Cryptography and Its Applications in Information Security

Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their...

Full description

Saved in:
Bibliographic Details
HerausgeberIn:
Sonstige:
Year of Publication:2022
Language:English
Physical Description:1 electronic resource (202 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 03158nam-a2200781z--4500
001 993545268304498
005 20231214132943.0
006 m o d
007 cr|mn|---annan
008 202205s2022 xx |||||o ||| 0|eng d
035 |a (CKB)5680000000037677 
035 |a (oapen)https://directory.doabooks.org/handle/20.500.12854/81008 
035 |a (EXLCZ)995680000000037677 
041 0 |a eng 
100 1 |a Assad, Safwan El  |4 edt 
245 1 0 |a Cryptography and Its Applications in Information Security 
260 |a Basel  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2022 
300 |a 1 electronic resource (202 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information. 
546 |a English 
650 7 |a Technology: general issues  |2 bicssc 
650 7 |a History of engineering & technology  |2 bicssc 
653 |a bit independence criterion 
653 |a bit independence 
653 |a RC4 
653 |a stream cipher 
653 |a complexity 
653 |a chaos-based stream cipher 
653 |a SPCNG 
653 |a 3D chebyshev 
653 |a logistic 
653 |a skew-tent 
653 |a FPGA 
653 |a performance 
653 |a museum 
653 |a digital copyright management 
653 |a blockchain 
653 |a smart contract 
653 |a authorization model 
653 |a coupled map lattice 
653 |a intermittent jumping 
653 |a multi-chaos 
653 |a public key exchange 
653 |a security 
653 |a asymmetric 
653 |a asymmetric algorithm 
653 |a cryptography 
653 |a framework 
653 |a limited computational power 
653 |a computationally biased 
653 |a intrusion detection systems 
653 |a machine learning 
653 |a communication 
653 |a digital cash 
653 |a privacy 
653 |a privacy preserving 
653 |a homomorphic encryption 
653 |a federated learning 
776 |z 3-0365-3767-8 
776 |z 3-0365-3768-6 
700 1 |a Lozi, René  |4 edt 
700 1 |a Puech, William  |4 edt 
700 1 |a Assad, Safwan El  |4 oth 
700 1 |a Lozi, René  |4 oth 
700 1 |a Puech, William  |4 oth 
906 |a BOOK 
ADM |b 2023-12-15 05:37:45 Europe/Vienna  |f system  |c marc21  |a 2022-05-14 21:41:54 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337863050004498&Force_direct=true  |Z 5337863050004498  |b Available  |8 5337863050004498