Items related to Design and Analysis of Security Protocol for Communication

Design and Analysis of Security Protocol for Communication - Hardcover

 
9781119555643: Design and Analysis of Security Protocol for Communication

Synopsis

The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.

"synopsis" may belong to another edition of this title.

About the Author

Dinesh Goyal received his PhD in 2014 on "Secure Video Transmission in a Cloud Network" and is now Dean of Academics as well as a member of the Dept. of Computer Science & Engineering, Suresh Gyan Vihar University, India. His research interests are related to information & network security, image processing, data analytics and cloud computing.

S. Balamurugan is the Director of Research and Development, Intelligent Research Consultancy Services(iRCS), Coimbatore, Tamilnadu, India. He also serves as R&D Consultant for many companies, startups, SMEs and MSMEs. He has published 40 books, 200+ articles in international journals/conferences as well as 27 patents. He is Editor-in-Chief of Information Science Letters and International Journal of Robotics and Artificial Intelligence. His research interests include artificial intelligence, IoT, big data analytics, cloud computing, industrial automation and wearable computing. He is a life member of IEEE, ACM, ISTE and CSI.

Sheng-Lung Peng is a Professor of the Department of Computer Science and Information Engineering at National Dong Hwa University, Hualien, Taiwan. He received PhD degree in Computer Science from the National Tsing Hua University, Taiwan. He is an honorary Professor of Beijing Information Science and Technology University of China, a supervisor of the Chinese Information Literacy Association and of the Association of Algorithms and Computation Theory. His research interests are in designing and analyzing algorithms for bioinformatics, combinatorics, data mining, and networks. He has published more than 100 international conference and journal papers.

O. P. Verma is the Principal at GB Pant Govt. Engineering College, New Delhi, India. Previously, he was at the Department of Computer Science & Engineering, Delhi Technical University, New Delhi, India. His research interests include image processing, soft computing, machine learning, evolutionary computing.

From the Back Cover

The book combines analysis and comparison of various security protocols such as HTTP, SMTP, RTP, RTCP, FTP, UDP for mobile or multimedia streaming security protocol.

Over the past few decades, digital communication has grown by leaps and bounds. The expanding use of the internet in our day-to-day lives has resulted in a six-fold increase in the number of internet users in the past two decades alone, leading to an evolution of technologies for home use such as cloud computing, artificial intelligence, big data analytics and machine learning. However, insecurity or loss of information continues to be a major concern with multiple cases across the globe of breach of information or platforms leading to loss of data, money, faith and much more.

There are many different security protocols for various types of applications of the internet like email, web browsing, webchat, video streaming, cloud-based communication, closed group communication, banking transactions, e-commerce and many more both at network level and user end. Security has evolved to counter many kinds of attacks like intrusion, manipulation, spoofing and so on, for which techniques like cryptography, message digest, digital signature, steganography, watermarking, time stamping, access control, etc., have been incorporated into various layers of communication, resulting in protocols like HTTP, SMTP, RTP, RTCP, FTP, UDP and many more.

The 16 chapters in this book, all written by subject matter experts, analyze and compare the various protocols which might act as a Mobile Communication Security Protocol or Multimedia Streaming Security Protocol. The main goal of the book is to help the engineer proper utilize the correct security application for the application at hand.

Audience

Research scholars and engineers working in the area of security protocols for communication will find this book a handy reference guide. Software and hardware engineers, who work specifically in the area of communication protocols, will find this book a useful resource as all the security protocols it covers are compared and compiled in one place, thus ensuring their proper utilization. In addition, graduate and post-graduate students will find this book an ideal guide in courses on electronics and communication engineering, telecommunication engineering, network engineering, computer science and engineering and information technology.

From the Inside Flap

The book combines analysis and comparison of various security protocols such as HTTP, SMTP, RTP, RTCP, FTP, UDP for mobile or multimedia streaming security protocol.

Over the past few decades, digital communication has grown by leaps and bounds. The expanding use of the internet in our day-to-day lives has resulted in a six-fold increase in the number of internet users in the past two decades alone, leading to an evolution of technologies for home use such as cloud computing, artificial intelligence, big data analytics and machine learning. However, insecurity or loss of information continues to be a major concern with multiple cases across the globe of breach of information or platforms leading to loss of data, money, faith and much more.

There are many different security protocols for various types of applications of the internet like email, web browsing, webchat, video streaming, cloud-based communication, closed group communication, banking transactions, e-commerce and many more both at network level and user end. Security has evolved to counter many kinds of attacks like intrusion, manipulation, spoofing and so on, for which techniques like cryptography, message digest, digital signature, steganography, watermarking, time stamping, access control, etc., have been incorporated into various layers of communication, resulting in protocols like HTTP, SMTP, RTP, RTCP, FTP, UDP and many more.

The 16 chapters in this book, all written by subject matter experts, analyze and compare the various protocols which might act as a Mobile Communication Security Protocol or Multimedia Streaming Security Protocol. The main goal of the book is to help the engineer proper utilize the correct security application for the application at hand.

Audience

Research scholars and engineers working in the area of security protocols for communication will find this book a handy reference guide. Software and hardware engineers, who work specifically in the area of communication protocols, will find this book a useful resource as all the security protocols it covers are compared and compiled in one place, thus ensuring their proper utilization. In addition, graduate and post-graduate students will find this book an ideal guide in courses on electronics and communication engineering, telecommunication engineering, network engineering, computer science and engineering and information technology.

