Computer and Network Security / / edited by Jaydip Sen, Sidra Mehtab.
In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity...
Saved in:
TeilnehmendeR: | |
---|---|
Place / Publishing House: | London : : IntechOpen,, 2020. ©2020 |
Year of Publication: | 2020 |
Language: | English |
Physical Description: | 1 online resource (178 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02092nam a2200349 i 4500 | ||
---|---|---|---|
001 | 993603229304498 | ||
005 | 20230629085356.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 230629s2020 enk ob 001 0 eng d | ||
035 | |a (CKB)5400000000042589 | ||
035 | |a (NjHacI)995400000000042589 | ||
035 | |a (EXLCZ)995400000000042589 | ||
040 | |a NjHacI |b eng |e rda |c NjHacl | ||
050 | 4 | |a QA76.9.A25 |b .C667 2020 | |
082 | 0 | 4 | |a 005.8 |2 23 |
245 | 0 | 0 | |a Computer and Network Security / |c edited by Jaydip Sen, Sidra Mehtab. |
264 | 1 | |a London : |b IntechOpen, |c 2020. | |
264 | 4 | |c ©2020 | |
300 | |a 1 online resource (178 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | |a Description based on: online resource; title from PDF title page (IntechOpen, viewed June 28, 2023). | ||
520 | |a In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning. | ||
504 | |a Includes bibliographical references and index. | ||
650 | 0 | |a Computer security. | |
776 | |z 1-83880-856-6 | ||
700 | 1 | |a Mehtab, Sidra, |e editor. | |
700 | 1 | |a Sen, Jaydip, |e editor. | |
906 | |a BOOK | ||
ADM | |b 2023-07-08 12:09:20 Europe/Vienna |f system |c marc21 |a 2022-04-04 09:22:53 Europe/Vienna |g false | ||
AVE | |i DOAB Directory of Open Access Books |P DOAB Directory of Open Access Books |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5345717200004498&Force_direct=true |Z 5345717200004498 |b Available |8 5345717200004498 |