Design and Analysis of Security Protocol for Communication 1st edition by Dinesh Goyal, Balamurugan, ShengLung Peng – Ebook PDF Instant Download/Delivery: 1119555744, 9781119555742
Full download Design and Analysis of Security Protocol for Communication 1st edition after payment

Product details:
ISBN 10: 1119555744
ISBN 13: 9781119555742
Author: Dinesh Goyal, Balamurugan, ShengLung Peng
Research scholars working in the area of security protocols for communication will find this book as a handy reference guide. Software and hardware engineers, who work specifically in the area of communication protocols, will find this book a useful resource as all the security protocols it covers are compared and compiled at one platform, thus ensuring their proper utilization.
In addition, gradate and post-graduate students will find this book an ideal guide in courses on Electronics and Communication Engineering, Telecommunication Engineering, Network Engineering, Computer Science and Engineering and Information Technology.
Design and Analysis of Security Protocol for Communication 1st Table of contents:
1 History and Generations of Security Protocols
1.1 Introduction
1.2 Network Security
1.3 Historical Background of Network Security and Network Timeline
1.4 Internet Architecture and Security Aspects
1.5 Different Aspects of Security of the Network
1.6 Evolution of Security Protocols for Network
1.7 Network Security Protocols
1.8 Current Evolution of Red Security
1.9 Future Security Trends
References
2 Evolution of Information Security Algorithms
2.1 Introduction to Conventional Encryption
2.2 Classical Encryption Techniques
2.3 Evolutions of Modern Security Techniques
2.4 Conclusion
References
Practice Set
APPENDIX A: Tables of Data Encryption Standard
3 Philosophy of Security by Cryptostakes Schemes
3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography)
3.2 RSA Algorithm
3.3 Security Analysis of RSA
3.4 Exponentiation in Modular Arithmetic
3.5 Distribution of Public Keys
3.6 Distribution of Secret Keys Using Public Key Cryptosystems
3.7 Discrete Logarithms
3.8 Diffie–Hellman Key Exchange
3.9 Review Exercise
References
4 Zero-Share Key Management for Secure Communication Across a Channel
4.1 Introduction
4.2 Background
4.3 Zero-Share Key Management System
4.4 Simulation
4.5 Complexity and Analysis
4.6 Conclusion and Future Trends
References
5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate
5.1 Introduction
5.2 Existing Technology and Its Review
5.3 Research Design
5.4 Results With Implications
5.5 Future Research and Conclusion
References
6 Recursively Paired Arithmetic Technique (RPAT): An FPGA-Based Block Cipher Simulation and Its Cryptanalysis
6.1 Introduction
6.2 Recursively Paired Arithmetic Technique (RPAT)
6.3 Implementation and Simulation
6.4 Cryptanalysis
6.5 Simulation-Based Results
6.6 Applications
6.7 Conclusion
Acknowledgment
References
7 Security Protocol for Multimedia Streaming
7.1 Introduction
7.2 Existing Technology and Its Review
7.3 Methodology and Research Design
7.4 Findings
7.5 Future Research and Conclusion
References
8 Nature Inspired Approach for Intrusion Detection Systems
8.1 Introduction
8.2 Approaches Used for Intrusion Detection Systems
8.3 Intrusion Detection Tools
8.4 Use of Machine Learning to Build Dynamic IDS/IPS
8.5 Bio-Inspired Approaches for IDS
8.6 Conclusion
References
9 The Socio-Behavioral Cipher Technique
9.1 Introduction
9.2 Existing Technology
9.3 Methodology
9.4 Conclusion: Future Scope and Limitations
References
10 Intrusion Detection Strategies in Smart Grid
10.1 Introduction
10.2 Role of Smart Grid
10.3 Technical Challenges Involved in Smart Grid
10.4 Intrusion Detection System
10.5 General Architecture of Intrusion Detection System
10.6 Basic Terms in IDS
10.7 Capabilities of IDS
10.8 Benefits of Intrusion Detection Systems
10.9 Types of IDS
10.10 IDS in a Smart Grid Environment
10.11 Security Issues of Cyber-Physical Smart Grid
10.12 Protecting Smart Grid From Cyber Vulnerabilities
10.13 Security Issues for Future Smart Grid
10.14 Conclusion
References
11 Security Protocol for Cloud-Based Communication
11.1 Introduction
11.2 Existing Technology and Its Review
11.3 Methodology (To Overcome the Drawbacks of Existing Protocols)
11.4 Findings: Policy Monitoring Techniques
11.5 Future Research and Conclusion
Reference
12 Security Protocols for Mobile Communications
12.1 Introduction
12.2 Evolution of Mobile Communications
12.3 Global System for Mobiles (GSM)
12.4 Universal Mobile Telecommunications System (UMTS)
12.5 Long Term Evolution (LTE)
12.6 5G Wireless Systems
12.7 LoRA
12.8 5G Integrated With LoRA
12.9 Physical Layer Security and RFID Authentication
12.10 Conclusion
References
13 Use of Machine Learning in Design of Security Protocols
13.1 Introduction
13.2 Review of Related Literature
13.3 Joint and Offensive Kinetic Execution Resolver
13.4 Results and Discussion
13.5 Conclusion and Future Scope
References
14 Privacy and Authentication on Security Protocol for Mobile Communications
14.1 Introduction
14.2 Mobile Communications
14.3 Security Protocols
14.4 Authentication
14.5 Next Generation Networking
14.6 Conclusion
References
15 Cloud Communication
15.1 Introduction
15.2 Need for Cloud Communication
15.3 Application
15.4 Cloud Communication Platform
15.5 Security Measures Provided by the Cloud
15.6 Achieving Security With Cloud Communications
15.7 Cryptographic Protocols for Secure Cloud Computing
15.8 Security Layer for the Transport Protocol
15.9 Internet Protocol Security (IPSec)
15.10 Kerberos
15.11 Wired Equivalent Privacy (WEP)
15.12 WiFi Protected Access (WPA)
15.13 Wi-Fi Protected Access II and the Most Current Security Protocols
15.14 Wired Equivalent Privacy (WEP)
15.15 Wi-Fi Protected Access (WPA)
15.16 Conclusions
References
Index
People also search for Design and Analysis of Security Protocol for Communication 1st :
design and analysis of security protocol for communication
design and analysis of security protocol for communication pdf
designing and building a security operations center pdf
design of a security protocol
design and cybersecurity procedures and protocols
Tags: Dinesh Goyal, Balamurugan, ShengLung Peng, Security Protocol, Design and Analysis
Reviews
There are no reviews yet.