Applied Cryptography and Network Security / / edited by Jaydip Sen.

Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing worl...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:Rijeka : : IntechOpen,, 2012.
©2012
Year of Publication:2012
Language:English
Physical Description:1 online resource (xii, 392 pages) :; illustrations
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02219nam a2200409 i 4500
001 993545888804498
005 20240202141825.0
006 m o d
007 cr#|||||||||||
008 221017s2012 ci a ob 000 0 eng d
020 |a 953-51-5682-9 
035 |a (CKB)4970000000097821 
035 |a (NjHacI)994970000000097821 
035 |a (oapen)https://directory.doabooks.org/handle/20.500.12854/65770 
035 |a (EXLCZ)994970000000097821 
040 |a NjHacI  |b eng  |e rda  |c NjHacl 
041 0 |a eng 
050 4 |a TP309  |b .A675 2012 
082 0 4 |a 628.922  |2 23 
100 1 |a Sen, Jaydip  |4 edt 
245 0 0 |a Applied Cryptography and Network Security /  |c edited by Jaydip Sen. 
260 |b IntechOpen  |c 2012 
264 1 |a Rijeka :  |b IntechOpen,  |c 2012. 
264 4 |c ©2012 
300 |a 1 online resource (xii, 392 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 |a Description based on: online resource; title from PDF information screen (InTech, viewed October 17, 2022). 
504 |a Includes bibliographical references. 
506 |a Open access  |f Unrestricted online access  |2 star 
520 |a Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks. The book contains sixteen chapters which deal with security and privacy issues in computing and communication networks, quantum cryptography and the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography. It will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities. 
546 |a English 
650 0 |a Cryptography. 
653 |a Computer networking & communications 
776 |z 953-51-0218-4 
700 1 |a Sen, Jaydip,  |e editor. 
906 |a BOOK 
ADM |b 2024-02-03 21:31:45 Europe/Vienna  |f system  |c marc21  |a 2019-04-13 22:04:18 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338039130004498&Force_direct=true  |Z 5338039130004498  |b Available  |8 5338039130004498