Recent Advances in Cryptography and Network Security

In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryptio...

Full description

Saved in:
Bibliographic Details
Other Authors: Mitra, Pinaki (Editor)
Format: Electronic Book Chapter
Language:English
Published: IntechOpen 2018
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_66942
005 20210420
003 oapen
006 m o d
007 cr|mn|---annan
008 20210420s2018 xx |||||o ||| 0|eng d
020 |a intechopen.71917 
020 |a 9781789843460 
020 |a 9781789843453 
020 |a 9781838816285 
040 |a oapen  |c oapen 
024 7 |a 10.5772/intechopen.71917  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UR  |2 bicssc 
100 1 |a Mitra, Pinaki  |4 edt 
700 1 |a Mitra, Pinaki  |4 oth 
245 1 0 |a Recent Advances in Cryptography and Network Security 
260 |b IntechOpen  |c 2018 
300 |a 1 electronic resource (68 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/3.0/  |2 cc  |4 https://creativecommons.org/licenses/by/3.0/ 
546 |a English 
650 7 |a Computer security  |2 bicssc 
653 |a Computer security 
856 4 0 |a www.oapen.org  |u https://mts.intechopen.com/storage/books/6664/authors_book/authors_book.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/66942  |7 0  |z DOAB: description of the publication