TY - CHAP A1 - Ali Fanian A2 - Mehdi Berenjkoub ED1 - Jaydip Sen Y1 - 2012-03-14 PY - 2012 T1 - Key Establishment Protocol for Wireless Sensor Networks N2 - Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks. The book contains sixteen chapters which deal with security and privacy issues in computing and communication networks, quantum cryptography and the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography. It will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities. BT - Applied Cryptography and Network Security SP - Ch. 8 UR - https://doi.org/10.5772/35000 DO - 10.5772/35000 SN - PB - IntechOpen CY - Rijeka Y2 - 2021-07-31 ER -