Design and Analysis of Security Protocol for Communication /

"The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security p...

Full description

Bibliographic Details
Main Authors: Goyal, Dinesh, 1976-, editor 636853, Balamurigan, A., editor 636854, Peng, Sheng-Lung, editor 636855, Verma, O. P., (Telecommunications engineer), editor 636856
Format: text
Language:eng
Published: Hoboken, New Jersey : John Wiley & Sons, Inc. ; Salem, Massachusetts : Scrivener Publishing LLC, [202
Subjects:
_version_ 1796762733931134976
author Goyal, Dinesh, 1976-, editor 636853
Balamurigan, A., editor 636854
Peng, Sheng-Lung, editor 636855
Verma, O. P., (Telecommunications engineer), editor 636856
author_facet Goyal, Dinesh, 1976-, editor 636853
Balamurigan, A., editor 636854
Peng, Sheng-Lung, editor 636855
Verma, O. P., (Telecommunications engineer), editor 636856
author_sort Goyal, Dinesh, 1976-, editor 636853
collection OCEAN
description "The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any"--
first_indexed 2024-03-05T16:45:14Z
format text
id KOHA-OAI-TEST:593254
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T16:45:14Z
publishDate [202
publisher Hoboken, New Jersey : John Wiley & Sons, Inc. ; Salem, Massachusetts : Scrivener Publishing LLC,
record_format dspace
spelling KOHA-OAI-TEST:5932542021-11-16T04:15:23ZDesign and Analysis of Security Protocol for Communication / Goyal, Dinesh, 1976-, editor 636853 Balamurigan, A., editor 636854 Peng, Sheng-Lung, editor 636855 Verma, O. P., (Telecommunications engineer), editor 636856 textHoboken, New Jersey : John Wiley & Sons, Inc. ; Salem, Massachusetts : Scrivener Publishing LLC,[2020]©2020eng"The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any"--Includes bibliographical references and index.History and generations of security protocols / Bright Keswani, Poonam Keswani and Rakhi Purohit -- Evolution of information security algorithms / Anurag Jagetiya and C. Rama Krishna -- Philosophy of security by cryptostakes schemes / Hemant Kumar Saini -- Zero-share key management for secure communication across a channel / P. R. Mahalingam and K. A. Fasila -- Soft computing-based intrusion detection system with reduced false positive rate / Dharmendra G. Bhatti and Paresh V. Virparia -- Recursively paired arithmetic technique (RPAT): an FPGA-based block cipher simulation and its cryptanalysis / Rajdeep Chakraborty and J.K. Mandal -- Security protocol for multimedia streaming / N. Brindha, S. Deepa and S. Balamurugan -- Nature inspired approach for intrusion detection systems / Mohd Shahid Husain -- The socio-behavioral cipher technique / Harshit Bhatia, Rahul Johari and Kalpana Gupta -- An energy efficient scheme for real-time transmissions using mobile coordinated wireless sensor network / E. Udayakumar, S. Balamurugan and P. Vetrivelan -- Intrusion detection strategies in smart grid / P. Ponmurugan, C. Venkatesh, M. Divya Priyadharshini and S. Balamurugan -- Security protocol for cloud-based communication / R. Suganya and S. Sujatha -- Security protocols for mobile communications / Divya Priyadharshini M., Divya R., Ponmurugan P. and Balamurugan S. -- Use of machine learning in design of security protocols / M. Sundaresan and D. Boopathy -- Privacy and authentication on security protocol for mobile communications / Brajesh Kumar Gupta "Mewadev" -- Cloud communication: different security measures and cryptographic protocols for secure cloud computing / Anjana Sangwan."The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any"--PSZ_JBComputer networksComputer network protocolsURN:ISBN:9781119555643
spellingShingle Computer networks
Computer network protocols
Goyal, Dinesh, 1976-, editor 636853
Balamurigan, A., editor 636854
Peng, Sheng-Lung, editor 636855
Verma, O. P., (Telecommunications engineer), editor 636856
Design and Analysis of Security Protocol for Communication /
title Design and Analysis of Security Protocol for Communication /
title_full Design and Analysis of Security Protocol for Communication /
title_fullStr Design and Analysis of Security Protocol for Communication /
title_full_unstemmed Design and Analysis of Security Protocol for Communication /
title_short Design and Analysis of Security Protocol for Communication /
title_sort design and analysis of security protocol for communication
topic Computer networks
Computer network protocols
work_keys_str_mv AT goyaldinesh1976editor636853 designandanalysisofsecurityprotocolforcommunication
AT balamuriganaeditor636854 designandanalysisofsecurityprotocolforcommunication
AT pengshenglungeditor636855 designandanalysisofsecurityprotocolforcommunication
AT vermaoptelecommunicationsengineereditor636856 designandanalysisofsecurityprotocolforcommunication