Reference Hub3
Indices1
Improving Information Security Practices through Computational Intelligence

Improving Information Security Practices through Computational Intelligence

Copyright: © 2016 |Pages: 327
ISBN13: 9781466694262|ISBN10: 1466694262|EISBN13: 9781466694279
DOI: 10.4018/978-1-4666-9426-2
Cite Book Cite Book

MLA

Awad, Wasan, et al., editors. Improving Information Security Practices through Computational Intelligence. IGI Global, 2016. https://doi.org/10.4018/978-1-4666-9426-2

APA

Awad, W., El-Alfy, E. M., & Al-Bastaki, Y. (Eds.). (2016). Improving Information Security Practices through Computational Intelligence. IGI Global. https://doi.org/10.4018/978-1-4666-9426-2

Chicago

Awad, Wasan, El Sayed M. El-Alfy, and Yousif Al-Bastaki, eds. Improving Information Security Practices through Computational Intelligence. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-9426-2

Export Reference

Mendeley
Favorite Full-Book Download

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols.

Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Introduction  (pages 19-20)
This section provides an overview of existing computational intelligence paradigms, and reviews the literature and potential applications in cryptology.
Introduction
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
This section presents two applications of evolutionary computation in cryptology, namely design of stream ciphers and chaotic-based cryptosystems for securing images.
Applications of Evolutionary Computation in Cryptology
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
This section illustrates the approaches utilized to build optimal, adaptive and comprehensive intrusion detection systems.
Intelligent Intrusion Detection
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Authentication  (pages 148-148)
This section discusses entity and message authentication utilizing cryptography. It covers digital signature certificates and biometric authentication.
Authentication
This content has been removed at the discretion of the publisher and the editors.
Chapter 5
Multimedia Security  (pages 227-227)
This section deals with methods for improving information security of multimedia and implementation on graphical processing unit.
Multimedia Security
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.