Limit search to available items
Book Cover
E-book

Title Information security technologies in the decentralized distributed networks / Roman Oliynykov, Oleksandr Kuznetsov, Oleksandr Lemeshko, Tamara Radivilova, editors
Published Cham, Switzerland : Springer, 2022

Copies

Description 1 online resource (xiv, 305 pages) : illustrations (some color)
Series Lecture notes on data engineering and communications technologies, 2367-4520 ; volume 115
Lecture notes on data engineering and communications technologies ; v. 115. 2367-4520
Contents Methods for Privacy Support in the Decentralized Environment -- Application of Bluetooth, Wi-Fi and Gps Technologies in the means of Contact Tracking -- Analysis and Research of Threat, Attacker and Security Models of Data Depersonalization in Decentralized Networks -- Cryptographic Transformations in a Decentralized Blockchain Environment -- Statistical and Signature Analysis Methods of Intrusion Detection -- Criteria and Indicators of Efficiency of Cryptographic Protection Mechanisms -- Methods of Evaluation and Comparative Research of Cryptographic Conversions -- Cryptographic Mechanisms that Ensure the Efficiency of SNARK-Systems -- Comparative Analysis of Consensus Algorithms that use a Directed Acyclic Graph Instead of a Blockchain, and Construction of Estimates of the SPECTRE Protocol Security to the Double Spend Attack -- Models and Methods of Secure Routing and Load Balancing in Infocommunication Networks -- The Methods of Data Comparison in Residue Numeral System -- Data Control in the System of Residual Classes -- Traffic Monitoring and Abnormality Detection Methods for Decentralized Distributed Networks
Summary The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods
Notes Online resource; title from PDF title page (SpringerLink, viewed April 6, 2022)
Subject Computer networks -- Security measures.
Data encryption (Computer science)
Computer networks -- Security measures
Data encryption (Computer science)
Form Electronic book
Author Oliynykov, Roman, editor
Kuznetsov, Oleksandr, editor
Lemeshko, Oleksandr, editor
Radivilova, Tamara, editor
ISBN 9783030951610
3030951618