Edited by Jaydip Sen, ISBN 978-953-51-0218-2, Hard cover, 376 pages, Publisher: InTech, Published: March 14, 2012 under CC BY 3.0 license, in subject Computer and Information Science

Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks. The book contains sixteen chapters which deal with security and privacy issues in computing and communication networks, quantum cryptography and the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography. It will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.

BOOK CONTENTS

Chapter 1: Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks
Chapter 2: Security from Location
Chapter 3: Anonymous Authentication Protocols for Vehicular Ad Hoc Networks: An Overview
Chapter 4: Security Approaches for Information-Centric Networking
Chapter 5: Secure Platform Over Wireless Sensor Networks
Chapter 6: Privacy-Secure Digital Watermarking for Fair Content Trading
Chapter 7: NLM-MAC: Lightweight Secure Data Communication Framework Using Authenticated Encryption in Wireless Sensor Networks
Chapter 8: Key Establishment Protocol for Wireless Sensor Networks
Chapter 9: Quantum Cryptography
Chapter 10: Quantum Key Management
Chapter 11: Securing a Telecom Services Using Quantum Cryptographic Mechanisms
Chapter 12: Notions of Chaotic Cryptography: Sketch of a Chaos Based Cryptosystem
Chapter 13: Chaotic Electronic Circuits in Cryptography
Chapter 14: An En/Decryption Machine Based on Statistical Physics
Chapter 15: Modern Technologies Used for Security of Software Applications
Chapter 16: Research on DNA Cryptography