000 05990nam a22006375i 4500
999 _c200457310
_d75522
003 TR-AnTOB
005 20231123095625.0
007 cr nn 008mamaa
008 220614s2022 si | s |||| 0|eng d
020 _a9789811931826
024 7 _a10.1007/978-981-19-3182-6
_2doi
040 _aTR-AnTOB
_beng
_erda
_cTR-AnTOB
041 _aeng
050 4 _aTK5105.59
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
090 _aTK5105.59EBK
245 1 0 _aProceedings of International Conference on Network Security and Blockchain Technology
_h[electronic resource] :
_bICNSBT 2021 /
_cedited by Debasis Giri, Jyotsna Kumar Mandal, Kouichi Sakurai, Debashis De.
250 _a1st ed. 2022.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2022.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Networks and Systems,
_x2367-3389 ;
_v481
505 0 _aCyber-Defense Mechanism Considering Incomplete Information Using POMDP -- Monitoring, Recognition and Attendance Automation in Online Class: Combination of Image Processing, Cryptography in IoT Security -- Cyber Threat Phylogeny Assessment and vulnerabilities representation at thermal power station -- A novel data encryption technique based on DNA sequence -- Continuous Behavioral Authentication System for IoT Enabled Applications -- A secure 'e-Tendering' application based on secret image sharing -- Video based Graphical password authentication system -- Designing Robust Blind Color Image Watermarking-Based Authentication Scheme for Copyright Protection -- LSB Steganography using Three level Arnold Scrambling and Pseudo-Random Generator -- Part I: Network, Network Security and their Applications -- Performance Analysis of Retrial Queueing System in Wireless Local Area Network -- IBDNA –An Improved BDNA Algorithm Incorporating Huffman Coding Technique -- Obfuscation Techniques for a Secure Endorsement System in Hyperledger Fabric -- Mobile Operating System (Android) Vulnerability Analysis using Machine Learning -- Survey of Predictive Autoscaling and Security of Cloud Resources using Artificial Neural Networks -- Systematic literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkwe -- A Survey on Interoperability Issues at the SaaS Level Influencing the Adoption of Cloud Computing Technology -- Human Recognition based Decision Virtualization for Effecting Safety-as-a-Service using IoT Enabled Automated UV-C Sanitization System -- Part II: Blockchain Technology and its Applications -- Security Optimization of Resource-Constrained Internet of Healthcare Things (IoHT) Devices Using Asymmetric Cryptography for Blockchain Network -- Preserving Privacy using Blockchain Technology in Autonomous Vehicles -- Security Protocols for Blockchain Based Access Control in VANETS -- LIVECHAIN: Lightweight Blockchain for IOT Devices and it's Security -- Secure and scalable Attribute Based Access Control scheme for healthcare data on Blockchain platform -- Adaptive Neuro Fuzzy Inference System for Monitoring Activities in Electric Vehicles through a Hybrid Approach and Blockchain Technology -- Application of BLOCKCHAIN in Agriculture: An Instance of Secure Financial Service in Farming -- Adaptive Electronic Health Records Management And Secure Distribution Using Blockchain -- Non-Content Message Masking Model for Healthcare Data in Edge-IoT Ecosystem using Blockchain -- Voting based Consensus protocol for blockchain to maintain COVID patient records in Consortium Networks -- Blockchain Adaptation in Healthcare: SWOT Analysis -- Blockchain-IoT based Blood Supply Chain Management System -- Blockchain based COVID-19 Detection Framework Using Federated Deep Learning -- Systematic Review of Attribute-Based Access Control for a Smart City using Blockchain -- A methodical study on Blockchain technology.
520 _aThe book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India—Kolkata Chapter, India, during December 2–4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.
650 0 _aTelecommunication.
650 0 _aComputer networks—Security measures.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aBlockchains (Databases).
650 0 _aArtificial intelligence.
650 1 4 _aCommunications Engineering, Networks.
650 2 4 _aMobile and Network Security.
650 2 4 _aCryptology.
650 2 4 _aBlockchain.
650 2 4 _aArtificial Intelligence.
653 0 _aBlockchains (Databases) -- Congresses
653 0 _aComputer networks -- Security measures -- Congresses
653 0 _aComputer security -- Congresses
700 1 _aGiri, Debasis.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aMandal, Jyotsna Kumar.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSakurai, Kouichi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aDe, Debashis.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
830 0 _aLecture Notes in Networks and Systems,
_x2367-3389 ;
_v481
856 4 0 _uhttps://doi.org/10.1007/978-981-19-3182-6
_3Springer eBooks
_zOnline access link to the resource
942 _2lcc
_cEBK