๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Design and analysis of security protocol for communication

โœ Scribed by Balamurigan, A.; Goyal, Dinesh; Peng, Sheng-Lung; Verma, O. P


Publisher
John Wiley & Sons
Year
2020
Tongue
English
Leaves
358
Edition
First edition
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


"The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any"--

โœฆ Table of Contents


Cover......Page 1
Design and Analysis of SecurityProtocol for Communication......Page 4
ยฉ 2020......Page 5
Contents......Page 6
Preface......Page 14
1 History and Generations ofSecurity Protocols......Page 18
2 Evolution of InformationSecurity Algorithms......Page 46
3 Philosophy of Security byCryptostakes Schemes......Page 95
4 Zero-Share Key Management for SecureCommunication Across a Channel......Page 111
5 Soft Computing-Based Intrusion DetectionSystem With Reduced False Positive Rate......Page 125
6 Recursively Paired Arithmetic Technique(RPAT): An FPGA-Based Block CipherSimulation and Its Cryptanalysis......Page 156
7 Security Protocol forMultimedia Streaming......Page 170
8 Nature Inspired Approach forIntrusion Detection Systems......Page 186
9 The Socio-Behavioral Cipher Technique......Page 198
10 An Energy Efficient Scheme forReal-Time Transmissions Using MobileCoordinated Wireless Sensor Network......Page 225
11 Intrusion Detection Strategiesin Smart Grid......Page 236
12 Security Protocol for Cloud-Based Communication......Page 259
13 Security Protocols for MobileCommunications......Page 266
14 Use of Machine Learning inDesign of Security Protocols......Page 287
15 Privacy and Authentication on SecurityProtocol for Mobile Communications......Page 308
16 Cloud Communication: DifferentSecurity Measures and CryptographicProtocols for Secure Cloud Computing......Page 325
Index......Page 352

โœฆ Subjects


Computer network protocols;Computer networks--Security measures;Computer networks -- Security measures


๐Ÿ“œ SIMILAR VOLUMES


Secure Communicating Systems: Design, An
โœ Michael R. A. Huth ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Cambridge University Press ๐ŸŒ English

This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textboo

Design of Reservation Protocols for Mult
โœ Luca Delgrossi (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 1996 ๐Ÿ› Springer US ๐ŸŒ English

<p>The advent of multimedia technology is creating a number of new problems in the fields of computer and communication systems. Perhaps the most important of these problems in communication, and certainly the most interesting, is that of designing networks to carry multimedia traffic, including dig

Protocol Design and Analysis for Coopera
โœ Wei Song, Peijian Ju, A-Long Jin (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p>This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-ef

RFID Protocol Design, Optimization, and
โœ Alex X. Liu, Muhammad Shahzad, Xiulong Liu, Keqiu Li ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› The Institution of Engineering and Technology ๐ŸŒ English

<p><span>Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFIDs have been widely used in countless applications such as object tracking, 3D positioning, indoor localizat