Computer and Network Security

In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity...

Full description

Saved in:
Bibliographic Details
Other Authors: Sen, Jaydip (Editor)
Format: Book Chapter
Published: IntechOpen 2020
Subjects:
Online Access:Get Fullteks
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02072naaaa2200301uu 4500
001 doab_20_500_12854_67529
005 20210420
020 |a intechopen.78497 
020 |a 9781838808556 
020 |a 9781838808549 
020 |a 9781838808563 
024 7 |a 10.5772/intechopen.78497  |c doi 
041 0 |a English 
042 |a dc 
072 7 |a UT  |2 bicssc 
100 1 |a Sen, Jaydip  |4 edt 
700 1 |a Sen, Jaydip  |4 oth 
245 1 0 |a Computer and Network Security 
260 |b IntechOpen  |c 2020 
300 |a 1 electronic resource (176 p.) 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/3.0/  |2 cc  |4 https://creativecommons.org/licenses/by/3.0/ 
546 |a English 
650 7 |a Computer networking & communications  |2 bicssc 
653 |a Network security 
856 4 0 |a www.oapen.org  |u https://mts.intechopen.com/storage/books/8368/authors_book/authors_book.pdf  |7 0  |z Get Fullteks 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/67529  |7 0  |z DOAB: description of the publication