logo for The Institution of Engineering and Technology
Access Control and Security Monitoring of Multimedia Information Processing and Transmission
Zhihan Lyu
The Institution of Engineering and Technology, 2024
In the era of big data and multi-connectivity via IoTs, protecting and securing multimedia data has become a real necessity and priority for organizations and businesses, but this can be a rather difficult task due to the heterogeneous nature of platforms and data sets. It is therefore essential to improve the security level of multimedia information by developing core technologies to prevent the loss and damage of information during processing and transmission.
[more]

front cover of Artificial Intelligence for Biometrics and Cybersecurity
Artificial Intelligence for Biometrics and Cybersecurity
Technology and applications
Ahmed A. Abd El-Latif
The Institution of Engineering and Technology, 2023
The integration of new technologies is resulting in an increased demand for security and authentication in all types of data communications. Cybersecurity is the protection of networks and systems from theft. Biometric technologies use unique traits of particular parts of the body such facial recognition, iris, fingerprints and voice to identify individuals' physical and behavioural characteristics. Although there are many challenges associated with extracting, storing and processing such data, biometric and cybersecurity technologies along with artificial intelligence (AI) are offering new approaches to verification procedures and mitigating security risks.
[more]

front cover of Blockchain and the Law
Blockchain and the Law
The Rule of Code
Primavera De Filippi and Aaron Wright
Harvard University Press, 2018

“Blockchains will matter crucially; this book, beautifully and clearly written for a wide audience, powerfully demonstrates how.”
—Lawrence Lessig


“Attempts to do for blockchain what the likes of Lawrence Lessig and Tim Wu did for the Internet and cyberspace—explain how a new technology will upend the current legal and social order… Blockchain and the Law is not just a theoretical guide. It’s also a moral one.”
Fortune


Bitcoin has been hailed as an Internet marvel and decried as the preferred transaction vehicle for criminals. It has left nearly everyone without a computer science degree confused: how do you “mine” money from ones and zeros?

The answer lies in a technology called blockchain. A general-purpose tool for creating secure, decentralized, peer-to-peer applications, blockchain technology has been compared to the Internet in both form and impact. Blockchains are being used to create “smart contracts,” to expedite payments, to make financial instruments, to organize the exchange of data and information, and to facilitate interactions between humans and machines. But by cutting out the middlemen, they run the risk of undermining governmental authorities’ ability to supervise activities in banking, commerce, and the law. As this essential book makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking.

“If you…don’t ‘get’ crypto, this is the book-length treatment for you.”
—Tyler Cowen, Marginal Revolution

“De Filippi and Wright stress that because blockchain is essentially autonomous, it is inflexible, which leaves it vulnerable, once it has been set in motion, to the sort of unforeseen consequences that laws and regulations are best able to address.”
—James Ryerson, New York Times Book Review

[more]

front cover of Blockchain for 5G Healthcare Applications
Blockchain for 5G Healthcare Applications
Security and privacy solutions
Sudeep Tanwar
The Institution of Engineering and Technology, 2022
A secured system for Healthcare 4.0 is vital to all stakeholders, including patients and caregivers. Using the new Blockchain system of trusted ledgers would help guarantee authenticity in the multi-access system that is Healthcare 4.0. This is the first comprehensive book that explores how to achieve secure systems for Healthcare 4.0 using Blockchain, with emphasis on the key challenges of privacy and security.
[more]

logo for The Institution of Engineering and Technology
Blockchain Technology for Secure Social Media Computing
Robin Singh Bhadoria
The Institution of Engineering and Technology, 2023
Blockchain is a digital ledger of transactions duplicated and distributed across an entire network of computer systems on the blockchain which makes it more difficult to hack or tamper with. The popularity of blockchain has been increasing with the growth of social media and the internet of things (IoT). Social media are interactive digitally mediated technologies that facilitate the creation or sharing and exchange of information, ideas, opinions and interests via virtual communities and social network platforms. However, unmonitored social accounts can be the target of hackers who post fraudulent messages or virus-infected links that spread to contacts and followers, and "employee weakness" is responsible for 20% of cyberattacks in companies. So, it has become essential to secure both personal and professional social media networks, accounts and data.
[more]

front cover of Blockchains for Network Security
Blockchains for Network Security
Principles, technologies and applications
Haojun Huang
The Institution of Engineering and Technology, 2021
Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger for storing all committed transactions in trustless environments by integrating several core technologies such as cryptographic hash, digital signature and distributed consensus mechanisms.
[more]

front cover of Getting to Yes with China in Cyberspace
Getting to Yes with China in Cyberspace
Scott Warren Harold
RAND Corporation, 2016
This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable outcome? This analysis should interest those concerned with U.S.-China relations and with developing norms of conduct in cyberspace.
[more]

front cover of Internet and Wireless Security
Internet and Wireless Security
Robert Temple
The Institution of Engineering and Technology, 2002
Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.
[more]

front cover of The Other Quiet Professionals
The Other Quiet Professionals
Lessons for Future Cyber Forces from the Evolution of Special Forces
Christopher Paul
RAND Corporation, 2014
With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces.
[more]

logo for The Institution of Engineering and Technology
Physical Layer Security for 6G Networks
Trung Q. Duong
The Institution of Engineering and Technology, 2024
6G networks are expected to provide one-microsecond latency communication with a billion of devices expected to compete for resources 1000 times faster than current standards. Increases in network speed, heterogeneity, virtualization, better radio requirements and adaptive communications will place new demands on physical layer security. Moreover, IoT, blockchain, and artificial intelligence are enabling technologies that require rapid data rates, raising a significant burden on the network's physical layer, requiring that security must be attained at a fast pace, and that the network must be resilient to accommodate sudden changes to the configurations or the load.
[more]

front cover of The Power to Coerce
The Power to Coerce
Countering Adversaries Without Going to War
David C. Gompert
RAND Corporation, 2016
Mounting costs, risks, and public misgivings of waging war are raising the importance of U.S. power to coerce (P2C). The best P2C options are financial sanctions, support for nonviolent political opposition to hostile regimes, and offensive cyber operations. The state against which coercion is most difficult and risky is China, which also happens to pose the strongest challenge to U.S. military options in a vital region.
[more]

logo for The Institution of Engineering and Technology
Proof-of-Stake for Blockchain Networks
Fundamentals, challenges and approaches
Cong T. Nguyen
The Institution of Engineering and Technology, 2024
A consensus mechanism is the core component of a blockchain network, which ensures that every participant agrees on the state of the network in trustless environments. Until now, current blockchain networks have been using the proof-of-work (PoW) consensus mechanism, which has serious limitations such as huge energy consumption, low transaction processing capabilities, and centralization and scalability issues. To overcome these problems, a new consensus mechanism entitled proof-of-stake (PoS) has been developed. PoS has many advantages, including negligible energy consumption and very low consensus delay. Ethereum (the largest decentralized global software platform to create secured digital technology powered by blockchain technology and the blockchain of choice globally for all developers and enterprises) has just switched from PoW to PoS. As a result, this mechanism is expected to become a cutting-edge technology for future blockchain networks.
[more]

front cover of Trusted Computing
Trusted Computing
Chris Mitchell
The Institution of Engineering and Technology, 2005
As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules.
[more]


Send via email Share on Facebook Share on Twitter