Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Editor/Author Gupta, Brij, Agrawal, Dharma P. and Yamaguchi, Shingo
Publication Year: 2016
Publisher: IGI Global

Single-User Purchase Price: $385.00
Unlimited-User Purchase Price: $577.50
ISBN: 978-1-5225-0105-3
Category: Technology & Engineering - Technology
Image Count: 186
Book Status: Available
Table of Contents

The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention.

Share this

Table of Contents

  • Dedication
  • Preface
  • Acknowledgment
  • Chapter 1: Data Security in Wired and Wireless Systems
  • ABSTRACT
  • INTRODUCTION
  • GOALS OF SECURITY
  • DATA ENCRYPTION
  • STREAM CIPHER AND BLOCK CIPHER
  • CONFUSION AND DIFFUSION
  • MALLEABILITY
  • SUBSTITUTION-PERMUTATION NETWORK
  • ENCRYPTION STANDARDS
  • WIRELESS STANDARDS
  • SECURITY ATTACKS
  • SECURITY IN WMAN (802.16)
  • CLOUD SECURITY
  • PRIVACY
  • THOUGHTS ON SECURITY
  • RECENT PROPOSALS
  • SUMMARY
  • REFERENCES
  • APPENDIX: ACRONYMS
  • Chapter 2: A New View of Privacy in Social Networks
  • ABSTRACT
  • INTRODUCTION
  • RELATED WORK
  • PROBLEM MODEL AND FORMULATION
  • KEY OBSERVATIONS
  • SOLUTION DETAILS
  • SECURITY ANALYSIS
  • EVALUATION
  • CONCLUSION
  • REFERENCES
  • Chapter 3: A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer
  • ABSTRACT
  • INTRODUCTION
  • MALWARE
  • BOTNETS
  • BOTNET COMMAND AND CONTROL (C&C) MECHANISM
  • CENTRALISED COMMAND AND CONTROL MECHANISM
  • DECENTRALISED COMMAND AND CONTROL MECHANISM
  • DENIAL OF SERVICE AND DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS
  • UNDERLYING CONCEPT OF FLOODING ATTACKS
  • IMPACT OF DDOS FLOODING ATTACKS AND PAST INCIDENTS
  • CLASSIFICATIONS OF BOTNET-BASED DDOS FLOODING DDOS ATTACKS
  • NETWORK-LEVEL DDOS FLOODING ATTACKS
  • APPLICATION-LEVEL DDOS FLOODING ATTACKS
  • DETECTION TECHNIQUES
  • METHODS IMPLEMENTED TO DEFEND AGAINST BOTNET-BASED DDOS FLOODING ATTACKS
  • METHODS OF DETECTING BOTNET-BASED DDOS ATTACKS
  • METHODS OF MITIGATING BOTNET-BASED DDOS ATTACKS
  • CONCLUSION
  • REFERENCES
  • Chapter 4: Cyber Risk
  • ABSTRACT
  • INTRODUCTION
  • INFORMATION SECURITY: A GROWING CHALLENGE
  • CYBER RISK IN THE SECURITIES MARKETS: A FOCUS ON THE FINANCIAL SYSTEM
  • THE CYBER RISK MANAGEMENT IN DEVELOPED AND EMERGING MARKETS: A SUMMARY
  • CYBER SECURITY AND CYBER INSURANCE
  • CONCLUSION
  • ACKNOWLEDGMENT
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 5: Security in Ad Hoc Network and Computing Paradigms
  • ABSTRACT
  • INTRODUCTION
  • SECURITY ATTACKS: A BACKGROUND
  • SECURITY IN MOBILE AD HOC NETWORKS
  • SECURITY IN VEHICULAR AD HOC NETWORKS
  • SECURITY IN CLOUD COMPUTING
  • SECURITY ANALYSIS TOOLS
  • CHAPTER SUMMARY
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 6: Audio Stego Intrusion Detection System through Hybrid Neural Tree Model
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • AQM STEGANALYSIS: AN OVERVIEW
  • PROPOSED NEURAL TREE MODEL
  • EXPERIMENTAL SETUP
  • RESULTS AND DISCUSSIONS
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 7: Introduction of Petri Nets
  • ABSTRACT
  • INTRODUCTION
  • INTRODUCTION OF PETRI NETS
  • APPLICATION OF PETRI NETS
  • PETRI NETS BASED CHALLENGES TO SECURITY
  • CONCLUSION
  • REFERENCES
  • Chapter 8: Discovering Periodicity in Network Flows for Security Monitoring
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. RELATED WORK
  • 3. PRELIMINARIES
  • 4. CLUSTERING NETWORK FLOWS
  • 5. EXPERIMENTS
  • 6. CONCLUSION
  • ACKNOWLEDGMENT
  • REFERENCES
  • APPENDIX: DATA CLUSTERING
  • Chapter 9: Secure and Privacy Preserving Keyword Search over the Large Scale Cloud Data
  • ABSTRACT
  • INTRODUCTION
  • SEARCHABLE ENCRYPTION
  • RANKED SINGLE KEYWORD SEARCH
  • MULTI-KEYWORD SEARCH
  • FUZZY KEYWORD SEARCH
  • CONJUNCTIVE KEYWORD SEARCH
  • SIMILARITY KEYWORD SEARCH
  • ATTRIBUTE BASED KEYWORD SEARCH
  • CONCLUSION
  • REFERENCES
  • Chapter 10: Auditing Defense against XSS Worms in Online Social Network-Based Web Applications
  • ABSTRACT
  • 1. INTRODUCTION TO ONLINE SOCIAL NETWORK (OSN)
  • BACKGROUND ON XSS WORMS
  • 3. BACKGROUND AND MOTIVATION ON XSS WORMS
  • 4. EXISTING DEFENSIVE SOLUTIONS FOR OSN AGAINST XSS WORMS
  • 5. DISCUSSION AND FUTURE SCOPE
  • 6. CONCLUSION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS:
  • Chapter 11: Digital Image Watermarking
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. NECESSITY OF WATERMARKING
  • 3. CHARACTERISTICS OF DIGITAL WATERMARKS
  • 4. CLASSIFICATIONS OF WATERMARKS
  • 5. SPATIAL DOMAIN TECHNIQUES
  • 6. TRANSFORM DOMAIN TECHNIQUES
  • 7. GENERAL FRAMEWORK FOR WATERMARKING
  • 8. TYPES OF WATERMARKING SYSTEM
  • 9. APPLICATIONS OF DIGITAL WATERMARKS
  • 10. WATERMARKING ATTACKS
  • 11. PERFORMANCE MEASURES
  • 12. WORK BASED ON DISCRETE WAVELET TRANSFORM
  • 13. CONCLUSION
  • REFERENCES
  • Chapter 12: Security Issues and Countermeasures of Online Transaction in E-Commerce
  • ABSTRACT
  • INTRODUCTION TO E-COMMERCE
  • INTRODUCTION TO ONLINE TRANSACTION IN E-COMMERCE CYCLE
  • RELATED WORK
  • SECURITY IN ONLINE TRANSACTION
  • SECURITY REQUIREMENT
  • SECURITY ISSUES IN ONLINE TRANSACTION
  • COUNTER MEASURES AND SOME SOLUTIONS AGAINST THE ATTACK OVER E-COMMERCE WHILE DOING TRANSACTIONS
  • STEPS OF DOING SECURE TRANSACTION OF DOING PAYMENT BETWEEN CUSTOMER, MERCHANT, AND BANK
  • CONCLUSION
  • REFRENCES
  • ADDITIONAL READING
  • APPENDIX
  • Chapter 13: Securing the Human Cloud
  • ABSTRACT
  • INTRODUCTION
  • SECURITY AND PRIVACY ISSUES
  • SECURITY AND PRIVACY REQUIREMENTS IN WEARABLE DEVICES
  • CLASSIFICATION OF BIOMETRICS
  • CHECK-LIST FOR COMPARISON
  • BIOMETRIC SCHEMES FOR WEARABLE DEVICES
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 14: Provable Security for Public Key Cryptosystems
  • ABSTRACT
  • INTRODUCTION
  • PUBLIC KEY CRYPTOGRAPHY
  • FORMAL SECURITY MODELS
  • EXAMPLE OF PUBLIC KEY ENCRYPTION SCHEME
  • EXAMPLE OF SIGNATURE SCHEME
  • SECURITY ANALYSIS OF ABOVE SIGNATURE SCHEME
  • EXAMPLE OF EXACT SECURITY OF A CRYPTOSYSTEM
  • SECURITY ANALYSIS OF ABOVE SIGNATURE SCHEME
  • EXAMPLE OF GENERIC GROUP MODEL
  • PROVING THE -SDH ASSUMPTION IN GENERIC GROUP MODEL
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 15: Secure Key Establishment in Wireless Sensor Networks
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • INTRODUCTION TO WIRELESS SENSOR NETWORKS
  • KEY MANAGEMENT
  • KEY MANAGEMENT IN WSN
  • SYMMETRIC KEY MANAGEMENT IN WSN
  • ASYMMETRIC KEY MANAGEMENT IN WSN
  • CONCLUSION
  • REFERENCES
  • Chapter 16: Threats Classification
  • ABSTRACT
  • INTRODUCTION
  • 1. SECURITY THREATS CLASSIFICATION
  • 2. CLASSIFICATION METHODS BASED ON ATTACKS TECHNIQUES
  • 3. CLASSIFICATION METHODS BASED ON THREATS IMPACTS
  • 4. EXISTING THREATS CLASSIFICATION LIMITS
  • CONCLUSION
  • REFERENCES
  • Chapter 17: Analysis of Various Security Issues and Challenges in Cloud Computing Environment
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. PRELIMINARY
  • 3. BARRIERS, SECURITY ISSUES, AND THREATS
  • 4. SECURITY CHALLENGES
  • 5. CURRENT ISSUES AND DISCUSSION
  • 6. CONCLUSION
  • REFERENCES
  • Chapter 18: Review of Link Structure Based Ranking Algorithms and Hanging Pages
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • LINK STRUCTURE BASED RANKING ALGORITHMS
  • HANGING PAGES
  • WEB SPAM
  • WEBSITE OPTIMIZATION
  • MARKOV CHAIN
  • SIMULATION AND EXPERIMENT RESULTS
  • CONCLUSION
  • REFERENCES
  • Chapter 19: Application of Face Recognition Techniques in Video for Biometric Security
  • ABSTRACT
  • INTRODUCTION
  • FACE RECOGNITION SYSTEM
  • FACE DETECTION
  • SOME FACE DETECTION APPROACHES
  • FACE TRACKING
  • FEATURE EXTRACTION
  • FACE RECOGNITION
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 20: Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
  • ABSTRACT
  • 1. INTRODUCTION
  • SECURITY MODELS
  • CONCLUSION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 21: DNA Sequence Based Cryptographic Solution for Secure Image Transmission
  • ABSTRACT
  • INTRODUCTION
  • DNA COMPUTING
  • HYBRID ENCRYPTION SCHEME
  • CONCLUSION
  • REFERENCES
  • Compilation of References
  • About the Contributors