Home Page Icon
Home Page
Table of Contents for
End User License Agreement
Close
End User License Agreement
by Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng,
Design and Analysis of Security Protocol for Communication
Cover
Preface
1 History and Generations of Security Protocols
1.1 Introduction
1.2 Network Security
1.3 Historical Background of Network Security and Network Timeline
1.4 Internet Architecture and Security Aspects
1.5 Different Aspects of Security of the Network
1.6 Evolution of Security Protocols for Network
1.7 Network Security Protocols
1.8 Current Evolution of Red Security
1.9 Future Security Trends
References
2 Evolution of Information Security Algorithms
2.1 Introduction to Conventional Encryption
2.2 Classical Encryption Techniques
2.3 Evolutions of Modern Security Techniques
2.4 Conclusion
References
Practice Set
APPENDIX A: Tables of Data Encryption Standard
3 Philosophy of Security by Cryptostakes Schemes
3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography)
3.2 RSA Algorithm
3.3 Security Analysis of RSA
3.4 Exponentiation in Modular Arithmetic
3.5 Distribution of Public Keys
3.6 Distribution of Secret Keys Using Public Key Cryptosystems
3.7 Discrete Logarithms
3.8 Diffie–Hellman Key Exchange
3.9 Review Exercise
References
4 Zero-Share Key Management for Secure Communication Across a Channel
4.1 Introduction
4.2 Background
4.3 Zero-Share Key Management System
4.4 Simulation
4.5 Complexity and Analysis
4.6 Conclusion and Future Trends
References
5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate
5.1 Introduction
5.2 Existing Technology and Its Review
5.3 Research Design
5.4 Results With Implications
5.5 Future Research and Conclusion
References
6 Recursively Paired Arithmetic Technique (RPAT): An FPGA-Based Block Cipher Simulation and Its Cryptanalysis
6.1 Introduction
6.2 Recursively Paired Arithmetic Technique (RPAT)
6.3 Implementation and Simulation
6.4 Cryptanalysis
6.5 Simulation-Based Results
6.6 Applications
6.7 Conclusion
Acknowledgment
References
7 Security Protocol for Multimedia Streaming
7.1 Introduction
7.2 Existing Technology and Its Review
7.3 Methodology and Research Design
7.4 Findings
7.5 Future Research and Conclusion
References
8 Nature Inspired Approach for Intrusion Detection Systems
8.1 Introduction
8.2 Approaches Used for Intrusion Detection Systems
8.3 Intrusion Detection Tools
8.4 Use of Machine Learning to Build Dynamic IDS/IPS
8.5 Bio-Inspired Approaches for IDS
8.6 Conclusion
References
9 The Socio-Behavioral Cipher Technique
9.1 Introduction
9.2 Existing Technology
9.3 Methodology
9.4 Conclusion: Future Scope and Limitations
References
10 Intrusion Detection Strategies in Smart Grid
10.1 Introduction
10.2 Role of Smart Grid
10.3 Technical Challenges Involved in Smart Grid
10.4 Intrusion Detection System
10.5 General Architecture of Intrusion Detection System
10.6 Basic Terms in IDS
10.7 Capabilities of IDS
10.8 Benefits of Intrusion Detection Systems
10.9 Types of IDS
10.10 IDS in a Smart Grid Environment
10.11 Security Issues of Cyber-Physical Smart Grid
10.12 Protecting Smart Grid From Cyber Vulnerabilities
10.13 Security Issues for Future Smart Grid
10.14 Conclusion
References
11 Security Protocol for Cloud-Based Communication
11.1 Introduction
11.2 Existing Technology and Its Review
11.3 Methodology (To Overcome the Drawbacks of Existing Protocols)
11.4 Findings: Policy Monitoring Techniques
11.5 Future Research and Conclusion
Reference
12 Security Protocols for Mobile Communications
12.1 Introduction
12.2 Evolution of Mobile Communications
12.3 Global System for Mobiles (GSM)
12.4 Universal Mobile Telecommunications System (UMTS)
12.5 Long Term Evolution (LTE)
12.6 5G Wireless Systems
12.7 LoRA
12.8 5G Integrated With LoRA
12.9 Physical Layer Security and RFID Authentication
12.10 Conclusion
References
13 Use of Machine Learning in Design of Security Protocols
13.1 Introduction
13.2 Review of Related Literature
13.3 Joint and Offensive Kinetic Execution Resolver
13.4 Results and Discussion
13.5 Conclusion and Future Scope
References
14 Privacy and Authentication on Security Protocol for Mobile Communications
14.1 Introduction
14.2 Mobile Communications
14.3 Security Protocols
14.4 Authentication
14.5 Next Generation Networking
14.6 Conclusion
References
15 Cloud Communication
15.1 Introduction
15.2 Need for Cloud Communication
15.3 Application
15.4 Cloud Communication Platform
15.5 Security Measures Provided by the Cloud
15.6 Achieving Security With Cloud Communications
15.7 Cryptographic Protocols for Secure Cloud Computing
15.8 Security Layer for the Transport Protocol
15.9 Internet Protocol Security (IPSec)
15.10 Kerberos
15.11 Wired Equivalent Privacy (WEP)
15.12 WiFi Protected Access (WPA)
15.13 Wi-Fi Protected Access II and the Most Current Security Protocols
15.14 Wired Equivalent Privacy (WEP)
15.15 Wi-Fi Protected Access (WPA)
15.16 Conclusions
References
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
]>
WILEY END USER LICENSE AGREEMENT
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley’s ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset