Design and analysis of security protocol for communication / (Record no. 69176)

000 -LEADER
fixed length control field 06163cam a2200601Ki 4500
001 - CONTROL NUMBER
control field on1139536172
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203540.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200206s2020 nju ob 001 0 eng d
019 ## -
-- 1141200499
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119555759
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119555752
-- (electronic bk.)
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000066723584
029 1# - (OCLC)
OCLC library identifier CHNEW
System control number 001077492
029 1# - (OCLC)
OCLC library identifier CHVBK
System control number 582680409
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 00 - TITLE STATEMENT
Title Design and analysis of security protocol for communication /
250 ## - EDITION STATEMENT
Edition statement First edition.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource
520 ## - SUMMARY, ETC.
Summary, etc "The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any. The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any"--
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 History and Generations of Security Protocols -- 1.1 Introduction -- 1.2 Network Security -- 1.3 Historical Background of Network Security and Network Timeline -- 1.4 Internet Architecture and Security Aspects -- 1.4.1 IPv4 and IPv6 Architecture -- 1.4.1.1 Structure of IPv4 -- 1.4.1.2 IPv6 Architecture -- 1.4.2 Attack Through IPv4 -- 1.4.2.1 Internet Attacks Common Methods -- 1.4.2.2 Internet Security Technology -- 1.4.3 IPv6 IP Security Issues -- 1.5 Different Aspects of Security of the Network
505 8# - FORMATTED CONTENTS NOTE
Remark 2 1.6 Evolution of Security Protocols for Network -- 1.6.1 Understanding the Key Components of Network Security -- 1.6.2 A Deep Defense Strategy -- 1.6.3 How Does the Next Generation Network Security System Work Best -- 1.7 Network Security Protocols -- 1.7.1 Application Layer -- 1.7.1.1 Good Privacy (PGP) -- 1.7.1.2 Email/Multipurpose Security (S/MIME) -- 1.7.1.3 HTTP Secure (S-HTTP) -- 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer -- 1.7.1.5 Secure E-Commerce (SET) -- 1.7.1.6 Kerberos -- 1.7.2 Transport Layer -- 1.7.2.1 Secure Sockets Layer (SSL)
505 8# - FORMATTED CONTENTS NOTE
Remark 2 1.7.2.2 Transport Layer Security (TLS) -- 1.7.3 Network Layer -- 1.7.3.1 Internet Protocol Security (IPSec) -- 1.7.3.2 Virtual Private Network (VPN) -- 1.7.4 Data Link Layer -- 1.7.4.1 Point-to-Point Protocol (PPP) -- 1.7.4.2 Remote Authentication User Service (RADIO) -- 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) -- 1.8 Current Evolution of Red Security -- 1.8.1 Hardware Development -- 1.8.2 Software Development -- 1.9 Future Security Trends -- References -- Chapter 2 Evolution of Information Security Algorithms -- 2.1 Introduction to Conventional Encryption
505 8# - FORMATTED CONTENTS NOTE
Remark 2 2.2 Classical Encryption Techniques -- 2.2.1 Substitution Based -- 2.2.1.1 Caesar Cipher -- 2.2.1.2 Monoalphabetic Cipher -- 2.2.1.3 Playfair Cipher -- 2.2.1.4 Polyalphabetic Cipher -- 2.2.2 Transposition Based -- 2.2.2.1 Simple Columnar -- 2.2.2.2 Rail Fence Cipher -- 2.3 Evolutions of Modern Security Techniques -- 2.3.1 Stream Cipher Algorithms -- 2.3.1.1 One Time Pad (OTP) -- 2.3.1.2 RC-4 -- 2.3.1.3 A5/1 -- 2.3.2 Block Cipher Algorithms -- 2.3.2.1 Feistel Cipher Structure -- 2.3.2.2 Data Encryption Standard (DES) -- 2.3.2.3 Triple Data Encryption Standard (TDES)
505 8# - FORMATTED CONTENTS NOTE
Remark 2 2.3.2.4 International Data Encryption Algorithm (IDEA) -- 2.3.2.5 Blowfish -- 2.3.2.6 CAST-128 -- 2.4 Conclusion -- References -- Practice Set -- Review Questions and Exercises -- 3 Philosophy of Security by Cryptostakes Schemes -- 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography) -- 3.2 RSA Algorithm -- 3.3 Security Analysis of RSA -- 3.4 Exponentiation in Modular Arithmetic -- 3.5 Distribution of Public Keys -- 3.6 Distribution of Secret Keys Using Public Key Cryptosystems -- 3.7 Discrete Logarithms -- 3.8 Diffie-Hellman Key Exchange -- 3.9 Review Exercise -- References
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Goyal, Dinesh,
700 1# - AUTHOR 2
Author 2 Balamurigan, A.,
700 1# - AUTHOR 2
Author 2 Peng, Sheng-Lung,
700 1# - AUTHOR 2
Author 2 Verma, O. P.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119555759
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Hoboken, New Jersey :
-- John Wiley & Sons, Inc. ;
-- Salem, Massachusetts :
-- Scrivener Publishing LLC,
-- [2020]
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
520 ## - SUMMARY, ETC.
-- Provided by publisher.
588 0# -
-- Print version record.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer network protocols.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer network protocols.
-- (OCoLC)fst00872279
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
-- (OCoLC)fst00872341
994 ## -
-- C0
-- DG1

No items available.