Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Design and analysis of security protocol for communication
Bookmark Share

Text

Design and analysis of security protocol for communication

Goyal, Dinesh - Personal Name; Balamurungan, S - Personal Name; Lung Peng, Sheng - Personal Name; Verma, O. P. - Personal Name;

The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.

Table of contents
1 History and Generations of Security Protocols
2 Evolution of Information Security Algorithms
3 Philosophy of Security by Cryptostakes Schemes
4 Zero-Share Key Management for Secure Communication Across a Channel
5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate
6 Recursively Paired Arithmetic Technique (RPAT): An FPGA-Based Block Cipher Simulation and Its Cryptanalysis
7 Security Protocol for Multimedia Streaming
8 Nature Inspired Approach for Intrusion Detection Systems
9 The Socio-Behavioral Cipher Technique
10 An energy efficient scheme for real-time transmissions using mobile coordinated wireless sensor network
11 Intrusion Detection Strategies in Smart Grid
12 Security Protocol for Cloud-Based Communication
13 Security Protocols for Mobile Communications
14 Use of Machine Learning in Design of Security Protocols
15 Privacy and Authentication on Security Protocol for Mobile Communications
16 Cloud Communication: Different Security Measures and Cryptographic Protocols for Secure Cloud Computing
Index


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8 GOY d
b0002292
Available
Detail Information
Series Title
--
Call Number
005.8 GOY d
Publisher
Hoboken : Wiley., 2020
Collation
xvi, 351 hlm.; ilus.; 23 cm
Language
English
ISBN/ISSN
9781119555643
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
Computer Communication Networks.
Computers Security
Specific Detail Info
--
Statement of Responsibility
Dinesh Goyal. dkk
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?