Power of Digital Identity
Winning Consumer Trust and Transforming Experience
The world is going digital to deliver things and services in moments instead of days. Digital identities have become the foundation of consumer-brand relationships. And, Trust and Experience are the pillar of modern digital relationships i.e. consumers expect amazing and secure digital experience where privacy is protected.
It is a strategy book for c-suite to understand the role of digital identity in consumer relationships and build the kind of CIAM strategy that drives growth.
Check out the official book website
Method and system for defense against Distributed Denial-of-Service attack
The present disclosure relates to a method for defense mechanisms against DDoS attack based on entropy in software defined network cloud. The present disclosure also relates to a defensive mechanism for DDoS attacks that is based on variations in entropy between DDoS attack and a normal traffic with a low computational overhead and a mitigation technique to reduce the severity of the attack. On comparing with the existing DDoS mechanisms, there are three advantages of the proposed method and those advantages are, detection rate is high, false positive rate is low, and the mitigation ability. Simulations are carried out in mininet emulator with POX controller and open flow switches at different attack strength.
Method and system of performing a fine-grained searchable encryption for resource-constrained devices in m-health network
The present disclosure relates to an existing attribute-based keyword search method with constant-size secret keys and ciphertexts. The method consists of a system and the system comprises of a trusted authority (TA), a data owner, a data use, and a cloud server. The present disclosure proposes a searchable encryption scheme based on ABE in which access control is used to determine the searching capability of a user. The scheme provides constant size for the user's secret key and ciphertext of the keyword. The scheme supports fast search as the number of pairing operations are constant. The scheme used a ciphertext-policy (CP) design framework and supports an AND gate access structure. Further, the proposed CP-ABKS scheme is secure in the selective security model under augmented multi-sequence of exponents decisional DiffieHellman assumption.
Handbook of Computer Networks and Cyber Security - Principles and Paradigms
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented.
Handbook of Research on Multimedia Cyber Security
The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.
Computer and Cyber Security - Principles, Algorithms, Applications and Perspectives
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.