Security and Authentication: Perspectives, Management and Challenges


Ong Thian Song, Tee Connie and Mohd Shohel Sayeed (Editors)
Multimedia University, Melaka, Malaysia

Series: Cybercrime and Cybersecurity Research
BISAC: COM060040

Issues around security and privacy have received greater attention as the world becomes more digitized and interconnected. There are a myriad of technological advances like smart mobile devices, wearable devices, Internet of Things (IoTs), cloud computing and social networks that benefit people all over the world, transforming how they work and communicate with each other. However, these new technologies also bring new security and privacy challenges. For example, there are massive attacks by malicious malware like WannaCry that cost great financial loss to individuals and institutions. Besides, there are ample amounts of software and programs that quietly collect, share and sometimes disclose huge amounts of personal information.

This book presents the current popular issues in information security and privacy, covering human users, hardware and software, the Internet and also communication protocols. The book provides a comprehensive combination of studies that offer integrated solutions to security and privacy problems. The topics covered in the book include mobile authentication systems, security in wireless sensor networks and IoTs, network-based intrusion detection systems, privacy protection in machine learning, deep learning for surveillance, and also targeted image forensics. An understanding of these areas ensures the ability to adapt to and address new challenges in the technological dependent world as these fields evolve.

The primary target audiences of this book are students and researchers from security technology and information technology management. The editors have been blessed by the assistance of many people concerning all aspects for the preparation of this book. The editors would like to express their sincere gratitude to the anonymous reviewers for their professional support and dedication to reviewing the chapters of this book. They are deeply grateful for the excellent contributions of the authors. Last but not least, special thanks also go out to Nova Science Publishers for presenting the opportunity to prepare and publish this book.


Table of Contents


Chapter 1. State-Of-The-Art Authentication Techniques: Threats and Vulnerabilities (pp. 1-12)
Chin Poo Lee and Kian Ming Lim

Chapter 2. Privacy Protection in Machine Learning: The State-of-the-Art for a Private Decision Tree (pp. 13-40)
Yee Jian Chew, Kok-Seng Wong and Shih Yin Ooi

Chapter 3. Key Distribution and Management in Cryptography (pp. 41-64)
Bachir Bendrissou and Yean Li Ho

Chapter 4. Targeted Image Forensics (pp. 65-86)
Rimba Whidiana Ciptasari

Chapter 5. Deep Learning for Abnormal Behavior Detection (pp. 87-116)
Nian Chi Tay, Pin Shen Teh and Siok Wah Tay

Chapter 6. Security Issues in Wireless Sensor Networks and IoT (pp. 117-130)
Jayakumar Vaithiyashankar

Chapter 7. Finger Vein Biometrics: The Future for a Mobile Authentication System (pp. 131-148)
Ahmad Syarif Munalih and William Ardianto

Chapter 8. Android Device Misplacement Remedy via Bluetooth-Enabled Technology (pp. 149-180)
Siew-Chin Chong and Kaven Raj S/O Manoharan

Chapter 9. A Labeled Network-Based Anomaly Intrusion Detection System (IDS) Dataset (pp. 181-216)
Nicholas Ming Ze Lee, Shih Yin Ooi, Yong Kian Lee and Ying Han Pang

Chapter 10. Seamless Biometrics for a Smart Office (pp. 217-240)
Soh Ting Yong and Michael Gah Kah Ong

Chapter 11. Hiding Information Within a QR Code Based on a Color Subcell (SQRC) (pp. 241-262)
Ari Moesriami Barmawi and Yudha Viki Alvionata

Index (pp. 263)

We publish over 1,500 new titles per year by leading researchers each year. We have a network of expert authors, editors, and advisors spanning the global academic community in pursuit of advanced research developments. Submit a Book Proposal