Computer and Network Security

In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity...

Full description

Saved in:
Bibliographic Details
Other Authors: Sen, Jaydip (Editor)
Format: Electronic Book Chapter
Language:English
Published: IntechOpen 2020
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_67529
005 20210420
003 oapen
006 m o d
007 cr|mn|---annan
008 20210420s2020 xx |||||o ||| 0|eng d
020 |a intechopen.78497 
020 |a 9781838808556 
020 |a 9781838808549 
020 |a 9781838808563 
040 |a oapen  |c oapen 
024 7 |a 10.5772/intechopen.78497  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UT  |2 bicssc 
100 1 |a Sen, Jaydip  |4 edt 
700 1 |a Sen, Jaydip  |4 oth 
245 1 0 |a Computer and Network Security 
260 |b IntechOpen  |c 2020 
300 |a 1 electronic resource (176 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/3.0/  |2 cc  |4 https://creativecommons.org/licenses/by/3.0/ 
546 |a English 
650 7 |a Computer networking & communications  |2 bicssc 
653 |a Network security 
856 4 0 |a www.oapen.org  |u https://mts.intechopen.com/storage/books/8368/authors_book/authors_book.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/67529  |7 0  |z DOAB: description of the publication