"About this title" may belong to another edition of this title.

  • PublisherWiley-Scrivener
  • Publication date2020
  • ISBN 10 1119555647
  • ISBN 13 9781119555643
  • BindingHardcover
  • LanguageEnglish
  • Edition number1
  • Number of pages360

Buy Used

Condition: As New
Unread book in perfect condition...
View this item

£ 14.78 shipping from U.S.A. to United Kingdom

Destination, rates & speeds

Buy New

View this item

FREE shipping within United Kingdom

Destination, rates & speeds

Search results for Design and Analysis of Security Protocol for Communication

Seller Image

Goyal, Dinesh (EDT); Balamurugan, S. (EDT); Peng, Sheng-lung (EDT); Verma, O. P. (EDT)
Published by Wiley-Scrivener, 2020
ISBN 10: 1119555647 ISBN 13: 9781119555643
Used Hardcover

Seller: GreatBookPrices, Columbia, MD, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: As New. Unread book in perfect condition. Seller Inventory # 33755343

Contact seller

Buy Used

£ 92.24
Convert currency
Shipping: £ 14.78
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Seller Image

Goyal, Dinesh (EDT); Balamurugan, S. (EDT); Peng, Sheng-lung (EDT); Verma, O. P. (EDT)
Published by Wiley-Scrivener, 2020
ISBN 10: 1119555647 ISBN 13: 9781119555643
Used Hardcover

Seller: GreatBookPricesUK, Woodford Green, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: As New. Unread book in perfect condition. Seller Inventory # 33755343

Contact seller

Buy Used

£ 175.36
Convert currency
Shipping: FREE
Within United Kingdom
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Seller Image

Goyal, Dinesh (EDT); Balamurugan, S. (EDT); Peng, Sheng-lung (EDT); Verma, O. P. (EDT)
Published by Wiley-Scrivener, 2020
ISBN 10: 1119555647 ISBN 13: 9781119555643
New Hardcover

Seller: GreatBookPricesUK, Woodford Green, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Seller Inventory # 33755343-n

Contact seller

Buy New

£ 178.98
Convert currency
Shipping: FREE
Within United Kingdom
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Dinesh Goyal
Published by John Wiley & Sons Inc, New York, 2020
ISBN 10: 1119555647 ISBN 13: 9781119555643
New Hardcover

Seller: CitiRetail, Stevenage, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Hardcover. Condition: new. Hardcover. The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Seller Inventory # 9781119555643

Contact seller

Buy New

£ 178.99
Convert currency
Shipping: FREE
Within United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Seller Image

Goyal, Dinesh (EDT); Balamurugan, S. (EDT); Peng, Sheng-lung (EDT); Verma, O. P. (EDT)
Published by Wiley-Scrivener, 2020
ISBN 10: 1119555647 ISBN 13: 9781119555643
New Hardcover

Seller: GreatBookPrices, Columbia, MD, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Seller Inventory # 33755343-n

Contact seller

Buy New

£ 169.30
Convert currency
Shipping: £ 14.78
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Goyal, Dinesh
Published by Wiley-Scrivener, 2020
ISBN 10: 1119555647 ISBN 13: 9781119555643
New Hardcover

Seller: Ria Christie Collections, Uxbridge, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. In. Seller Inventory # ria9781119555643_new

Contact seller

Buy New

£ 194.30
Convert currency
Shipping: FREE
Within United Kingdom
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Seller Image

D Goyal
Published by John Wiley & Sons, 2020
ISBN 10: 1119555647 ISBN 13: 9781119555643
New Hardcover

Seller: moluna, Greven, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Gebunden. Condition: New. &Uumlber den AutorS. Balamurugan is the Director of Research and Development, Intelligent Research Consultancy Services(iRCS), Coimbatore, Tamilnadu, India. He also serves as R&D Consultant for many companies, startups, SMEs a. Seller Inventory # 257231658

Contact seller

Buy New

£ 173.72
Convert currency
Shipping: £ 21.05
From Germany to United Kingdom
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Goyal, Dinesh
Published by John Wiley & Sons, 2020
ISBN 10: 1119555647 ISBN 13: 9781119555643
New Hardcover

Seller: Majestic Books, Hounslow, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Seller Inventory # 383207392

Contact seller

Buy New

£ 214.08
Convert currency
Shipping: £ 3.35
Within United Kingdom
Destination, rates & speeds

Quantity: 3 available

Add to basket

Seller Image

Dinesh Goyal
Published by Wiley Mär 2020, 2020
ISBN 10: 1119555647 ISBN 13: 9781119555643
New Hardcover

Seller: AHA-BUCH GmbH, Einbeck, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Buch. Condition: Neu. Neuware - The book combines analysis and comparison of various security protocols such as HTTP, SMTP, RTP, RTCP, FTP, UDP for mobile or multimedia streaming security protocol. Seller Inventory # 9781119555643

Contact seller

Buy New

£ 210.21
Convert currency
Shipping: £ 11.78
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 2 available

Add to basket

Stock Image

Goyal, Dinesh
Published by Wiley-Scrivener, 2020
ISBN 10: 1119555647 ISBN 13: 9781119555643
New Hardcover

Seller: Lucky's Textbooks, Dallas, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Seller Inventory # ABLIING23Mar2317530298541

Contact seller

Buy New

£ 168.28
Convert currency
Shipping: £ 55.44
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

There are 7 more copies of this book

View all search results for this book