Open access peer-reviewed Edited Volume

Computer and Network Security

Edited by Jaydip Sen

Praxis Business School

In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning.

Read more >Order hardcopy
IntechOpen
Computer and Network SecurityEdited by Jaydip Sen

Published: June 10th 2020

DOI: 10.5772/intechopen.78497

ISBN: 978-1-83880-855-6

Print ISBN: 978-1-83880-854-9

eBook (PDF) ISBN: 978-1-83880-856-3

Copyright year: 2020

Books open for chapter submissions

4738 Total Chapter Downloads

1 Crossref Citations

3 Dimensions Citations

chaptersDownloads

Open access peer-reviewed

1. Introductory Chapter: Machine Learning in Misuse and Anomaly Detection

By Jaydip Sen and Sidra Mehtab

411

Open access peer-reviewed

2. A New Cross-Layer FPGA-Based Security Scheme for Wireless Networks

By Michael Ekonde Sone

482

Open access peer-reviewed

3. Anomaly-Based Intrusion Detection System

By Veeramreddy Jyothsna and Koneti Munivara Prasad

1157

Open access peer-reviewed

4. Security in Wireless Local Area Networks (WLANs)

By Rajeev Singh and Teek Parval Sharma

475

Open access peer-reviewed

5. Analysis of Network Protocols: The Ability of Concealing the Information

By Anton Noskov

387

Open access peer-reviewed

6. Multifactor Authentication Methods: A Framework for Their Comparison and Selection

By Ignacio Velásquez, Angélica Caro and Alfonso Rodríguez

405

Open access peer-reviewed

7. Secure Communication Using Cryptography and Covert Channel

By Tamer S.A. Fatayer

319

Open access peer-reviewed

8. High-Speed Area-Efficient Implementation of AES Algorithm on Reconfigurable Platform

By Altaf O. Mulani and Pradeep B. Mane

534

Open access peer-reviewed

9. Hybrid Approaches to Block Cipher

By Roshan Chitrakar, Roshan Bhusal and Prajwol Maharjan

572

Edited Volume and chapters are indexed in

  • Worldcat
  • OpenAIRE
  • Google Scholar
  • AZ ebsco
  • Base
  • CNKI

Order a hardcopy of the Edited Volume

Free shipping with DHL Express

Hardcover (ex. VAT)£119

Order now

Residents of European Union countries need to add a Book Value-Added Tax of 5%. Institutions and companies, registered as VAT taxable entities in their own EU member state, will not pay VAT by providing IntechOpen with their VAT registration number. This is made possible by the EU reverse charge method.

Special discount for IntechOpen contributors

All IntechOpen contributors are offered special discounts starting at 40% OFF available through your personal dashboard

Login and purchase