Cryptography and Its Applications in Information Security

Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their...

Full description

Saved in:
Bibliographic Details
HerausgeberIn:
Sonstige:
Year of Publication:2022
Language:English
Physical Description:1 electronic resource (202 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993545268304498
ctrlnum (CKB)5680000000037677
(oapen)https://directory.doabooks.org/handle/20.500.12854/81008
(EXLCZ)995680000000037677
collection bib_alma
record_format marc
spelling Assad, Safwan El edt
Cryptography and Its Applications in Information Security
Basel MDPI - Multidisciplinary Digital Publishing Institute 2022
1 electronic resource (202 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.
English
Technology: general issues bicssc
History of engineering & technology bicssc
bit independence criterion
bit independence
RC4
stream cipher
complexity
chaos-based stream cipher
SPCNG
3D chebyshev
logistic
skew-tent
FPGA
performance
museum
digital copyright management
blockchain
smart contract
authorization model
coupled map lattice
intermittent jumping
multi-chaos
public key exchange
security
asymmetric
asymmetric algorithm
cryptography
framework
limited computational power
computationally biased
intrusion detection systems
machine learning
communication
digital cash
privacy
privacy preserving
homomorphic encryption
federated learning
3-0365-3767-8
3-0365-3768-6
Lozi, René edt
Puech, William edt
Assad, Safwan El oth
Lozi, René oth
Puech, William oth
language English
format eBook
author2 Lozi, René
Puech, William
Assad, Safwan El
Lozi, René
Puech, William
author_facet Lozi, René
Puech, William
Assad, Safwan El
Lozi, René
Puech, William
author2_variant s e a se sea
r l rl
w p wp
author2_role HerausgeberIn
HerausgeberIn
Sonstige
Sonstige
Sonstige
title Cryptography and Its Applications in Information Security
spellingShingle Cryptography and Its Applications in Information Security
title_full Cryptography and Its Applications in Information Security
title_fullStr Cryptography and Its Applications in Information Security
title_full_unstemmed Cryptography and Its Applications in Information Security
title_auth Cryptography and Its Applications in Information Security
title_new Cryptography and Its Applications in Information Security
title_sort cryptography and its applications in information security
publisher MDPI - Multidisciplinary Digital Publishing Institute
publishDate 2022
physical 1 electronic resource (202 p.)
isbn 3-0365-3767-8
3-0365-3768-6
illustrated Not Illustrated
work_keys_str_mv AT assadsafwanel cryptographyanditsapplicationsininformationsecurity
AT lozirene cryptographyanditsapplicationsininformationsecurity
AT puechwilliam cryptographyanditsapplicationsininformationsecurity
status_str n
ids_txt_mv (CKB)5680000000037677
(oapen)https://directory.doabooks.org/handle/20.500.12854/81008
(EXLCZ)995680000000037677
carrierType_str_mv cr
is_hierarchy_title Cryptography and Its Applications in Information Security
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1796652254814535680
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03158nam-a2200781z--4500</leader><controlfield tag="001">993545268304498</controlfield><controlfield tag="005">20231214132943.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202205s2022 xx |||||o ||| 0|eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5680000000037677</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/81008</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995680000000037677</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Assad, Safwan El</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography and Its Applications in Information Security</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Basel</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (202 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology: general issues</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">History of engineering &amp; technology</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">bit independence criterion</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">bit independence</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">RC4</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">stream cipher</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">complexity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">chaos-based stream cipher</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">SPCNG</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">3D chebyshev</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">logistic</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">skew-tent</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">FPGA</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">performance</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">museum</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">digital copyright management</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">blockchain</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">smart contract</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">authorization model</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">coupled map lattice</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intermittent jumping</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">multi-chaos</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">public key exchange</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">asymmetric</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">asymmetric algorithm</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">framework</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">limited computational power</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computationally biased</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intrusion detection systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">machine learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">communication</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">digital cash</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">privacy</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">privacy preserving</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">homomorphic encryption</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">federated learning</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-3767-8</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-3768-6</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lozi, René</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Puech, William</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Assad, Safwan El</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lozi, René</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Puech, William</subfield><subfield code="4">oth</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 05:37:45 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-05-14 21:41:54 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337863050004498&amp;Force_direct=true</subfield><subfield code="Z">5337863050004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337863050004498</subfield></datafield></record></collection>