Advances in Security in Computing and Communications / / edited by Jaydip Sen.
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by design...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Rijeka : : IntechOpen,, 2017. ©2017 |
Year of Publication: | 2017 |
Language: | English |
Physical Description: | 1 online resource (192 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993546785104498 |
---|---|
ctrlnum |
(CKB)4100000001586807 (NjHacI)994100000001586807 (oapen)https://directory.doabooks.org/handle/20.500.12854/40349 (EXLCZ)994100000001586807 |
collection |
bib_alma |
record_format |
marc |
spelling |
Jaydip Sen auth Advances in Security in Computing and Communications / edited by Jaydip Sen. IntechOpen 2017 Rijeka : IntechOpen, 2017. ©2017 1 online resource (192 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on publisher supplied metadata and other sources. Open access Unrestricted online access star In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities. English Physical sciences. Information technology. Physical Sciences Engineering and Technology Communications and Security Computer and Information Science Information Security 953-51-3345-4 Sen, Jaydip, editor. |
language |
English |
format |
eBook |
author |
Jaydip Sen |
spellingShingle |
Jaydip Sen Advances in Security in Computing and Communications / |
author_facet |
Jaydip Sen Sen, Jaydip, |
author_variant |
j s js |
author2 |
Sen, Jaydip, |
author2_variant |
j s js |
author2_role |
TeilnehmendeR |
author_sort |
Jaydip Sen |
title |
Advances in Security in Computing and Communications / |
title_full |
Advances in Security in Computing and Communications / edited by Jaydip Sen. |
title_fullStr |
Advances in Security in Computing and Communications / edited by Jaydip Sen. |
title_full_unstemmed |
Advances in Security in Computing and Communications / edited by Jaydip Sen. |
title_auth |
Advances in Security in Computing and Communications / |
title_new |
Advances in Security in Computing and Communications / |
title_sort |
advances in security in computing and communications / |
publisher |
IntechOpen IntechOpen, |
publishDate |
2017 |
physical |
1 online resource (192 pages) |
isbn |
953-51-4733-1 953-51-3346-2 953-51-3345-4 |
callnumber-first |
Q - Science |
callnumber-subject |
Q - General Science |
callnumber-label |
Q161 |
callnumber-sort |
Q 3161.2 A383 42017 |
illustrated |
Not Illustrated |
dewey-hundreds |
500 - Science |
dewey-tens |
500 - Science |
dewey-ones |
500 - Natural sciences & mathematics |
dewey-full |
500.2 |
dewey-sort |
3500.2 |
dewey-raw |
500.2 |
dewey-search |
500.2 |
work_keys_str_mv |
AT jaydipsen advancesinsecurityincomputingandcommunications AT senjaydip advancesinsecurityincomputingandcommunications |
status_str |
n |
ids_txt_mv |
(CKB)4100000001586807 (NjHacI)994100000001586807 (oapen)https://directory.doabooks.org/handle/20.500.12854/40349 (EXLCZ)994100000001586807 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Advances in Security in Computing and Communications / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1796652212175241216 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02483nam a2200469 i 4500</leader><controlfield tag="001">993546785104498</controlfield><controlfield tag="005">20230823205312.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr#|||||||||||</controlfield><controlfield tag="008">221014s2017 ci o 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">953-51-4733-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">953-51-3346-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000001586807</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994100000001586807</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/40349</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000001586807</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">Q161.2</subfield><subfield code="b">.A383 2017</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">500.2</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jaydip Sen</subfield><subfield code="4">auth</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Advances in Security in Computing and Communications /</subfield><subfield code="c">edited by Jaydip Sen.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">IntechOpen</subfield><subfield code="c">2017</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rijeka :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (192 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Open access</subfield><subfield code="f">Unrestricted online access</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Physical sciences.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Information technology.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Physical Sciences</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Engineering and Technology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Communications and Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer and Information Science</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information Security</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">953-51-3345-4</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sen, Jaydip,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-08-24 04:15:24 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2018-01-13 17:16:47 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5351652730004498&Force_direct=true</subfield><subfield code="Z">5351652730004498</subfield><subfield code="b">Available</subfield><subfield code="8">5351652730004498</subfield></datafield></record></collection> |