Recent Advances in Cryptography and Network Security / / edited by Pinaki Mitra.

In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryptio...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:[Place of publication not identified] : : IntechOpen,, 2018.
©2018
Year of Publication:2018
Language:English
Physical Description:1 online resource (68 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993545579204498
ctrlnum (CKB)4970000000100283
(NjHacI)994970000000100283
(oapen)https://directory.doabooks.org/handle/20.500.12854/66942
(EXLCZ)994970000000100283
collection bib_alma
record_format marc
spelling Mitra, Pinaki edt
Recent Advances in Cryptography and Network Security / edited by Pinaki Mitra.
IntechOpen 2018
[Place of publication not identified] : IntechOpen, 2018.
©2018
1 online resource (68 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on: online resource; title from PDF information screen (InTech, viewed October 21, 2022).
Includes bibliographical references and index.
In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.
English
Cryptography.
Computer security
1-78984-345-6
Mitra, Pinaki, editor.
language English
format eBook
author2 Mitra, Pinaki,
author_facet Mitra, Pinaki,
author2_variant p m pm
p m pm
author2_role TeilnehmendeR
title Recent Advances in Cryptography and Network Security /
spellingShingle Recent Advances in Cryptography and Network Security /
title_full Recent Advances in Cryptography and Network Security / edited by Pinaki Mitra.
title_fullStr Recent Advances in Cryptography and Network Security / edited by Pinaki Mitra.
title_full_unstemmed Recent Advances in Cryptography and Network Security / edited by Pinaki Mitra.
title_auth Recent Advances in Cryptography and Network Security /
title_new Recent Advances in Cryptography and Network Security /
title_sort recent advances in cryptography and network security /
publisher IntechOpen
IntechOpen,
publishDate 2018
physical 1 online resource (68 pages)
isbn 1-83881-628-3
1-78984-346-4
1-78984-345-6
callnumber-first Z - Library Science
callnumber-subject Z - Books and Writing
callnumber-label Z104
callnumber-sort Z 3104 R434 42018
illustrated Not Illustrated
dewey-hundreds 600 - Technology
dewey-tens 650 - Management & public relations
dewey-ones 652 - Processes of written communication
dewey-full 652.8
dewey-sort 3652.8
dewey-raw 652.8
dewey-search 652.8
work_keys_str_mv AT mitrapinaki recentadvancesincryptographyandnetworksecurity
status_str n
ids_txt_mv (CKB)4970000000100283
(NjHacI)994970000000100283
(oapen)https://directory.doabooks.org/handle/20.500.12854/66942
(EXLCZ)994970000000100283
carrierType_str_mv cr
is_hierarchy_title Recent Advances in Cryptography and Network Security /
author2_original_writing_str_mv noLinkedField
_version_ 1787548474811613184
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01065nam a2200313 i 4500</leader><controlfield tag="001">993545579204498</controlfield><controlfield tag="005">20221021212435.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">221021s2018 xx ob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-83881-628-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-78984-346-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4970000000100283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994970000000100283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/66942</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994970000000100283</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">Z104</subfield><subfield code="b">.R434 2018</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">652.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mitra, Pinaki</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Recent Advances in Cryptography and Network Security /</subfield><subfield code="c">edited by Pinaki Mitra.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">IntechOpen</subfield><subfield code="c">2018</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified] :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2018.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (68 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on: online resource; title from PDF information screen (InTech, viewed October 21, 2022).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-78984-345-6</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mitra, Pinaki,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-22 20:28:42 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-04-13 22:04:18 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337986280004498&amp;Force_direct=true</subfield><subfield code="Z">5337986280004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337986280004498</subfield></datafield></record></collection>