Computer and Network Security / / edited by Jaydip Sen, Sidra Mehtab.

In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:London : : IntechOpen,, 2020.
©2020
Year of Publication:2020
Language:English
Physical Description:1 online resource (178 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02092nam a2200349 i 4500
001 993603229304498
005 20230629085356.0
006 m o d
007 cr |||||||||||
008 230629s2020 enk ob 001 0 eng d
035 |a (CKB)5400000000042589 
035 |a (NjHacI)995400000000042589 
035 |a (EXLCZ)995400000000042589 
040 |a NjHacI  |b eng  |e rda  |c NjHacl 
050 4 |a QA76.9.A25  |b .C667 2020 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Computer and Network Security /  |c edited by Jaydip Sen, Sidra Mehtab. 
264 1 |a London :  |b IntechOpen,  |c 2020. 
264 4 |c ©2020 
300 |a 1 online resource (178 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 |a Description based on: online resource; title from PDF title page (IntechOpen, viewed June 28, 2023). 
520 |a In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning. 
504 |a Includes bibliographical references and index. 
650 0 |a Computer security. 
776 |z 1-83880-856-6 
700 1 |a Mehtab, Sidra,  |e editor. 
700 1 |a Sen, Jaydip,  |e editor. 
906 |a BOOK 
ADM |b 2023-07-08 12:09:20 Europe/Vienna  |f system  |c marc21  |a 2022-04-04 09:22:53 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5345717200004498&Force_direct=true  |Z 5345717200004498  |b Available  |8 5345717200004498