Design and Analysis of Security Protocol for Communication

  • 5h 20m
  • Dinesh Goyal
  • John Wiley & Sons (US)
  • 2020

The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.

About the Authors

S. Balamurugan is the Director of Research and Development, Intelligent Research Consultancy Services(iRCS), Coimbatore, Tamilnadu, India. He also serves as R&D Consultant for many companies, startups, SMEs and MSMEs. He has published 40 books, 200+ articles in international journals/conferences as well as 27 patents. He is Editor-in-Chief of Information Science Letters and International Journal of Robotics and Artificial Intelligence. His research interests include artificial intelligence, IoT, big data analytics, cloud computing, industrial automation and wearable computing. He is a life member of IEEE, ACM, ISTE and CSI.

Dinesh Goyal received his PhD in 2014 on "Secure Video Transmission in a Cloud Network" and is now Dean of Academics as well as a member of the Dept. of Computer Science & Engineering, Suresh Gyan Vihar University, India. His research interests are related to information & network security, image processing, data analytics and cloud computing.

O. P. Verma is the Principal at GB Pant Govt. Engineering College, New Delhi, India. Previously, he was at the Department of Computer Science & Engineering, Delhi Technical University, New Delhi, India. His research interests include image processing, soft computing, machine learning, evolutionary computing.

Sheng-Lung Peng is a Professor of the Department of Computer Science and Information Engineering at National Dong Hwa University, Hualien, Taiwan. He received PhD degree in Computer Science from the National Tsing Hua University, Taiwan. He is an honorary Professor of Beijing Information Science and Technology University of China, a supervisor of the Chinese Information Literacy Association and of the Association of Algorithms and Computation Theory. His research interests are in designing and analyzing algorithms for bioinformatics, combinatorics, data mining, and networks. He has published more than 100 international conference and journal papers.

In this Book

  • History and Generations of Security Protocols
  • Evolution of Information Security Algorithms
  • Philosophy of Security by Cryptostakes Schemes
  • Zero-Share Key Management for Secure Communication across a Channel
  • Soft Computing-Based Intrusion Detection System with Reduced False Positive Rate
  • Recursively Paired Arithmetic Technique (RPAT)—An FPGA-Based Block Cipher Simulation and its Cryptanalysis
  • Security Protocol for Multimedia Streaming
  • Nature Inspired Approach for Intrusion Detection Systems
  • The Socio-Behavioral Cipher Technique
  • Intrusion Detection Strategies in Smart Grid
  • Security Protocol for Cloud-Based Communication
  • Security Protocols for Mobile Communications
  • Use of Machine Learning in Design of Security Protocols
  • Privacy and Authentication on Security Protocol for Mobile Communications
  • Cloud Communication—Different Security Measures and Cryptographic Protocols for Secure Cloud Computing
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE