Security
19 items found
- Sort by: Newest titles first
- Title A - Z
-
Age Factors in Biometric Processing
- Editor: Michael Fairhurst
- Publication Year: 2013
- + Show details - Hide details
-
p.
(1)
As biometrics-based identification and identity authentication become increasingly widespread in their deployment, it becomes correspondingly important to consider more carefully issues relating to reliability, usability and inclusion. One factor which is particularly important in this context is that of the relationship between the nature of the measurements extracted from a particular biometric modality and the age of the sample donor, and the effect which age has on physiological and behavioural characteristics invoked in a biometric transaction. In Age Factors in Biometric Processing an international panel of experts explore the implications of ageing on biometric technologies, and how such factors can be managed in practical situations. Topics include understanding the impact of ageing on biometric measurements; age factors as barriersopportunities in relation to performance; modality-related approaches to management of age factors; implications for practical application; and future trends and research challenges. Age Factors in Biometric Processing provides an outstanding overview of this topic for the rapidly expanding community of stakeholders in biometricsbased identification solutions in academia, industry and government.
-
Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications
- Editors: Ahmed A. Abd El-Latif; Mohammed Adel Hammad; Yassine Maleh; Brij B. Gupta; Wojciech Mazurczyk
- Publication Year: 2023
- + Show details - Hide details
-
p.
(1)
The integration of new technologies is resulting in an increased demand for security and authentication in all types of data communications. Cybersecurity is the protection of networks and systems from theft. Biometric technologies use unique traits of particular parts of the body such facial recognition, iris, fingerprints and voice to identify individuals' physical and behavioural characteristics. Although there are many challenges associated with extracting, storing and processing such data, biometric and cybersecurity technologies along with artificial intelligence (AI) are offering new approaches to verification procedures and mitigating security risks.
This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including machine and deep learning architectures, emerging applications and ethical and legal concerns. Topics include federated learning for enhanced cybersecurity; artificial intelligence-based biometric authentication using ECG signal; deep learning for email phishing detection methods; biometrics for secured IoT systems; intelligent authentication using graphical one-time-passwords; and AI in social cybersecurity.
Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications is aimed at artificial intelligence, biometrics and cybersecurity experts, industry and academic researchers, network security engineers, cybersecurity professionals, and advanced students and newcomers to the field interested in the newest advancements in artificial intelligence for cybersecurity and biometrics.
-
Authentication Technologies for Cloud Computing, IoT and Big Data
- Editors: Yasser M. Alginahi; Muhammad Nomani Kabir
- Publication Year: 2019
- + Show details - Hide details
-
p.
(1)
Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.
-
Blockchain Technology for Secure Social Media Computing
- Editors: Robin Singh Bhadoria; Neetetsh Saxena; Bharti Nagpal
- Publication Year: 2023
- + Show details - Hide details
-
p.
(1)
Blockchain is a digital ledger of transactions duplicated and distributed across an entire network of computer systems on the blockchain which makes it more difficult to hack or tamper with. The popularity of blockchain has been increasing with the growth of social media and the internet of things (IoT). Social media are interactive digitally mediated technologies that facilitate the creation or sharing and exchange of information, ideas, opinions and interests via virtual communities and social network platforms. However, unmonitored social accounts can be the target of hackers who post fraudulent messages or virus-infected links that spread to contacts and followers, and "employee weakness" is responsible for 20% of cyberattacks in companies. So, it has become essential to secure both personal and professional social media networks, accounts and data.
Blockchain Technology for Secure Social Media Computing covers recent advances, trends and future opportunities in the security framework of social media-computing. The contributors focus on how to protect social media platforms, and present methods for making social media computing more reliable and effective to achieve trusted IoT-based social computing with blockchain technology.
The book is aimed at an advanced research audience in industry and academia focused on blockchain technology and social media computing working in cybersecurity, security data analytics, computer science, distributed computing, networking, internet of things and related fields of applications. It will be also of interest to application and software developers and project managers using blockchain technology and multiple encryptions.
-
Data Security in Cloud Computing
- Editors: Vimal Kumar; Sivadon Chaisiri; Ryan Ko
- Publication Year: 2017
- + Show details - Hide details
-
p.
(1)
Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management. Data Security in Cloud Computing covers major aspects of securing data in Cloud Computing. Topics covered include NOMAD: a framework for ensuring data confidentiality in mission-critical cloud based applications; 3DCrypt: privacy-preserving pre-classification volume ray-casting of 3D images in the cloud; multiprocessor system-on-chip for processing data in Cloud Computing; distributing encoded data for private processing in the cloud; data protection and mobility management for cloud; understanding software defined perimeter; security, trust and privacy for Coud Computing in transportation cyber-physical systems; review of data leakage attack techniques in cloud systems; Cloud Computing and personal data processing: sorting out legal requirements; the Waikato data privacy matrix; provenance reconstruction in clouds; and security visualization for Cloud Computing.
-
Engineering Secure Internet of Things Systems
- Editors: Benjamin Aziz; Alvaro Arenas; Bruno Crispo
- Publication Year: 2016
- + Show details - Hide details
-
p.
(1)
The Internet of Things (IoT) - the emerging global interconnection of billions of 'smart' devices - will be collecting increasing amounts of private and sensitive data about our lives, and will require increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability. This book examines these important security considerations for the IoT Topics covered include a security survey of middleware for the IoT; privacy in the IoT; privacy and consumer IoT - a sensemaking perspective; a secure platform for smart cities and IoT; model-based security engineering for the IoT; federated identity and access management in IoT systems; the security of the MQTT protocol; securing communications among severely constrained, wireless embedded devices; lightweight cryptographic identity solutions for the IoT; and a reputation model for the IoT.
-
Hand-Based Biometrics: Methods and Technology
- Editor: Martin Drahanský
- Publication Year: 2018
- + Show details - Hide details
-
p.
(1)
Hand-based biometrics identifies users by unique features in their hands, such as fingerprints, palmprints, hand geometry, and finger and palm vein patterns. This book explores the range of technologies and methods under development and in use for handbased biometrics, with evaluations of the advantages and performance of each. The inclusion of significant material on the relevant aspects of the physiology of the hand is a particularly useful and innovative feature. Topics covered in this book include inner and outer hand physiology and diseases; nail structure and common disorders; fingerprint recognition; synthetic fingerprints; finger vein recognition; palm vein biometrics; hand shape recognition and palm print recognition; 3D hand shape recognition; and spoofing and anti-spoofing methods. With contributions from an international panel of experts in this field, Hand-Based Biometrics is essential reading for researchers, students and engineers working in biometrics and security.
-
Information Security: Foundations, Technologies and Applications
- Editors: Ali Ismail Awad; Michael Fairhurst
- Publication Year: 2018
- + Show details - Hide details
-
p.
(1)
The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.
-
Iris and Periocular Biometric Recognition
- Editors: Christian Rathgeb; Christoph Busch
- Publication Year: 2017
- + Show details - Hide details
-
p.
(1)
Iris recognition technologies for identity management are already deployed globally in several large-scale nationwide biometric projects and are currently entering the mobile market. More recently, periocular recognition has been employed to augment the biometric performance of the iris in unconstrained environments where only the ocular region is present in the image. Iris and Periocular Biometric Recognition provides an overview of scientific fundamentals and principles of iris and periocular biometric recognition over six broad areas: an introduction to iris and periocular recognition; a selective overview of issues and challenges; soft biometric classification; security aspects; privacy protection and forensics; and future trends. With contributions from experts in industry and academia, this book is essential reading for researchers, graduate students and practitioners in biometrics and related fields.
-
Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs: Methods, technologies and applications
- Editors: Amit Kumar Tyagi; Ajith Abraham; Farookh Khadeer Hussain; Arturas Kaklauskas; R. Jagadeesh Kannan
- Publication Year: 2022
- + Show details - Hide details
-
p.
(1)
Internet of Things (IoTs) are now being integrated at a large scale in fast-developing applications such as healthcare, transportation, education, finance, insurance and retail. The next generation of automated applications will command machines to do tasks better and more efficiently. Both industry and academic researchers are looking at transforming applications using machine learning and deep learning to build better models and by taking advantage of the decentralized nature of Blockchain. But the advent of these new technologies also brings very high expectations to industries, organisations and users. The decrease of computing costs, the improvement of data integrity in Blockchain, and the verification of transactions using Machine Learning are becoming essential goals.
