Open access peer-reviewed Edited Volume

Computer and Network Security

Edited by Jaydip Sen

Praxis Business School

In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning.

Read more >Order hardcopy
IntechOpen
Computer and Network SecurityEdited by Jaydip Sen

Published: June 10th 2020

DOI: 10.5772/intechopen.78497

ISBN: 978-1-83880-855-6

Print ISBN: 978-1-83880-854-9

eBook (PDF) ISBN: 978-1-83880-856-3

Copyright year: 2020

Books open for chapter submissions

1920 Total Chapter Downloads

1 Dimensions Citations

chaptersDownloads

Open access peer-reviewed

1. Introductory Chapter: Machine Learning in Misuse and Anomaly Detection

By Jaydip Sen and Sidra Mehtab

52

Open access peer-reviewed

2. A New Cross-Layer FPGA-Based Security Scheme for Wireless Networks

By Michael Ekonde Sone

249

Open access peer-reviewed

3. Anomaly-Based Intrusion Detection System

By Veeramreddy Jyothsna and Koneti Munivara Prasad

605

Open access peer-reviewed

4. Security in Wireless Local Area Networks (WLANs)

By Rajeev Singh and Teek Parval Sharma

199

Open access peer-reviewed

5. Analysis of Network Protocols: The Ability of Concealing the Information

By Anton Noskov

80

Open access peer-reviewed

6. Multifactor Authentication Methods: A Framework for Their Comparison and Selection

By Ignacio Velásquez, Angélica Caro and Alfonso Rodríguez

148

Open access peer-reviewed

7. Secure Communication Using Cryptography and Covert Channel

By Tamer S.A. Fatayer

48

Open access peer-reviewed

8. High-Speed Area-Efficient Implementation of AES Algorithm on Reconfigurable Platform

By Altaf O. Mulani and Pradeep B. Mane

229

Open access peer-reviewed

9. Hybrid Approaches to Block Cipher

By Roshan Chitrakar, Roshan Bhusal and Prajwol Maharjan

312

Edited Volume and chapters are indexed in

  • Worldcat
  • OpenAIRE
  • Google Scholar
  • AZ ebsco
  • Base
  • CNKI

Order a hardcopy of the Edited Volume

Free shipping with DHL Express

Hardcover (ex. VAT)£140

Order now

Residents of European Union countries need to add a Book Value-Added Tax of 5%. Institutions and companies, registered as VAT taxable entities in their own EU member state, will not pay VAT by providing IntechOpen with their VAT registration number. This is made possible by the EU reverse charge method.

Special discount for IntechOpen contributors

All IntechOpen contributors are offered special discounts starting at 40% OFF available through your personal dashboard

Login and purchase