Linked e-resources
Details
Table of Contents
Introduction
Part I: Growth of Sensory devices and their proliferation into daily life
Smart Objects in Cyber-Physical Systems
IoT Security
Part II: Securing the Internet-of-Things enabled Smart Environments
Understanding the smart systems
Onboarding new IoT Devices
Part III Cryptosystems
Foundations and the current state-of-the-art
Symmetric key Cryptography
Asymmetric Key Cryptography
Part IV Modern Encryption Schemes
Homomorphic Encryption
Popular Homomorphic Encryption Schemes
Industrial involvement in the use of Homomorphic Encryption
Non-malleable cryptosystem
Machine Learning based Cryptosystems
Neural Cryptography
Part V: Creating a Tamper Evident System for the Cyber Era
Tamper evident system Our Major Proposition
Part VI: Feasibility and Performance Analysis
Implementation Details
Threat Model
Part VII: Future Directions
Quantum Cryptography
Quantum Tools
Applications
Conclusion.
Part I: Growth of Sensory devices and their proliferation into daily life
Smart Objects in Cyber-Physical Systems
IoT Security
Part II: Securing the Internet-of-Things enabled Smart Environments
Understanding the smart systems
Onboarding new IoT Devices
Part III Cryptosystems
Foundations and the current state-of-the-art
Symmetric key Cryptography
Asymmetric Key Cryptography
Part IV Modern Encryption Schemes
Homomorphic Encryption
Popular Homomorphic Encryption Schemes
Industrial involvement in the use of Homomorphic Encryption
Non-malleable cryptosystem
Machine Learning based Cryptosystems
Neural Cryptography
Part V: Creating a Tamper Evident System for the Cyber Era
Tamper evident system Our Major Proposition
Part VI: Feasibility and Performance Analysis
Implementation Details
Threat Model
Part VII: Future Directions
Quantum Cryptography
Quantum Tools
Applications
Conclusion.