Cryptography and Its Applications in Information Security
Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their...
Saved in:
HerausgeberIn: | |
---|---|
Sonstige: | |
Year of Publication: | 2022 |
Language: | English |
Physical Description: | 1 electronic resource (202 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993545268304498 |
---|---|
ctrlnum |
(CKB)5680000000037677 (oapen)https://directory.doabooks.org/handle/20.500.12854/81008 (EXLCZ)995680000000037677 |
collection |
bib_alma |
record_format |
marc |
spelling |
Assad, Safwan El edt Cryptography and Its Applications in Information Security Basel MDPI - Multidisciplinary Digital Publishing Institute 2022 1 electronic resource (202 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information. English Technology: general issues bicssc History of engineering & technology bicssc bit independence criterion bit independence RC4 stream cipher complexity chaos-based stream cipher SPCNG 3D chebyshev logistic skew-tent FPGA performance museum digital copyright management blockchain smart contract authorization model coupled map lattice intermittent jumping multi-chaos public key exchange security asymmetric asymmetric algorithm cryptography framework limited computational power computationally biased intrusion detection systems machine learning communication digital cash privacy privacy preserving homomorphic encryption federated learning 3-0365-3767-8 3-0365-3768-6 Lozi, René edt Puech, William edt Assad, Safwan El oth Lozi, René oth Puech, William oth |
language |
English |
format |
eBook |
author2 |
Lozi, René Puech, William Assad, Safwan El Lozi, René Puech, William |
author_facet |
Lozi, René Puech, William Assad, Safwan El Lozi, René Puech, William |
author2_variant |
s e a se sea r l rl w p wp |
author2_role |
HerausgeberIn HerausgeberIn Sonstige Sonstige Sonstige |
title |
Cryptography and Its Applications in Information Security |
spellingShingle |
Cryptography and Its Applications in Information Security |
title_full |
Cryptography and Its Applications in Information Security |
title_fullStr |
Cryptography and Its Applications in Information Security |
title_full_unstemmed |
Cryptography and Its Applications in Information Security |
title_auth |
Cryptography and Its Applications in Information Security |
title_new |
Cryptography and Its Applications in Information Security |
title_sort |
cryptography and its applications in information security |
publisher |
MDPI - Multidisciplinary Digital Publishing Institute |
publishDate |
2022 |
physical |
1 electronic resource (202 p.) |
isbn |
3-0365-3767-8 3-0365-3768-6 |
illustrated |
Not Illustrated |
work_keys_str_mv |
AT assadsafwanel cryptographyanditsapplicationsininformationsecurity AT lozirene cryptographyanditsapplicationsininformationsecurity AT puechwilliam cryptographyanditsapplicationsininformationsecurity |
status_str |
n |
ids_txt_mv |
(CKB)5680000000037677 (oapen)https://directory.doabooks.org/handle/20.500.12854/81008 (EXLCZ)995680000000037677 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Cryptography and Its Applications in Information Security |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1796652254814535680 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03158nam-a2200781z--4500</leader><controlfield tag="001">993545268304498</controlfield><controlfield tag="005">20231214132943.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202205s2022 xx |||||o ||| 0|eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5680000000037677</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/81008</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995680000000037677</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Assad, Safwan El</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography and Its Applications in Information Security</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Basel</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (202 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology: general issues</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">History of engineering & technology</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">bit independence criterion</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">bit independence</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">RC4</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">stream cipher</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">complexity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">chaos-based stream cipher</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">SPCNG</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">3D chebyshev</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">logistic</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">skew-tent</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">FPGA</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">performance</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">museum</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">digital copyright management</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">blockchain</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">smart contract</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">authorization model</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">coupled map lattice</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intermittent jumping</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">multi-chaos</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">public key exchange</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">asymmetric</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">asymmetric algorithm</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">framework</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">limited computational power</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computationally biased</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intrusion detection systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">machine learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">communication</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">digital cash</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">privacy</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">privacy preserving</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">homomorphic encryption</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">federated learning</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-3767-8</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-3768-6</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lozi, René</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Puech, William</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Assad, Safwan El</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lozi, René</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Puech, William</subfield><subfield code="4">oth</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 05:37:45 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-05-14 21:41:54 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337863050004498&Force_direct=true</subfield><subfield code="Z">5337863050004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337863050004498</subfield></datafield></record></collection> |