LEADER 02016nam 2200373 450 001 9910688209903321 005 20230629085356.0 035 $a(CKB)5400000000042589 035 $a(NjHacI)995400000000042589 035 $a(EXLCZ)995400000000042589 100 $a20230629d2020 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aComputer and Network Security /$fedited by Jaydip Sen, Sidra Mehtab 210 1$aLondon :$cIntechOpen,$d2020. 210 4$dİ2020 215 $a1 online resource (178 pages) 311 $a1-83880-856-6 320 $aIncludes bibliographical references and index. 330 $aIn the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning. 606 $aComputer security 615 0$aComputer security. 676 $a005.8 702 $aMehtab$b Sidra 702 $aSen$b Jaydip 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910688209903321 996 $aComputer and Network Security$92270955 997 $aUNINA