Skip to main content

Information Security Technologies in the Decentralized Distributed Networks

  • Book
  • © 2022

Overview

  • Provides practical knowledge on different aspects of service systems functioning with ICT technologies implemented
  • Gives recent research on Information security technologies in the decentralized distributed networks
  • Studies challenges and opportunities of data/information communication, management and security

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies (LNDECT, volume 115)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 16.99 USD 109.00
Discount applied Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (13 chapters)

Keywords

About this book

The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.

Editors and Affiliations

  • Department of Information and Communication Systems Security, Faculty of Computer Science, V. N. Karazin Kharkiv National University, Kharkiv, Ukraine

    Roman Oliynykov, Oleksandr Kuznetsov

  • Department of Infocommunication Engineering, Faculty of Infocommunication, Kharkiv National University of Radio Electronics, Kharkiv, Ukraine

    Oleksandr Lemeshko, Tamara Radivilova

Bibliographic Information

Publish with us