Reprint

Cryptography and Information Security

Edited by
June 2024
248 pages
  • ISBN978-3-7258-0897-7 (Hardback)
  • ISBN978-3-7258-0898-4 (PDF)

This is a Reprint of the Special Issue Cryptography and Information Security that was published in

Biology & Life Sciences
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Physical Sciences
Summary

This Special Issue on cryptography and information security presents a diverse range of contributions, offering valuable insights into various facets of the field. The topics covered include surveying physical unclonable functions for authentication, communication protocols, challenges, and applications of Internet of Things security. Additionally, this issue discusses the development of a symmetric encryption solution derived from a binary-tree-fed mixed-network protocol, a novel deduplication method for cloud preservation with real-time ownership organization and optimization, and a low-intervention security model aimed at alleviating enterprise burdens through API utilization. Other contributions explore architectures designed to prevent low-rate denial-of-service attacks within drone environments, propose IoT-enabled lightweight authentication frameworks, and investigate the effects of long-range dependence on temporal resolution recovery in HEVC compressed-content environments. Furthermore, this issue introduces a novel framework utilizing API-based obfuscation techniques and discusses the secure application of medical IoT systems, lightweight cipher mechanisms for electronic commerce transactions, and a systematic review of information security in chatbots. Together, these contributions offer valuable insights into cryptography and information security, spanning from encryption solutions to IoT-enabled authentication architectures and beyond.

Format
  • Hardback
License and Copyright
© 2024 by the authors; CC BY-NC-ND license
Keywords
n/a; chatbot; information security; systematic literature review (SLR); ChatGPT; security; AES; CRT; data encryption; e-commerce security; electronic trade protection; ElGamal; information hiding; Scyther; MIoT; software-defined MIoT; security; signature; authentication; multicast; online English education; API address space obscurity; API call obfuscation; anti-reverse analysis; hash function generators; video; high frame rate (HFR); temporal resolution recovery; change detection; constant rate factor; multifractals; authenticated encryption; FPGA; hardware footprint; hardware security; LED block cipher; lightweight cryptography; logic resources; low power; PHOTON hash function; drones security; DoS attack; Software-Defined Networking; LiSEA; business security; architecture; API; access control; deduplication; cloud storage; data sharing; message-locked encryption; dynamic ownership update; mixnets; symmetric encryption; anonymous channel; e-voting; hardware; communication protocol; IoT; network security; machine learning; PUF; authentication mechanisms; n/a

Related Books

April 2022

Cryptography and Its Applications in Information Security

Computer Science & Mathematics
...
October 2022

Advances in Information Security and Privacy

Computer Science & Mathematics
August 2024

Advances in Cybersecurity: Challenges and Solutions

Computer Science & Mathematics