"The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protoc
Design and Analysis of Security Protocol for Communication
โ Scribed by Dinesh Goyal; S. Balamurugan; Sheng-Lung Peng; O. P. Verma
- Publisher
- Wiley-Scrivener
- Year
- 2020
- Tongue
- English
- Category
- Library
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textboo
<p>The advent of multimedia technology is creating a number of new problems in the fields of computer and communication systems. Perhaps the most important of these problems in communication, and certainly the most interesting, is that of designing networks to carry multimedia traffic, including dig
<p>This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-ef
<p><span>Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFIDs have been widely used in countless applications such as object tracking, 3D positioning, indoor localizat