00802nam0-22002891i-450-99000088388040332120151111123000.0000088388FED01000088388(Aleph)000088388FED0100008838820020821d1979----km-y0itay50------baitay-------001yyArchitettura acciaioedifici civiliF. Hart, W. Henn, H. SontagGenovaEd. Italsider1979p.359ill.cm30Costruzioni metallicheHart,Franz<1910-1996>Henn,Walter<1912-2006>Sontag,H.ITUNINARICAUNIMARCBK99000088388040332103 CM.0,1143540IINTCIINTCUNINA03580oam 2200673 450 991016405440332120190911103517.01-5225-3837-21-5225-2297-210.4018/978-1-5225-2296-6(OCoLC)973495644(MiFhGG)GVRL02VF(EXLCZ)99371000000105167920170118h20172017 uy 0engurun|---uuuuardacontentrdamediardacarrierSecurity breaches and threat prevention in the Internet of things /N. Jeyanthi, R. Thandeeswaran [editors]Hershey, PA :Information Science Reference,[2017]�20171 online resource (xiv, 276 pages) illustrations (some color)Advances in Information Security, Privacy, and Ethics (AISPE) Book Series,1948-97491-5225-2296-4 Includes bibliographical references and index.IoT architecture / H. Parveen Sultana -- Internet of things and security perspectives: current issues and trends / Kijpokin Kasemsap -- Security in network layer of IoT: possible measures to preclude / B. Balamurugan -- Security in application layer protocols of IoT: threats and attacks / Jasmine Norman, Paul Joseph -- Security in IoT devices / N. Jeyanthi, Shreyansh Banthia, Akhil Sharma -- Security threats in autonomous vehicles / R. Thandeeswaran, Rajat Pawar, Mallika Rai -- Mechanisms to secure communications in the IoT / Azeddine Bilami, Somia Sahraoui -- IoT in healthcare: breaching security issues / Somasundaram R, Mythili Thirugnanam -- A contemplator on topical image encryption measures / Jayanta Mondal, Debabala Swain."This book provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things"--Provided by publisher.Premier reference source.Advances in information security, privacy, and ethics (AISPE) book series.Computer securityInternet of thingsData protectionComputer networksSecurity measuresInformation warfarePreventionCyberterrorismPreventionApplication layer protocolsAutonomous vehiclesDigital forensicsEncryption measuresHealthcare securityImage encryptionSecure communicationsComputer security.Internet of things.Data protection.Computer networksSecurity measures.Information warfarePrevention.CyberterrorismPrevention.004.67/8Jeyanthi N.1246129Jeyanthi N.1977-Thandeeswaran R.1971-MiFhGGMiFhGGBOOK9910164054403321Security breaches and threat prevention in the internet of things2889591UNINA04578nam 2200997z- 450 991059507530332120220916(CKB)5680000000080773(oapen)https://directory.doabooks.org/handle/20.500.12854/92081(oapen)doab92081(EXLCZ)99568000000008077320202209d2022 |y 0engurmn|---annantxtrdacontentcrdamediacrrdacarrierPhysical-Layer Security, Quantum Key Distribution and Post-quantum CryptographyBasel20221 online resource (210 p.)3-0365-5003-8 3-0365-5004-6 The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled "Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography" was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.History of engineering and technologybicsscTechnology: general issuesbicsscalgorithmamplificationBayesian statisticsclock synchronizationconclusive exclusioncontinuous variable (CV)-QKDcontinuous-variable quantum key distributiondetection probabilitydiscrete phase randomizationdiscrete variable (DV)-QKDdistillationentanglementEPR pairsgeometrical optics restricted eavesdroppinginformation disturbance theoreminjection attacksintrinsic bit error ratejamming attacksmean multi-kings' problemmean-king's problemmeasurement device independentmeasurement-device-independentn/aoblivious transferphase-matchingphysical layer securitypilot randomizationpost-quantum cryptographypostquantum cryptography (PQC)private equality testsQKDquantum communicationsquantum communications networks (QCNs)quantum cryptographyquantum entanglementquantum identity authenticationquantum information theoryquantum key distributionquantum key distribution (QKD)quantum networkreconciliationsatellite-to-satellitesecret key distillationsecret key generationsingle-photon modesurface codessynchronizationthe Bernstein-Vazirani algorithmtwin-field quantum key distributionunderwater channeluniversal composabilityvulnerabilityzero-photon catalysisHistory of engineering and technologyTechnology: general issuesDjordjevic Ivan Bedt763019Djordjevic Ivan BothBOOK9910595075303321Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography3038585UNINA