Open access peer-reviewed Edited Volume

Advances in Security in Computing and Communications

Edited by Jaydip Sen

Praxis Business School, Kolkata, INDIA

In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.

Read more >Order hardcopy
IntechOpen
Advances in Security in Computing and CommunicationsEdited by Jaydip Sen

Published: July 19th 2017

DOI: 10.5772/65228

ISBN: 978-953-51-3346-9

Print ISBN: 978-953-51-3345-2

Copyright year: 2017

Books open for chapter submissions

3356 Total Chapter Downloads

2 Dimensions Citations

chaptersDownloads

Open access peer-reviewed

1. Proactive Detection of Unknown Binary Executable Malware

By Eric Filiol

430

Open access peer-reviewed

2. Cloud Cyber Security: Finding an Effective Approach with Unikernels

By Bob Duncan, Andreas Happe and Alfred Bratterud

424

Open access peer-reviewed

3. Machine Learning in Application Security

By Nilaykumar Kiran Sangani and Haroot Zarger

708

Open access peer-reviewed

4. Advanced Access Control to Information Systems: Requirements, Compliance and Future Directives

By Faouzi Jaidi

396

Open access peer-reviewed

5. Protection of Relational Databases by Means of Watermarking: Recent Advances and Challenges

By Javier Franco Contreras and Gouenou Coatrieux

471

Open access peer-reviewed

6. Implementing Secure Key Coordination Scheme for Line Topology Wireless Sensor Networks

By Walid Elgenaidi, Thomas Newe, Eoin O’Connel, Muftah Fraifer, Avijit Mathur, Daniel Toal and Gerard Dooly

299

Open access peer-reviewed

7. Energy-Secrecy Trade-offs for Wireless Communication

By Ruolin Zhang

307

Open access peer-reviewed

8. Implementation of a Multimaps Chaos-Based Encryption Software for EEG Signals

By Chin-Feng Lin and Che-Wei Liu

321

Edited Volume and chapters are indexed in

  • Worldcat
  • OpenAIRE
  • Google Scholar
  • AZ ebsco
  • Base
  • CNKI
  • IET Inspec

Order a hardcopy of the Edited Volume

Free shipping with DHL Express

Hardcover (ex. VAT)£140

Order now

Residents of European Union countries need to add a Book Value-Added Tax of 5%. Institutions and companies, registered as VAT taxable entities in their own EU member state, will not pay VAT by providing IntechOpen with their VAT registration number. This is made possible by the EU reverse charge method.

Special discount for IntechOpen contributors

All IntechOpen contributors are offered special discounts starting at 40% OFF available through your personal dashboard

Login and purchase