Design and Analysis of Security Protocol for Communication /
"The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security p...
Main Authors: | , , , |
---|---|
Format: | text |
Language: | eng |
Published: |
Hoboken, New Jersey : John Wiley & Sons, Inc. ; Salem, Massachusetts : Scrivener Publishing LLC,
[202
|
Subjects: |
_version_ | 1796762733931134976 |
---|---|
author | Goyal, Dinesh, 1976-, editor 636853 Balamurigan, A., editor 636854 Peng, Sheng-Lung, editor 636855 Verma, O. P., (Telecommunications engineer), editor 636856 |
author_facet | Goyal, Dinesh, 1976-, editor 636853 Balamurigan, A., editor 636854 Peng, Sheng-Lung, editor 636855 Verma, O. P., (Telecommunications engineer), editor 636856 |
author_sort | Goyal, Dinesh, 1976-, editor 636853 |
collection | OCEAN |
description | "The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any"-- |
first_indexed | 2024-03-05T16:45:14Z |
format | text |
id | KOHA-OAI-TEST:593254 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T16:45:14Z |
publishDate | [202 |
publisher | Hoboken, New Jersey : John Wiley & Sons, Inc. ; Salem, Massachusetts : Scrivener Publishing LLC, |
record_format | dspace |
spelling | KOHA-OAI-TEST:5932542021-11-16T04:15:23ZDesign and Analysis of Security Protocol for Communication / Goyal, Dinesh, 1976-, editor 636853 Balamurigan, A., editor 636854 Peng, Sheng-Lung, editor 636855 Verma, O. P., (Telecommunications engineer), editor 636856 textHoboken, New Jersey : John Wiley & Sons, Inc. ; Salem, Massachusetts : Scrivener Publishing LLC,[2020]©2020eng"The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any"--Includes bibliographical references and index.History and generations of security protocols / Bright Keswani, Poonam Keswani and Rakhi Purohit -- Evolution of information security algorithms / Anurag Jagetiya and C. Rama Krishna -- Philosophy of security by cryptostakes schemes / Hemant Kumar Saini -- Zero-share key management for secure communication across a channel / P. R. Mahalingam and K. A. Fasila -- Soft computing-based intrusion detection system with reduced false positive rate / Dharmendra G. Bhatti and Paresh V. Virparia -- Recursively paired arithmetic technique (RPAT): an FPGA-based block cipher simulation and its cryptanalysis / Rajdeep Chakraborty and J.K. Mandal -- Security protocol for multimedia streaming / N. Brindha, S. Deepa and S. Balamurugan -- Nature inspired approach for intrusion detection systems / Mohd Shahid Husain -- The socio-behavioral cipher technique / Harshit Bhatia, Rahul Johari and Kalpana Gupta -- An energy efficient scheme for real-time transmissions using mobile coordinated wireless sensor network / E. Udayakumar, S. Balamurugan and P. Vetrivelan -- Intrusion detection strategies in smart grid / P. Ponmurugan, C. Venkatesh, M. Divya Priyadharshini and S. Balamurugan -- Security protocol for cloud-based communication / R. Suganya and S. Sujatha -- Security protocols for mobile communications / Divya Priyadharshini M., Divya R., Ponmurugan P. and Balamurugan S. -- Use of machine learning in design of security protocols / M. Sundaresan and D. Boopathy -- Privacy and authentication on security protocol for mobile communications / Brajesh Kumar Gupta "Mewadev" -- Cloud communication: different security measures and cryptographic protocols for secure cloud computing / Anjana Sangwan."The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any"--PSZ_JBComputer networksComputer network protocolsURN:ISBN:9781119555643 |
spellingShingle | Computer networks Computer network protocols Goyal, Dinesh, 1976-, editor 636853 Balamurigan, A., editor 636854 Peng, Sheng-Lung, editor 636855 Verma, O. P., (Telecommunications engineer), editor 636856 Design and Analysis of Security Protocol for Communication / |
title | Design and Analysis of Security Protocol for Communication / |
title_full | Design and Analysis of Security Protocol for Communication / |
title_fullStr | Design and Analysis of Security Protocol for Communication / |
title_full_unstemmed | Design and Analysis of Security Protocol for Communication / |
title_short | Design and Analysis of Security Protocol for Communication / |
title_sort | design and analysis of security protocol for communication |
topic | Computer networks Computer network protocols |
work_keys_str_mv | AT goyaldinesh1976editor636853 designandanalysisofsecurityprotocolforcommunication AT balamuriganaeditor636854 designandanalysisofsecurityprotocolforcommunication AT pengshenglungeditor636855 designandanalysisofsecurityprotocolforcommunication AT vermaoptelecommunicationsengineereditor636856 designandanalysisofsecurityprotocolforcommunication |