Abstract
In this paper will be described possible applications of cognitive systems for security purposes and cryptographic protocols. In particular will be presented the ways of using advanced cognitive approaches and personal, cognitive features for creation of secure protocols, oriented on user authentication or secure data management in Cloud and Big data resources. The new computing area called cognitive cryptography will be also introduced.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ogiela, M.R., Ogiela, L.: On using cognitive models in cryptography. In: IEEE AINA 2016—The IEEE 30th International Conference on Advanced Information Networking and Applications, pp. 1055–1058. Crans-Montana, Switzerland, 23–25 March, 2016
Ogiela, M.R., Ogiela, L.: Cognitive keys in personalized cryptography. In: IEEE AINA 2017 The 31st IEEE International Conference on Advanced Information Networking and Applications, pp. 1050–1054. Taipei, Taiwan, 27–29 March, 2017
Meiappane, A., Premanand, V.: CAPTCHA as Graphical Passwords - A New Security Primitive: Based on Hard AI Problems. Scholars’ Press (2015)
Osadchy, M., Hernandez-Castro, J., Gibson, S., Dunkelman, O., Perez-Cabo, D.: No bot expects the DeepCAPTCHA! Introducing immutable adversarial examples, with applications to CAPTCHA generation. IEEE Trans. Inf. Forensics Secur. 12(11), 2640–2653 (2017)
Ogiela, L.: Cognitive computational intelligence in medical pattern semantic understanding. In: Guo, M.Z., Zhao, L., Wang, L.P. (eds.) In: ICNC 2008: Fourth International Conference on Natural Computation, vol. 6, Proceedings, 18–20 October, Jian, Peoples R China, pp. 245–247 (2008)
Ogiela, L.: Cognitive Information Systems in Management Sciences. Elsevier, Academic Press, London, UK (2017)
Ogiela, L., Ogiela, M.R.: Bio-Inspired cryptographic techniques in information management applications. In: IEEE AINA 2016—the IEEE 30th International Conference on Advanced Information Networking and Applications, pp. 1059–1063. Crans-Montana, Switzerland, 23–25 March, 2016
Ogiela, U., Ogiela, L.: Linguistic techniques for cryptographic data sharing algorithms. Concurr. Comp. Pract. E. 30(3), e4275 (2018). https://doi.org/10.1002/cpe.4275
Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11, 405–414 (2017)
Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T.-h., et al. (eds.) AST 2011. CCIS, vol. 195, pp. 31–35 (2011)
Ogiela, L., Ogiela, M.R., Ogiela, U.: Efficiency of strategic data sharing and management protocols. In: The 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2016), 6–8 July, Fukuoka, Japan, pp. 198–201 (2016), https://doi.org/10.1109/imis.2016.119
Ogiela, L.: Advanced techniques for knowledge management and access to strategic information. Int. J. Inf. Manag. 35(2), 154–159 (2015)
Easttom, Ch.: Modern Cryptography: Applied Mathematics for Encryption and Information Security. McGraw-Hill Education, New York (2015)
Schneier, B.: Applied Cryptography. Wiley, Indianapolis (2015)
Acknowledgments
This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.
This work has been supported by the Pedagogical University of Krakow research Grant No BS-376/M/2019.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Ogiela, M.R., Ogiela, L. (2020). Cognitive Personal Security Systems. In: Barolli, L., Hussain, F., Ikeda, M. (eds) Complex, Intelligent, and Software Intensive Systems. CISIS 2019. Advances in Intelligent Systems and Computing, vol 993. Springer, Cham. https://doi.org/10.1007/978-3-030-22354-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-22354-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22353-3
Online ISBN: 978-3-030-22354-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)