Recent Advances in Cryptography and Network Security / / edited by Pinaki Mitra.
In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryptio...
Saved in:
TeilnehmendeR: | |
---|---|
Place / Publishing House: | [Place of publication not identified] : : IntechOpen,, 2018. ©2018 |
Year of Publication: | 2018 |
Language: | English |
Physical Description: | 1 online resource (68 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993545579204498 |
---|---|
ctrlnum |
(CKB)4970000000100283 (NjHacI)994970000000100283 (oapen)https://directory.doabooks.org/handle/20.500.12854/66942 (EXLCZ)994970000000100283 |
collection |
bib_alma |
record_format |
marc |
spelling |
Mitra, Pinaki edt Recent Advances in Cryptography and Network Security / edited by Pinaki Mitra. IntechOpen 2018 [Place of publication not identified] : IntechOpen, 2018. ©2018 1 online resource (68 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on: online resource; title from PDF information screen (InTech, viewed October 21, 2022). Includes bibliographical references and index. In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats. English Cryptography. Computer security 1-78984-345-6 Mitra, Pinaki, editor. |
language |
English |
format |
eBook |
author2 |
Mitra, Pinaki, |
author_facet |
Mitra, Pinaki, |
author2_variant |
p m pm p m pm |
author2_role |
TeilnehmendeR |
title |
Recent Advances in Cryptography and Network Security / |
spellingShingle |
Recent Advances in Cryptography and Network Security / |
title_full |
Recent Advances in Cryptography and Network Security / edited by Pinaki Mitra. |
title_fullStr |
Recent Advances in Cryptography and Network Security / edited by Pinaki Mitra. |
title_full_unstemmed |
Recent Advances in Cryptography and Network Security / edited by Pinaki Mitra. |
title_auth |
Recent Advances in Cryptography and Network Security / |
title_new |
Recent Advances in Cryptography and Network Security / |
title_sort |
recent advances in cryptography and network security / |
publisher |
IntechOpen IntechOpen, |
publishDate |
2018 |
physical |
1 online resource (68 pages) |
isbn |
1-83881-628-3 1-78984-346-4 1-78984-345-6 |
callnumber-first |
Z - Library Science |
callnumber-subject |
Z - Books and Writing |
callnumber-label |
Z104 |
callnumber-sort |
Z 3104 R434 42018 |
illustrated |
Not Illustrated |
dewey-hundreds |
600 - Technology |
dewey-tens |
650 - Management & public relations |
dewey-ones |
652 - Processes of written communication |
dewey-full |
652.8 |
dewey-sort |
3652.8 |
dewey-raw |
652.8 |
dewey-search |
652.8 |
work_keys_str_mv |
AT mitrapinaki recentadvancesincryptographyandnetworksecurity |
status_str |
n |
ids_txt_mv |
(CKB)4970000000100283 (NjHacI)994970000000100283 (oapen)https://directory.doabooks.org/handle/20.500.12854/66942 (EXLCZ)994970000000100283 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Recent Advances in Cryptography and Network Security / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1787548474811613184 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01065nam a2200313 i 4500</leader><controlfield tag="001">993545579204498</controlfield><controlfield tag="005">20221021212435.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">221021s2018 xx ob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-83881-628-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-78984-346-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4970000000100283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994970000000100283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/66942</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994970000000100283</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">Z104</subfield><subfield code="b">.R434 2018</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">652.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mitra, Pinaki</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Recent Advances in Cryptography and Network Security /</subfield><subfield code="c">edited by Pinaki Mitra.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">IntechOpen</subfield><subfield code="c">2018</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified] :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2018.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (68 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on: online resource; title from PDF information screen (InTech, viewed October 21, 2022).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-78984-345-6</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mitra, Pinaki,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-22 20:28:42 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-04-13 22:04:18 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337986280004498&Force_direct=true</subfield><subfield code="Z">5337986280004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337986280004498</subfield></datafield></record></collection> |