Reference Hub1
Wireless Web Security Using a Neural Network-Based Cipher

Wireless Web Security Using a Neural Network-Based Cipher

Isaac Woungang, Alireza Sadeghian, Shuwei Wu, Sudip Misra, Maryam Arvandi
Copyright: © 2007 |Pages: 25
ISBN13: 9781599041681|ISBN10: 1599041685|ISBN13 Softcover: 9781599041698|EISBN13: 9781599041704
DOI: 10.4018/978-1-59904-168-1.ch002
Cite Chapter Cite Chapter

MLA

Woungang, Isaac, et al. "Wireless Web Security Using a Neural Network-Based Cipher." Web Services Security and E-Business, edited by G. Radhamani and G. S.V. Radha Krishna Rao, IGI Global, 2007, pp. 32-56. https://doi.org/10.4018/978-1-59904-168-1.ch002

APA

Woungang, I., Sadeghian, A., Wu, S., Misra, S., & Arvandi, M. (2007). Wireless Web Security Using a Neural Network-Based Cipher. In G. Radhamani & G. Rao (Eds.), Web Services Security and E-Business (pp. 32-56). IGI Global. https://doi.org/10.4018/978-1-59904-168-1.ch002

Chicago

Woungang, Isaac, et al. "Wireless Web Security Using a Neural Network-Based Cipher." In Web Services Security and E-Business, edited by G. Radhamani and G. S.V. Radha Krishna Rao, 32-56. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59904-168-1.ch002

Export Reference

Mendeley
Favorite

Abstract

The increasingly important role of security for wireless Web services environments has opened an array of challenging problems centered on new methods and tools to improve existing data encryption and authentication techniques. Real-time recurrent neural networks offer an attractive approach to tackling such problems because of the high encryption capability provided by the structural hidden layers of such networks. In this chapter, a novel neural network-based symmetric cipher is proposed. This cipher releases the constraint on the length of the secret key to provide the data integrity and authentication services that can be used for securing wireless Web services communication. The proposed symmetric cipher design is robust in resisting different cryptanalysis attacks. Simulation results are presented to validate its effectiveness.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.