Open access peer-reviewed Edited Volume

Recent Advances in Cryptography and Network Security

Edited by Pinaki Mitra

Indian Institute of Technology

In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.

Read more >Order hardcopy
Recent Advances in Cryptography and Network SecurityEdited by Pinaki Mitra

Published: October 31st 2018

DOI: 10.5772/intechopen.71917

ISBN: 978-1-78984-346-0

Print ISBN: 978-1-78984-345-3

eBook (PDF) ISBN: 978-1-83881-628-5

Copyright year: 2018

Books open for chapter submissions

2871 Total Chapter Downloads

4 Crossref Citations

2 Web of Science Citations

6 Dimensions Citations


Open access peer-reviewed

1. Introductory Chapter: Recent Advances in Cryptography and Network Security

By Pinaki Mitra


Open access peer-reviewed

2. A New Approximation Method for Constant Weight Coding and Its Hardware Implementation

By Jingwei Hu and Ray C.C. Cheung


Open access peer-reviewed

3. Protocol for Multiple Black Hole Attack Avoidance in Mobile Ad Hoc Networks

By Rushdi A. Hamamreh


Open access peer-reviewed

4. A Survey of Machine Learning Techniques for Behavioral-Based Biometric User Authentication

By Nurul Afnan Mahadi, Mohamad Afendee Mohamed, Amirul Ihsan Mohamad, Mokhairi Makhtar, Mohd Fadzil Abdul Kadir and Mustafa Mamat


Edited Volume and chapters are indexed in

  • Worldcat
  • OpenAIRE
  • Google Scholar
  • AZ ebsco
  • Base
  • CNKI

Order a hardcopy of the Edited Volume

Free shipping with DHL Express

Hardcover (ex. VAT)£100

Order now

Residents of European Union countries need to add a Book Value-Added Tax of 5%. Institutions and companies, registered as VAT taxable entities in their own EU member state, will not pay VAT by providing IntechOpen with their VAT registration number. This is made possible by the EU reverse charge method.

Special discount for IntechOpen contributors

All IntechOpen contributors are offered special discounts starting at 40% OFF available through your personal dashboard

Login and purchase