Applied Cryptography and Network Securtiy Front Cover

Applied Cryptography and Network Securtiy

  • Length: 376 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2014
  • ISBN-10: 9535102184
  • ISBN-13: 9789535102182
Description

The purpose of this book is to present some of the critical security challenges in today’s communication networks and computing and to provide insights to possible mechanisms to defend against attacks. With this objective, the book provides a collection of research work in the field of cryptography and network security by some experts in these areas.

The book contains 16 chapters which are divided into three parts.

The chapters in Part 1 of the book largely deal with security and privacy issues in computing and communication networks.

The Part 2 includes chapters which are related to the field of quantum cryptography.

The chapters dealing with the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography are included in the Part 3 of the book.

Table of Contents

Part 1: Security and Privacy in Computing and Communication Networks
Chapter 1 Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks
Chapter 2 Security from Location
Chapter 3 Anonymous Authentication Protocols for Vehicular Ad Hoc Networks: An Overview
Chapter 4 Security Approaches for Information-Centric Networking
Chapter 5 Secure Platform Over Wireless Sensor Networks
Chapter 6 Privacy-Secure Digital Watermarking for Fair Content Trading
Chapter 7 NLM-MAC: Lightweight Secure Data Communication Framework Using Authenticated Encryption in Wireless Sensor Networks
Chapter 8 Key Establishment Protocol for Wireless Sensor Networks

Part 2: Quantum Cryptography
Chapter 9 Quantum Cryptography
Chapter 10 Quantum Key Management
Chapter 11 Securing a Telecom Services Using Quantum Cryptographic Mechanisms

Part 3: Evolutionary Concepts and Techniques in Security
Chapter 12 Notions of Chaotic Cryptography: Sketch of a Chaos Based Cryptosystem
Chapter 13 Chaotic Electronic Circuits in Cryptography
Chapter 14 An En/Decryption Machine Based on Statistical Physics
Chapter 15 Modern Technologies Used for Security of Software Applications
Chapter 16 Research on DNA Cryptography

To access the link, solve the captcha.
Subscribe