TY - GEN N2 - This book aims to attract researchers and practitioners who are working in information technology and computer science. This edited book is about basics and high-level concepts regarding blockchain technology and application, multimedia security, information processing, security of network, cloud and IoT, cryptography and information hiding, cyber-security and evidence investigations, and learning and intelligent computing. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure, and privacy-aware mechanisms in high-performance computing and IoT applications. The book serves as a useful guide for industry persons and also helps beginners to learn things from basic to advance in the area of better computing paradigm. Our aim is intended to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results in security-related areas. We believe that this book not only presents novel and interesting ideas but also will stimulate interesting discussions from the participants and inspire new ideas. DO - 10.1007/978-3-031-05491-4 DO - doi AB - This book aims to attract researchers and practitioners who are working in information technology and computer science. This edited book is about basics and high-level concepts regarding blockchain technology and application, multimedia security, information processing, security of network, cloud and IoT, cryptography and information hiding, cyber-security and evidence investigations, and learning and intelligent computing. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure, and privacy-aware mechanisms in high-performance computing and IoT applications. The book serves as a useful guide for industry persons and also helps beginners to learn things from basic to advance in the area of better computing paradigm. Our aim is intended to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results in security-related areas. We believe that this book not only presents novel and interesting ideas but also will stimulate interesting discussions from the participants and inspire new ideas. T1 - 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-Data Applications / DA - 2023. CY - Cham : AU - Tsihrintzis, George A. AU - Wang, Shiuh-Jeng. AU - Lin, Iuon-Chang. VL - v.314 CN - Q334 PB - Springer, PP - Cham : PY - 2023. N1 - 3.3 Discussion and Comparison ID - 1453448 KW - Artificial intelligence KW - Internet of things SN - 9783031054914 SN - 3031054911 TI - 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-Data Applications / LK - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-05491-4 UR - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-05491-4 ER -