Security and Authentication: Perspectives, Management and Challenges Front Cover

Security and Authentication: Perspectives, Management and Challenges

  • Length: 271 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2017-11-30
  • ISBN-10: 1536129429
  • ISBN-13: 9781536129427
Description

State-Of-The-Art Authentication Techniques : Threats and Vulnerabilities (Chin Poo Lee and Kian Ming Lim, Faculty of Information Science and Technology, Multimedia University, Malacca, Malaysia) — Privacy Protection in Machine Learning : The State-of-the-Art for a Private Decision Tree (Yee Jian Chew, Kok-Seng Wong, and Shih Yin Ooi, Faculty of Information Science and Technology, Multimedia University, Malacca, Malaysia, and others) — Key Distribution and Management in Cryptography (Bachir Bendrissou and Yean Li Ho, Faculty of Information Science and Technology, Multimedia University, Malacca, Malaysia) — Targeted Image Forensics (Rimba Whidiana Ciptasari, School of Computing, Telkom University, Bandung, Indonesia) — Deep Learning for Abnormal Behavior Detection (Nian Chi Tay, Pin Shen Teh, and Siok Wah Tay, Faculty of Information Science and Technology, Multimedia University, Malacca, Malaysia, and others) — Security Issues in Wireless Sensor Networks and IoT (Jayakumar Vaithiyashankar, Faculty ofInformation Science and Technology, Multimedia University, Malacca, Malaysia) — Finger Vein Biometrics: The Future for a Mobile Authentication System (Ahmad Syarif Munalih and William Ardianto, Information Security Lab, MIMOS Bhd, Kuala Lumpur, Malaysia, and others) — Android Device Misplacement Remedy via Bluetooth-Enabled Technology (Siew-Chin Chong and Kaven Raj S/O Manoharan, Faculty of Information Science & Technology, Multimedia University, Malacca, Malaysia) — A Labeled Network-Based Anomaly Intrusion Detection System (IDS) Dataset (Shih Yin Ooi, Nicholas Ming Ze Lee, Yong Kian Lee, and Ying Han Pang, Faculty of Information Science and Technology, Multimedia University, Malacca, Malaysia) — Seamless Biometrics for a Smart Office (Ting Yong Sohand Michael Kah Ong Goh, Faculty of Information Science and Technology, Multimedia University, Malacca, Malaysia) Hiding Information Within a QR Code Based on a Color Subcell (SQRC) (Ari Moesriami Barmawi and Yudha Viki Alvionata, Informatics Graduate Program, School of Computing, Telkom University, Bandung, Indonesia).

Table of Contents

Chapter 1 State-of-the-Art Authentication Techniques: Threats and Vulnerabilities
Chapter 2 Privacy Protection in Machine Learning: The State-of-the-Art for a Private Decision Tree
Chapter 3 Key Distribution and Management in Cryptography
Chapter 4 Targeted Image Forensics
Chapter 5 Deep Learning for Abnormal Behavior Detection
Chapter 6 Security Issues in Wireless Sensor Networks and IoT
Chapter 7 Finger Vein Biometrics: The Future for a Mobile Authentication System
Chapter 8 Android Device Misplacement Remedy via Bluetooth-Enabled Technology
Chapter 9 A Labeled Network-Based Anomaly Intrusion Detection System (IDS) Dataset
Chapter 10 Seamless Biometrics for a Smart Office
Chapter 11 Hiding Information Within a QR code Based on a Color Subcell (SQRC)

To access the link, solve the captcha.