Open access peer-reviewed Edited Volume

Advances in Security in Computing and Communications

In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.

Read more >Order hardcopy
Advances in Security in Computing and CommunicationsEdited by Jaydip Sen

Published: July 19th 2017

DOI: 10.5772/65228

ISBN: 978-953-51-3346-9

Print ISBN: 978-953-51-3345-2

eBook (PDF) ISBN: 978-953-51-4733-6

Copyright year: 2017

Books open for chapter submissions

12009 Total Chapter Downloads

5 Crossref Citations

2 Web of Science Citations

11 Dimensions Citations


Open access peer-reviewed

1. Proactive Detection of Unknown Binary Executable Malware

By Eric Filiol


Open access peer-reviewed

2. Cloud Cyber Security: Finding an Effective Approach with Unikernels

By Bob Duncan, Andreas Happe and Alfred Bratterud


Open access peer-reviewed

3. Machine Learning in Application Security

By Nilaykumar Kiran Sangani and Haroot Zarger


Open access peer-reviewed

4. Advanced Access Control to Information Systems: Requirements, Compliance and Future Directives

By Faouzi Jaidi


Open access peer-reviewed

5. Protection of Relational Databases by Means of Watermarking: Recent Advances and Challenges

By Javier Franco Contreras and Gouenou Coatrieux


Open access peer-reviewed

6. Implementing Secure Key Coordination Scheme for Line Topology Wireless Sensor Networks

By Walid Elgenaidi, Thomas Newe, Eoin O’Connel, Muftah Fraifer, Avijit Mathur, Daniel Toal and Gerard Dooly


Open access peer-reviewed

7. Energy-Secrecy Trade-offs for Wireless Communication

By Ruolin Zhang


Open access peer-reviewed

8. Implementation of a Multimaps Chaos-Based Encryption Software for EEG Signals

By Chin-Feng Lin and Che-Wei Liu


Edited Volume and chapters are indexed in

  • Worldcat
  • OpenAIRE
  • Google Scholar
  • AZ ebsco
  • Base
  • CNKI

Order a hardcopy of the Edited Volume

Free shipping with DHL Express

Hardcover (ex. VAT)£119

Order now

Residents of European Union countries need to add a Book Value-Added Tax Rate based on their country of residence. Institutions and companies, registered as VAT taxable entities in their own EU member state, will not pay VAT by providing IntechOpen with their VAT registration number. This is made possible by the EU reverse charge method.

Special discount for IntechOpen contributors

All IntechOpen contributors are offered special discounts starting at 40% OFF available through your personal dashboard

Login and purchase