This edited book covers the challenges, opportunities, innovations, new concepts and emerging trends related to the use of machine learning, Blockchain and Big Data analytics for IoTs. The book is aimed at a broad audience of ICTs, data science, machine learning and cybersecurity researchers interested in the integration of these disruptive technologies and their applications for IoTs.
-
Mobile Biometrics
- Editors: Guodong Guo; Harry Wechsler
- Publication Year: 2017
- + Show details - Hide details
-
p.
(1)
Mobile biometrics - the use of physical and/or behavioral characteristics of humans to allow their recognition by mobile/smart phones - aims to achieve conventional functionality and robustness while also supporting portability and mobility, bringing greater convenience and opportunity for its deployment in a wide range of operational environments from consumer applications to law enforcement. But achieving these aims brings new challenges such as issues with power consumption, algorithm complexity, device memory limitations, frequent changes in operational environment, security, durability, reliability, and connectivity. Mobile Biometrics provides a timely survey of the state of the art research and developments in this rapidly growing area. Topics covered in Mobile Biometrics include mobile biometric sensor design, deep neural network for mobile person recognition with audio-visual signals, active authentication using facial attributes, fusion of shape and texture features for lip biometry in mobile devices, mobile device usage data as behavioral biometrics, continuous mobile authentication using user phone interaction, smartwatch-based gait biometrics, mobile four-fingers biometrics system, palm print recognition on mobile devices, periocular region for smartphone biometrics, and face anti-spoofing on mobile devices.
-
Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications
- Editors: El-Sayed M. El-Alfy; Mohamed Eltoweissy; Errin W. Fulp; Wojciech Mazurczyk
- Publication Year: 2019
- + Show details - Hide details
-
p.
(1)
With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality environments. Maintaining their security, trustworthiness and resilience to cyber-attacks has become crucial which requires innovative and creative cyber security and resiliency solutions. Computing algorithms have been developed to mimic the operation of natural processes, phenomena and organisms such as artificial neural networks, swarm intelligence, deep learning systems, biomimicry, and more. The amazing characteristics of these systems offer a plethora of novel methodologies and opportunities to cope with emerging cyber challenges. This edited book presents a timely review of the fundamentals, latest developments and diverse applications of nature-inspired algorithms in cyber security and resiliency. Topics include bio-inspired collaboration and cyber security; immune-based defense and resiliency; bio-inspired security and resiliency of network traffic; nature inspired machine learning approach for cyber security; nature-inspired algorithms in A.I. for malicious activity detection; DNA-inspired characterization and detection of novel social Twitter spambots; nature-inspired approaches for social network security; bio-inspired cyber-security for smart grid; natureinspired cryptography and cryptanalysis, and more.
-
Physical Layer Security for Wireless Sensing and Communication
- Editors: Hüseyin Arslan; Haji M. Furqan
- Publication Year: 2022
- + Show details - Hide details
-
p.
(1)
Wireless physical layer (PHY) security has attracted much attention due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping, jamming, and interference.
Physical Layer Security for Wireless Sensing and Communication covers both communication and sensing security from a broad perspective. The main emphasis is on PHY security, although other security measures are covered for the sake of completeness and as a step towards cross-layer security and cognitive security vision. After discussing the features of wireless channels from both the communication and sensing perspectives, the book details their exploitation for secure transmission utilizing various approaches. Wireless sensing and radio environment concepts are also addressed, along with the related security implications in terms of eavesdropping, disruption, manipulation, and, in general, the exploitation of wireless sensing by unauthorised users. Several solutions for these threats from the domains of wireless communication, military radars, and machine learning, are discussed.
The book provides valuable information to researchers in academia and industry, as well as engineers, developers, and advanced students in the field of cybersecurity.
-
Privacy by Design for the Internet of Things: Building accountability and security
- Editors: Andrew Crabtree; Hamed Haddadi; Richard Mortier
- Publication Year: 2021
- + Show details - Hide details
-
p.
(1)
Privacy by design is a proactive approach that promotes privacy and data protection compliance throughout project lifecycles when storing or accessing personal data. Privacy by design is essential for the Internet of Things (IoT) as privacy concerns and accountability are being raised in an increasingly connected world. What becomes of data generated, collected or processed by the IoT is clearly an important question for all involved in the development, manufacturing, applications and use of related technologies. But this IoT concept does not work well with the 'big data' trend of aggregating pools of data for new applications. Developers need to address privacy and security issues and legislative requirements at the design stage, and not as an afterthought. In this edited book, the authors draw on a wealth of interdisciplinary research to delineate the challenges of building accountability into the Internet of Things and solutions for delivering on this critical societal challenge. This advanced book brings together legal-tech scholars, computer scientists, human computer interaction researchers and designers, and social scientists to address these challenges and elaborate solutions. It articulates the accountability principle in law and how it impacts IoT development, presents empirical studies of accountability in action and its implications for IoT development, brings technological responses to the requirements of GDPR and ways of building accountability into the IoT, and covers compliant IoT application development, privacy-preserving data analytics, human-centred IoT security, human-data interaction, and the methodological challenge of understanding and responding to the adoption of future technologies in everyday life.
-
Proof-of-Stake for Blockchain Networks: Fundamentals, challenges and approaches
- Editors: Cong T. Nguyen; Dinh Thai Hoang; Diep N. Nguyen; Eryk Dutkiewicz; Loi Luu; Robert Joyce
- Publication Year: 2024
- + Show details - Hide details
-
p.
(1)
A consensus mechanism is the core component of a blockchain network, which ensures that every participant agrees on the state of the network in trustless environments. Until now, current blockchain networks have been using the proof-of-work (PoW) consensus mechanism, which has serious limitations such as huge energy consumption, low transaction processing capabilities, and centralization and scalability issues. To overcome these problems, a new consensus mechanism entitled proof-of-stake (PoS) has been developed. PoS has many advantages, including negligible energy consumption and very low consensus delay. Ethereum (the largest decentralized global software platform to create secured digital technology powered by blockchain technology and the blockchain of choice globally for all developers and enterprises) has just switched from PoW to PoS. As a result, this mechanism is expected to become a cutting-edge technology for future blockchain networks.
This book provides a comprehensive discussion of the PoS consensus mechanism for blockchain networks. Starting with an overview of blockchain technology and consensus mechanisms, including basic concepts and network architecture, the book provides a review of the PoS consensus mechanism, including PoS consensus security and PoS performance and scalability issues.
Proof-of-Stake for Blockchain Networks: Fundamentals, challenges and approaches is a valuable resource for researchers, engineers, and postgraduate students who are interested in advanced PoS consensus mechanisms, as well as developers and entrepreneurs who are interested in developing applications using the PoS consensus mechanism.
-
Security and Privacy Schemes for Dense 6G Wireless Communication Networks
- Editors: Agbotiname Lucky Imoize; Chandrashekhar Meshram; Dinh-Thuan Do; Seifedine Kadry; Lakshmanan Muthukaruppan
- Publication Year: 2023
- + Show details - Hide details
-
p.
(1)
Fifth generation (5G) wireless networks are now commercialized, and the research focus has shifted towards sixth generation (6G) wireless systems. The integration of sensor nodes and massive machine type communication (MTC) devices (MDs) in ubiquitous 5G networks has facilitated the design of critical enabling technologies to support billions of data-hungry applications. By leveraging sensor nodes in wireless sensor networks (WSNs), sensitive user information can be harvested and transmitted to receivers via WSN-assisted channels, which are often not well secured. Consequently, sensitive user information can be intercepted and used unlawfully. The security and confidentiality measures used for data transmission over existing 5G WSN-assisted channels are limited. 6G systems are envisaged to face fiercer security challenges. In 6G wireless networks, a new set of sensing and precise localization techniques are predicted. Thus, the need to secure user information against adversarial attacks needs to be implemented at the design stage.
The book proposes viable solutions to revamp traditional security architecture by addressing critical security challenges in commercialized 5G and envisioned 6G wireless communication systems. Expert contributors bring new insights into real-world scenarios for the deployment, applications and management of robust, secure, and efficient security schemes for massive devices in 6G wireless networks. Finally, the book discusses critical security and privacy issues affecting the wireless ecosystem and provides practical AI-based solutions.
