Рубрики

colors

What two colors make the color red


Design and Analysis of Security Protocol for Communication

The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.

Chapter 1 History and Generations of Security Protocols
Chapter 2 Evolution of Information Security Algorithms
Chapter 3 Philosophy of Security by Cryptostakes Schemes
Chapter 4 ZeroShare Key Management for Secure Communication Across a Channel
Chapter 5 Soft ComputingBased Intrusion Detection System With Reduced False Positive Rate
An FPGABased Block Cipher Simulation and Its Cryptanalysis
Chapter 7 Security Protocol for Multimedia Streaming
Chapter 8 Nature Inspired Approach for Intrusion Detection Systems
Chapter 10 Intrusion Detection Strategies in Smart Grid
Chapter 11 Security Protocol for CloudBased Communication
Chapter 12 Security Protocols for Mobile Communications
Chapter 13 Use of Machine Learning in Design of Security Protocols
Chapter 14 Privacy and Authentication on Security Protocol for Mobile Communications
Different Security Measures and Cryptographic Protocols for Secure Cloud Computing
EULA

Больше
Chapter 9 The SocioBehavioral Cipher Technique

Меньше

Другие издания – Просмотреть все

S. Balamurugan is the Director of Research and Development, Intelligent Research Consultancy Services(iRCS), Coimbatore, Tamilnadu, India. He also serves as R&D Consultant for many companies, startups, SMEs and MSMEs. He has published 40 books, 200+ articles in international journals/conferences as well as 27 patents. He is Editor-in-Chief of Information Science Letters and International Journal of Robotics and Artificial Intelligence. His research interests include artificial intelligence, IoT, big data analytics, cloud computing, industrial automation and wearable computing. He is a life member of IEEE, ACM, ISTE and CSI.

Dinesh Goyal received his PhD in 2014 on “Secure Video Transmission in a Cloud Network” and is now Dean of Academics as well as a member of the Dept. of Computer Science & Engineering, Suresh Gyan Vihar University, India. His research interests are related to information & network security, image processing, data analytics and cloud computing.

O. P. Verma is the Principal at GB Pant Govt. Engineering College, New Delhi, India. Previously, he was at the Department of Computer Science & Engineering, Delhi Technical University, New Delhi, India. His research interests include image processing, soft computing, machine learning, evolutionary computing.

Sheng-Lung Peng is a Professor of the Department of Computer Science and Information Engineering at National Dong Hwa University, Hualien, Taiwan. He received PhD degree in Computer Science from the National Tsing Hua University, Taiwan. He is an honorary Professor of Beijing Information Science and Technology University of China, a supervisor of the Chinese Information Literacy Association and of the Association of Algorithms and Computation Theory. His research interests are in designing and analyzing algorithms for bioinformatics, combinatorics, data mining, and networks. He has published more than 100 international conference and journal papers.




Colin Wynn
the authorColin Wynn

Leave a Reply