Cryptography and Security in Computing / / edited by Jaydip Sen.

The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are d...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:[Place of publication not identified] : : IntechOpen,, 2012.
Year of Publication:2012
Language:English
Physical Description:1 online resource (258 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01004nam a2200289 i 4500
001 993545697404498
005 20221017090430.0
006 m o d
007 cr |||||||||||
008 221017s2012 xx ob 001 0 eng d
020 |a 953-51-5615-2 
035 |a (CKB)4970000000097751 
035 |a (NjHacI)994970000000097751 
035 |a (oapen)https://directory.doabooks.org/handle/20.500.12854/65707 
035 |a (EXLCZ)994970000000097751 
040 |a NjHacI  |b eng  |e rda  |c NjHacl 
041 0 |a eng 
050 4 |a TK5105.5  |b .C797 2012 
082 0 4 |a 004.6  |2 23 
100 1 |a Sen, Jaydip  |4 edt 
245 0 0 |a Cryptography and Security in Computing /  |c edited by Jaydip Sen. 
260 |b IntechOpen  |c 2012 
264 1 |a [Place of publication not identified] :  |b IntechOpen,  |c 2012. 
300 |a 1 online resource (258 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 |a Description based on: online resource; title from PDF information screen (InTech, viewed October 17, 2022). 
504 |a Includes bibliographical references and index. 
520 |a The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities. 
546 |a English 
650 0 |a Computer networks. 
653 |a Cloud computing 
776 |z 953-51-0179-X 
700 1 |a Sen, Jaydip,  |e editor. 
906 |a BOOK 
ADM |b 2023-02-22 20:36:59 Europe/Vienna  |f system  |c marc21  |a 2019-04-13 22:04:18 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337971780004498&Force_direct=true  |Z 5337971780004498  |b Available  |8 5337971780004498