Security and Privacy Schemes for Dense 6G Wireless Communication Networks is an essential reference for industry and academic researchers; scientists, engineers, lecturers and advanced students in the fields of cybersecurity wireless communication and networking, network security, computing, data science, AI/ML/DL, and sensing, as well as cybersecurity professionals and 6G standardization experts.
-
Split Federated Learning for Secure IoT Applications: Concepts, frameworks, applications and case studies
- Editors: Gururaj Harinahalli Lokesh; Geetabai S. Hukkeri; N.Z. Jhanjhi; Hong Lin
- Publication Year: 2024
- + Show details - Hide details
-
p.
(1)
New approaches in federated learning and split learning have the potential to significantly improve ubiquitous intelligence in internet of things (IoT) applications. In split federated learning, the machine learning model is divided into smaller network segments, with each segment trained independently on a server using distributed local client data.
The split learning method mitigates two fundamental drawbacks of federated learning: affordability, and privacy and security. When running machine learning computation on devices with limited resources, assigning only a portion of the network to train at the client-side minimizes the processing burden, compared to running a complete network as in federated learning. In addition, neither client nor server has full access to the other, which is more secure.
This book reviews cutting edge technologies and advanced research in split federated learning. Coverage includes approaches to realizing and evaluating the effectiveness and advantages of federated learning and split-fed learning, the role of this technology in advancing and securing IoTs, advanced research on emerging AI models for preserving the privacy of the data owned by the clients, and the analysis and development of AI mechanisms in IoT architectures and applications. The use of split federated learning in natural language processing, recommendation systems, healthcare systems, emotion detection, smart agriculture, smart transportation and smart cities is discussed.
Split Federated Learning for Secure IoT Applications: Concepts, frameworks, applications and case studies offers useful insights to the latest developments in the field for researchers, engineers and scientists in academia and industry, who are working in computing, AI, data science and cybersecurity with a focus on federated learning, machine learning and deep learning.
-
User-Centric Privacy and Security in Biometrics
- Editor: Claus Vielhauer
- Publication Year: 2017
- + Show details - Hide details
-
p.
(1)
The interplay of privacy, security and user-determination is an important consideration in the roll-out of biometric technologies. It brings into play requirements such as privacy of biometric data in systems, communication and databases, soft biometric profiling, biometric recognition of persons across distributed systems and in nomadic scenarios, and the convergence between user convenience, usability and authentication reliability. User-Centric Privacy and Security in Biometrics explores how developments in biometrics will address security and privacy aspects. The book surveys and evaluates how biometric techniques can enhance and increase the reliability of security strategies in a variety of applications. This includes privacy-preserving state-of-the-art works and future directions in the view of biometrics as part of broader security concepts. The fundamental emphasis is on privacy within and for biometrics, particularly for the protection of biometric data, informed consent of data usage, transparency on biometric data, and big data fraud prevention.
-
Voice Biometrics: Technology, trust and security
- Editors: Carmen García-Mateo; Gérard Chollet
- Publication Year: 2021
- + Show details - Hide details
-
p.
(1)
Voice biometrics are being implemented globally in large scale applications such as remote banking, government e-services, transportation and building security access, autonomous vehicles, and healthcare. They have been integrated in numerous apps, often coupled with face biometrics and artificial intelligence methods. Voice biometrics products and solutions must meet three key re-quirements for the success in their deployment: they must be highly trustable regarding privacy protection; easy to use and always be available. This edited book presents the state of the art in voice biometrics research and technologies including implementation and deployment challenges in terms of interoperability, scalability and performance, and security. The team of editors and chapter authors combine a wealth of expertise from academia and the industry. Topics covered include the fundamentals of voice biometrics; design of countermeasures for replay attack; attacker's perspective for voice biometrics; voice biometrics; speaker de-identification; performance evaluation of voice biometrics solutions; standardization of voice biometrics technology; industry perspectives; joining forces of voice and facial biometrics; and future trends and challenges in voice biometrics. Providing comprehensive coverage of the field of voice biometrics, this authoritative volume will be of great interest to researchers, scientists, engineers, practitioners and advanced students involved in the fields of security, biometrics, forensic sciences, human computer interaction, speech processing, acoustics, multimedia, pattern recognition, and privacy-preserving, digital signal processing and speech technologies. It will also be of interest to researchers and professionals working in law and criminology.