About the book
With this rapid transformation of the computing and communication world, information-system security has moved from a largely self-contained bounded environment interacting with a generally known and disciplined user community to a worldwide scope with a body of users that may not be known and are not necessarily trusted. Importantly, security control now must deal with circumstances over which there is largely no control or expectation of avoiding their impact. Computer security, as it has evolved, shares a similarity with liability assurance: they each face a threat environment that is known in a very general way and can face attacks over a broad spectrum of sources. However, the exact details or even time or certainty of an attack are unknown until an incident occurs.
The purpose of this book is to discuss some of the critical security challenges in today’s computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches to cryptography and other security solutions. With this objective, the book invites contributions from researchers in the field of cryptography and its applications in network security. Some illustrative topics of interest (but not limited to) are cryptography algorithms, authentication, authorization, integrity, confidentiality, privacy, security in wireless networks, security in wireless local area networks, wireless sensor networks, wireless ad hoc networks, vehicular ad hoc networks, security and privacy in the Internet of Things. Privacy of information, Blockchains, and Machine Learning in Security are three additional topics that the book will also deal with.