Explore

Computer and Network Security
Jaydip Sen (editor)
2020
0 Ungluers have
Faved this Work
Login to Fave
In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning.
This book is included in DOAB.
Why read this book? Have your say.
You must be logged in to comment.
Rights Information
Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.Downloads
This work has been downloaded 65 times via unglue.it ebook links.
- 65 - pdf (CC BY) at mts.intechopen.com.
Keywords
- Computer networking & communications
- Computing & information technology
- network security
- thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications
Links
DOI: 10.5772/intechopen.78497Editions
