Recent Advances in Cryptography and Network Security / / edited by Pinaki Mitra.

In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryptio...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:[Place of publication not identified] : : IntechOpen,, 2018.
©2018
Year of Publication:2018
Language:English
Physical Description:1 online resource (68 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01065nam a2200313 i 4500
001 993545579204498
005 20221021212435.0
006 m o d
007 cr |||||||||||
008 221021s2018 xx ob 001 0 eng d
020 |a 1-83881-628-3 
020 |a 1-78984-346-4 
035 |a (CKB)4970000000100283 
035 |a (NjHacI)994970000000100283 
035 |a (oapen)https://directory.doabooks.org/handle/20.500.12854/66942 
035 |a (EXLCZ)994970000000100283 
040 |a NjHacI  |b eng  |e rda  |c NjHacl 
041 0 |a eng 
050 4 |a Z104  |b .R434 2018 
082 0 4 |a 652.8  |2 23 
100 1 |a Mitra, Pinaki  |4 edt 
245 0 0 |a Recent Advances in Cryptography and Network Security /  |c edited by Pinaki Mitra. 
260 |b IntechOpen  |c 2018 
264 1 |a [Place of publication not identified] :  |b IntechOpen,  |c 2018. 
264 4 |c ©2018 
300 |a 1 online resource (68 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 |a Description based on: online resource; title from PDF information screen (InTech, viewed October 21, 2022). 
504 |a Includes bibliographical references and index. 
520 |a In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats. 
546 |a English 
650 0 |a Cryptography. 
653 |a Computer security 
776 |z 1-78984-345-6 
700 1 |a Mitra, Pinaki,  |e editor. 
906 |a BOOK 
ADM |b 2023-02-22 20:28:42 Europe/Vienna  |f system  |c marc21  |a 2019-04-13 22:04:18 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337986280004498&Force_direct=true  |Z 5337986280004498  |b Available  |8 5337986280004498