Information Security Technologies in the Decentralized Distributed Networks
Overview
Methods for Privacy Support in the Decentralized Environment.- Application of Bluetooth, Wi-Fi and Gps Technologies in the means of Contact Tracking.- Analysis and Research of Threat, Attacker and Security Models of Data Depersonalization in Decentralized Networks.- Cryptographic Transformations in a Decentralized Blockchain Environment.- Statistical and Signature Analysis Methods of Intrusion Detection.- Criteria and Indicators of Efficiency of Cryptographic Protection Mechanisms.- Methods of Evaluation and Comparative Research of Cryptographic Conversions.- Cryptographic Mechanisms that Ensure the Efficiency of SNARK-Systems.- Comparative Analysis of Consensus Algorithms that use a Directed Acyclic Graph Instead of a Blockchain, and Construction of Estimates of the SPECTRE Protocol Security to the Double Spend Attack.- Models and Methods of Secure Routing and Load Balancing in Infocommunication Networks.- The Methods of Data Comparison in Residue Numeral System.- Data Control in the System of Residual Classes.- Traffic Monitoring and Abnormality Detection Methods for Decentralized Distributed Networks.
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9783030951603
- ISBN-10: 303095160X
- Publisher: Springer
- Publish Date: April 2022
- Dimensions: 9.21 x 6.14 x 0.67 inches
- Shipping Weight: 0.99 pounds
- Page Count: 305
Related Categories
