Theory and Practice of Cryptography and Network Security Protocols and Technologies / / edited by Jaydip Sen.

In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confiden...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:[Place of publication not identified] : : IntechOpen,, 2013.
©2013
Year of Publication:2013
Language:English
Physical Description:1 online resource (158 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993545686504498
ctrlnum (CKB)4970000000098740
(NjHacI)994970000000098740
(oapen)https://directory.doabooks.org/handle/20.500.12854/66584
(EXLCZ)994970000000098740
collection bib_alma
record_format marc
spelling Sen, Jaydip edt
Theory and Practice of Cryptography and Network Security Protocols and Technologies / edited by Jaydip Sen.
IntechOpen 2013
[Place of publication not identified] : IntechOpen, 2013.
©2013
1 online resource (158 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on: online resource; title from PDF information screen (InTech, viewed October 19, 2022).
Includes bibliographical references and index.
In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges. It is a valuable source of knowledge for researchers, engineers, graduate and doctoral students working in the field of cryptography. It will also be useful for faculty members of graduate schools and universities.
English
Computer networks.
Network security
953-51-1176-0
Sen, Jaydip, editor.
language English
format eBook
author2 Sen, Jaydip,
author_facet Sen, Jaydip,
author2_variant j s js
j s js
author2_role TeilnehmendeR
title Theory and Practice of Cryptography and Network Security Protocols and Technologies /
spellingShingle Theory and Practice of Cryptography and Network Security Protocols and Technologies /
title_full Theory and Practice of Cryptography and Network Security Protocols and Technologies / edited by Jaydip Sen.
title_fullStr Theory and Practice of Cryptography and Network Security Protocols and Technologies / edited by Jaydip Sen.
title_full_unstemmed Theory and Practice of Cryptography and Network Security Protocols and Technologies / edited by Jaydip Sen.
title_auth Theory and Practice of Cryptography and Network Security Protocols and Technologies /
title_new Theory and Practice of Cryptography and Network Security Protocols and Technologies /
title_sort theory and practice of cryptography and network security protocols and technologies /
publisher IntechOpen
IntechOpen,
publishDate 2013
physical 1 online resource (158 pages)
isbn 953-51-5729-9
953-51-1176-0
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK5105
callnumber-sort TK 45105.5 T446 42013
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 004 - Data processing & computer science
dewey-full 004.6
dewey-sort 14.6
dewey-raw 004.6
dewey-search 004.6
work_keys_str_mv AT senjaydip theoryandpracticeofcryptographyandnetworksecurityprotocolsandtechnologies
status_str n
ids_txt_mv (CKB)4970000000098740
(NjHacI)994970000000098740
(oapen)https://directory.doabooks.org/handle/20.500.12854/66584
(EXLCZ)994970000000098740
carrierType_str_mv cr
is_hierarchy_title Theory and Practice of Cryptography and Network Security Protocols and Technologies /
author2_original_writing_str_mv noLinkedField
_version_ 1796652228770004993
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01072nam a2200301 i 4500</leader><controlfield tag="001">993545686504498</controlfield><controlfield tag="005">20221019120317.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">221019s2013 xx ob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">953-51-5729-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4970000000098740</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994970000000098740</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/66584</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994970000000098740</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.5</subfield><subfield code="b">.T446 2013</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sen, Jaydip</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Theory and Practice of Cryptography and Network Security Protocols and Technologies /</subfield><subfield code="c">edited by Jaydip Sen.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">IntechOpen</subfield><subfield code="c">2013</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified] :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (158 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on: online resource; title from PDF information screen (InTech, viewed October 19, 2022).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges. It is a valuable source of knowledge for researchers, engineers, graduate and doctoral students working in the field of cryptography. It will also be useful for faculty members of graduate schools and universities.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Network security</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">953-51-1176-0</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sen, Jaydip,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-22 03:46:33 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-04-13 22:04:18 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337968480004498&amp;Force_direct=true</subfield><subfield code="Z">5337968480004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337968480004498</subfield></datafield></record></collection>