The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.
Daftar Isi
Methods for Privacy Support in the Decentralized Environment.- Application of Bluetooth, Wi-Fi and Gps Technologies in the means of Contact Tracking.- Analysis and Research of Threat, Attacker and Security Models of Data Depersonalization in Decentralized Networks.- Cryptographic Transformations in a Decentralized Blockchain Environment.- Statistical and Signature Analysis Methods of Intrusion Detection.- Criteria and Indicators of Efficiency of Cryptographic Protection Mechanisms.- Methods of Evaluation and Comparative Research of Cryptographic Conversions.- Cryptographic Mechanisms that Ensure the Efficiency of SNARK-Systems.- Comparative Analysis of Consensus Algorithms that use a Directed Acyclic Graph Instead of a Blockchain, and Construction of Estimates of the SPECTRE Protocol Security to the Double Spend Attack.- Models and Methods of Secure Routing and Load Balancing in Infocommunication Networks.- The Methods of Data Comparison in Residue Numeral System.- Data Control in the System of Residual Classes.- Traffic Monitoring and Abnormality Detection Methods for Decentralized Distributed Networks.