Text
Design and analysis of security protocol for communication
The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.
Table of contents
1 History and Generations of Security Protocols
2 Evolution of Information Security Algorithms
3 Philosophy of Security by Cryptostakes Schemes
4 Zero-Share Key Management for Secure Communication Across a Channel
5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate
6 Recursively Paired Arithmetic Technique (RPAT): An FPGA-Based Block Cipher Simulation and Its Cryptanalysis
7 Security Protocol for Multimedia Streaming
8 Nature Inspired Approach for Intrusion Detection Systems
9 The Socio-Behavioral Cipher Technique
10 An energy efficient scheme for real-time transmissions using mobile coordinated wireless sensor network
11 Intrusion Detection Strategies in Smart Grid
12 Security Protocol for Cloud-Based Communication
13 Security Protocols for Mobile Communications
14 Use of Machine Learning in Design of Security Protocols
15 Privacy and Authentication on Security Protocol for Mobile Communications
16 Cloud Communication: Different Security Measures and Cryptographic Protocols for Secure Cloud Computing
Index
No other version available