Proceedings of International Conference on Network Security and Blockchain Technology: ICNSBT 2023

Author:   Jyotsna Kumar Mandal ,  Biswapati Jana ,  Tzu-Chuen Lu ,  Debashis De
Publisher:   Springer Verlag, Singapore
Edition:   1st ed. 2024
Volume:   738
ISBN:  

9789819944323


Pages:   537
Publication Date:   29 November 2023
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $659.97 Quantity:  
Add to Cart

Share |

Proceedings of International Conference on Network Security and Blockchain Technology: ICNSBT 2023


Add your own review!

Overview

The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2023), held at Vidyasagar University, Midnapore, India, during March 24–26, 2023. The book discusses recent developments and contemporary research in cryptography, network security, cybersecurity, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.

Full Product Details

Author:   Jyotsna Kumar Mandal ,  Biswapati Jana ,  Tzu-Chuen Lu ,  Debashis De
Publisher:   Springer Verlag, Singapore
Imprint:   Springer Verlag, Singapore
Edition:   1st ed. 2024
Volume:   738
Weight:   1.002kg
ISBN:  

9789819944323


ISBN 10:   9819944325
Pages:   537
Publication Date:   29 November 2023
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Machine Learning Based Identification of DDoS Flood Attack in eHealth Cloud Environment.-  Machine Learning Based Phishing E-mail Detection using Persuasion Principle and NLP Techniques.- Cryptanalysis and improvement of a mutual authentication scheme for smart grid communications.- Collision Avoidance and Drowsiness Detection System for Drivers.- A New Algorithm for Encryption and Decryption Using AUM Block Sum Labeling.- Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation.- Face Mask Detection Exploiting CNN and MOBILENETV.- Malicious Transaction URL Detection Using Logistic Regression.- Secured Information Communication exploiting Fuzzy weight strategy.- Secure Data Communication Through Improved Multi-Level Pixel Value Ordering using Center-Folding Strategy.- Perseverance of the Audio Data using RNN Implied Matrix Segmentation based Lossless Encoder.- SVD based Watermarking Scheme for Medical ImageAuthentication.- Watermark based Image Authentication with Coefficient Value Differencing and Histogram Shifting.- IEMS3: An Image Encryption Scheme Using Modified SNOW 3G Algorithm.

Reviews

Author Information

Jyotsna Kumar Mandal completed M.Tech. (Computer Science, University of Calcutta) and Ph.D. (Engg., Jadavpur University) in the field of Data Compression and Error Correction Techniques and is Professor of Computer Science and Engineering, University of Kalyani, India; Former Director, IQAC, Kalyani University; Life Member of CSI, CRSI; Associate Member ACM, IEEE; Fellow Member of IETE; Former Dean Faculty of Engineering, Technology & Management, working in the field of Network Security, Steganography, Remote Sensing & GIS Application, and Image Processing; 35 years of teaching and research experiences; twenty-eight scholars were awarded Ph.D., four submitted, and eight are pursuing; the total number of publications is more than four hundred in addition of publication of twelve books from LAP Lambert, Germany, and IGI Global; organized 55 conferences of Springer Nature, Elsevier, IEEE, etc.; edited more than 55 proceedings as corresponding editor/editors; Member of NAAC Peer Teamand AICTE Expert Team of EVC; Academic auditor for universities and institutes; delivered more than 100 expert lectures across the globe; Former Member of Governing Council, IETE, Delhi; and received Siksha Ratna Award from Government of W.B. for outstanding performance of teaching and research. Biswapati Jana completed M.Tech. (Computer Science and Engineering, University of Calcutta) and Ph.D. (Computer Science, Vidyasagar University) in the field of Data Hiding Techniques; Associate Professor in Computer Science, Vidyasagar University, India; 20 years of teaching and research experiences; four scholars awarded Ph.D. and six are pursuing; the total number of publications is more than hundred; and delivered more than 25 expert lectures across the globe. He served as Reviewer for a good number of international journals and conferences. His research interest includes Data Hiding, Image Processing, Data Security, Steganography, and Watermarking. Tzu-Chuen Lu received the B.M. degree (1999) and MSIM degree (2001) in Information Management from Chaoyang University of Technology, Taiwan. She received her Ph.D. degree (2006) in Computer Engineering from National Chung Cheng University. Her current title is Professor in Department of Information Management at Chaoyang University of Technology. Debashis De is Professor in Department of Computer Science and Engineering at Maulana Abul Kalam Azad University of Technology, West Bengal, India. He received M.Tech. from the University of Calcutta, 2002, and a Ph.D. from Jadavpur University in 2005. He is Senior Member, IEEE; Fellow, IETE; and Life Member, CSI. He was awarded the prestigious Boyscast Fellowship by the Department of Science and Technology, Government of India, to work at the Heriot-Watt University, Scotland, UK. He received the Endeavour Fellowship Award from 2008–2009 by DEST Australia to work at the University of Western Australia. He received the Young Scientist Award both in 2005 at New Delhi and in 2011 in Istanbul, Turkey, from the International Union of Radio Science, Belgium. In 2016, he received the JC Bose Research Award by IETE, New Delhi. In 2019, he received Shiksha Ratna Award by the Government of West Bengal. He established the Center of Mobile Cloud Computing (CMCC) for IoT applications. He is Vice Chair of Dew Computing STC of IEEE Computer Society. He published in 320 journals and 200 conference papers, fifteen books, and filed ten patents. His h-index is 36; citation 6300; and listed in Top 2% Scientist List of the world, Stanford University, USA. His research interest is Cloud, IoT, and Quantum Computing.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List