logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach by Behrouz Zolfaghari, Khodakhast Bibak ISBN 9783031131905, 3031131908

  • SKU: EBN-46370532
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.5

19 reviews
Instant download (eBook) Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach after payment.
Authors:Behrouz Zolfaghari, Khodakhast Bibak
Pages:128 pages.
Year:2022
Editon:1st ed. 2022
Publisher:Springer
Language:english
File Size:3.12 MB
Format:pdf
ISBNS:9783031131905, 3031131908
Categories: Ebooks

Product desciption

(Ebook) Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach by Behrouz Zolfaghari, Khodakhast Bibak ISBN 9783031131905, 3031131908

Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step towards this goal via presenting a hybrid combinatorial-Boolean model for perfectly-secure cryptography in IoT. In this book, we first present an introduction to information-theoretic cryptography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergence point for existing trends in research on cryptography in IoT. Then we investigate combinatorial and Boolean cryptography and show how they are seen almost everywhere in the ecosystem and the life cycle of information-theoretic IoT cryptography. We finally model perfect secrecy in IoT using Boolean functions, and map the Boolean functions to simple, well-studied combinatorial designs like Latin squares.This book is organized in two parts. The first part studie s information-theoretic cryptography and the promise it holds for cryptography in IoT. The second part separately discusses combinatorial and Boolean cryptography, and then presents the hybrid combinatorial-Boolean model for perfect secrecy in IoT.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products