Theory and Practice of Cryptography and Network Security Protocols and Technologies / / edited by Jaydip Sen.

In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confiden...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:[Place of publication not identified] : : IntechOpen,, 2013.
©2013
Year of Publication:2013
Language:English
Physical Description:1 online resource (158 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01072nam a2200301 i 4500
001 993545686504498
005 20221019120317.0
006 m o d
007 cr |||||||||||
008 221019s2013 xx ob 001 0 eng d
020 |a 953-51-5729-9 
035 |a (CKB)4970000000098740 
035 |a (NjHacI)994970000000098740 
035 |a (oapen)https://directory.doabooks.org/handle/20.500.12854/66584 
035 |a (EXLCZ)994970000000098740 
040 |a NjHacI  |b eng  |e rda  |c NjHacl 
041 0 |a eng 
050 4 |a TK5105.5  |b .T446 2013 
082 0 4 |a 004.6  |2 23 
100 1 |a Sen, Jaydip  |4 edt 
245 0 0 |a Theory and Practice of Cryptography and Network Security Protocols and Technologies /  |c edited by Jaydip Sen. 
260 |b IntechOpen  |c 2013 
264 1 |a [Place of publication not identified] :  |b IntechOpen,  |c 2013. 
264 4 |c ©2013 
300 |a 1 online resource (158 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 |a Description based on: online resource; title from PDF information screen (InTech, viewed October 19, 2022). 
504 |a Includes bibliographical references and index. 
520 |a In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges. It is a valuable source of knowledge for researchers, engineers, graduate and doctoral students working in the field of cryptography. It will also be useful for faculty members of graduate schools and universities. 
546 |a English 
650 0 |a Computer networks. 
653 |a Network security 
776 |z 953-51-1176-0 
700 1 |a Sen, Jaydip,  |e editor. 
906 |a BOOK 
ADM |b 2023-02-22 03:46:33 Europe/Vienna  |f system  |c marc21  |a 2019-04-13 22:04:18 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337968480004498&Force_direct=true  |Z 5337968480004498  |b Available  |8 5337968480004498