Atnaujinkite slapukų nuostatas

El. knyga: Information Security Technologies in the Decentralized Distributed Networks

Edited by , Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.

Methods for Privacy Support in the Decentralized Environment.- Application of Bluetooth, Wi-Fi and Gps Technologies in the means of Contact Tracking.- Analysis and Research of Threat, Attacker and Security Models of Data Depersonalization in Decentralized Networks.- Cryptographic Transformations in a Decentralized Blockchain Environment.- Statistical and Signature Analysis Methods of Intrusion Detection.- Criteria and Indicators of Efficiency of Cryptographic Protection Mechanisms.- Methods of Evaluation and Comparative Research of Cryptographic Conversions.- Cryptographic Mechanisms that Ensure the Efficiency of SNARK-Systems.- Comparative Analysis of Consensus Algorithms that use a Directed Acyclic Graph Instead of a Blockchain, and Construction of Estimates of the SPECTRE Protocol Security to the Double Spend Attack.- Models and Methods of Secure Routing and Load Balancing in Infocommunication Networks.- The Methods of Data Comparison in Residue Numeral System.- Data Control in theSystem of Residual Classes.- Traffic Monitoring and Abnormality Detection Methods for Decentralized Distributed Networks.