Advances in Security in Computing and Communications

In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by design...

Full description

Saved in:
Bibliographic Details
Other Authors: Sen, Jaydip (Editor)
Format: Electronic Book Chapter
Language:English
Published: IntechOpen 2017
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_129719
005 20231201
003 oapen
006 m o d
007 cr|mn|---annan
008 20231201s2017 xx |||||o ||| 0|eng d
020 |a 65228 
020 |a 9789535133469 
020 |a 9789535133452 
020 |a 9789535147336 
040 |a oapen  |c oapen 
024 7 |a 10.5772/65228  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a URD  |2 bicssc 
100 1 |a Sen, Jaydip  |4 edt 
700 1 |a Sen, Jaydip  |4 oth 
245 1 0 |a Advances in Security in Computing and Communications 
260 |b IntechOpen  |c 2017 
300 |a 1 electronic resource (192 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/3.0/  |2 cc  |4 https://creativecommons.org/licenses/by/3.0/ 
546 |a English 
650 7 |a Privacy & data protection  |2 bicssc 
653 |a machine learning, internet of things, algorithm, cybersecurity, information security, wsn 
856 4 0 |a www.oapen.org  |u https://mts.intechopen.com/storage/books/5775/authors_book/authors_book.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/129719  |7 0  |z DOAB: description of the publication