Computer and Network Security
In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity...
Saved in:
Other Authors: | |
---|---|
Format: | Book Chapter |
Published: |
IntechOpen
2020
|
Subjects: | |
Online Access: | Get Fullteks DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02072naaaa2200301uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_67529 | ||
005 | 20210420 | ||
020 | |a intechopen.78497 | ||
020 | |a 9781838808556 | ||
020 | |a 9781838808549 | ||
020 | |a 9781838808563 | ||
024 | 7 | |a 10.5772/intechopen.78497 |c doi | |
041 | 0 | |a English | |
042 | |a dc | ||
072 | 7 | |a UT |2 bicssc | |
100 | 1 | |a Sen, Jaydip |4 edt | |
700 | 1 | |a Sen, Jaydip |4 oth | |
245 | 1 | 0 | |a Computer and Network Security |
260 | |b IntechOpen |c 2020 | ||
300 | |a 1 electronic resource (176 p.) | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/3.0/ |2 cc |4 https://creativecommons.org/licenses/by/3.0/ | ||
546 | |a English | ||
650 | 7 | |a Computer networking & communications |2 bicssc | |
653 | |a Network security | ||
856 | 4 | 0 | |a www.oapen.org |u https://mts.intechopen.com/storage/books/8368/authors_book/authors_book.pdf |7 0 |z Get Fullteks |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/67529 |7 0 |z DOAB: description of the publication |