leadership development field. He has a special interest in the research areas of cryptology.

SUBHAMOY MAITRA is Senior Professor at the Applied Statistics Unit of the Indian Statistical Institute, Kolkata, India. He earned his Ph.D. and graduate degree in computer science from the Indian Statistical Institute, Kolkata, India, and undergraduate degree in electronics and telecommunications engineering from Jadavpur University, Kolkata, India. Post working in the domain of hardware and software engineering for a few years, Prof. Maitra joined the Indian Statistical Institute, Kolkata, as a faculty in 1997. Having around 6000 citations to his name, Prof. Maitra has authored several books and around 200 research papers in the area of cryptology and quantum information.

MRIDUL NANDI is Professor at the Applied Statistics Unit of the Indian Statistical Institute, Kolkata, India. Earlier, he worked for the National Institute of Standards and Technology (NIST), USA, as one of the technical members in the selection process of the SHA3 hash function. His research areas focus on different aspects of cryptography, including hash functions, MAC, authenticated encryption, identity (or attribute) based encryption, IoT, hardware implementation and lightweight cryptography. He is the co-designer of COLM (authenticated encryption), selected as a winner in the security category of CAESAR portfolio. Algorithms of his designed 10 lightweight ciphers were selected for the second round of NIST lightweight standard process. He actively publishes papers in top tier conferences like Eurocrypt, Crypto, Asiacrypt, FSE and renowned journals.

SUPRITA TALNIKAR is Senior Research Fellow at the Applied Statistics Unit of the Indian Statistical Institute, Kolkata, India. She is pursuing her Ph.D. in Computer Science, under the supervision of Prof. Mridul Nandi. She completed her M.Sc. in Mathematics from Visvesvaraya National Institute of Technology, Nagpur, India, with a gold medal, and her B.Sc. in Physics, Computer Science and Mathematics from Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur, India. Her research focuses on various areas of cryptography, with particular interest in provable security and cryptanalysis in symmetric key cryptography.