Applied Cryptography and Network Security / / edited by Jaydip Sen.
Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing worl...
Saved in:
TeilnehmendeR: | |
---|---|
Place / Publishing House: | Rijeka : : IntechOpen,, 2012. ©2012 |
Year of Publication: | 2012 |
Language: | English |
Physical Description: | 1 online resource (xii, 392 pages) :; illustrations |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02219nam a2200409 i 4500 | ||
---|---|---|---|
001 | 993545888804498 | ||
005 | 20240202141825.0 | ||
006 | m o d | ||
007 | cr#||||||||||| | ||
008 | 221017s2012 ci a ob 000 0 eng d | ||
020 | |a 953-51-5682-9 | ||
035 | |a (CKB)4970000000097821 | ||
035 | |a (NjHacI)994970000000097821 | ||
035 | |a (oapen)https://directory.doabooks.org/handle/20.500.12854/65770 | ||
035 | |a (EXLCZ)994970000000097821 | ||
040 | |a NjHacI |b eng |e rda |c NjHacl | ||
041 | 0 | |a eng | |
050 | 4 | |a TP309 |b .A675 2012 | |
082 | 0 | 4 | |a 628.922 |2 23 |
100 | 1 | |a Sen, Jaydip |4 edt | |
245 | 0 | 0 | |a Applied Cryptography and Network Security / |c edited by Jaydip Sen. |
260 | |b IntechOpen |c 2012 | ||
264 | 1 | |a Rijeka : |b IntechOpen, |c 2012. | |
264 | 4 | |c ©2012 | |
300 | |a 1 online resource (xii, 392 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | |a Description based on: online resource; title from PDF information screen (InTech, viewed October 17, 2022). | ||
504 | |a Includes bibliographical references. | ||
506 | |a Open access |f Unrestricted online access |2 star | ||
520 | |a Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks. The book contains sixteen chapters which deal with security and privacy issues in computing and communication networks, quantum cryptography and the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography. It will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities. | ||
546 | |a English | ||
650 | 0 | |a Cryptography. | |
653 | |a Computer networking & communications | ||
776 | |z 953-51-0218-4 | ||
700 | 1 | |a Sen, Jaydip, |e editor. | |
906 | |a BOOK | ||
ADM | |b 2024-02-03 21:31:45 Europe/Vienna |f system |c marc21 |a 2019-04-13 22:04:18 Europe/Vienna |g false | ||
AVE | |i DOAB Directory of Open Access Books |P DOAB Directory of Open Access Books |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338039130004498&Force_direct=true |Z 5338039130004498 |b Available |8 5338039130004498 |