Applied Cryptography and Network Security / / edited by Jaydip Sen.

Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing worl...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:Rijeka : : IntechOpen,, 2012.
©2012
Year of Publication:2012
Language:English
Physical Description:1 online resource (xii, 392 pages) :; illustrations
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993545888804498
ctrlnum (CKB)4970000000097821
(NjHacI)994970000000097821
(oapen)https://directory.doabooks.org/handle/20.500.12854/65770
(EXLCZ)994970000000097821
collection bib_alma
record_format marc
spelling Sen, Jaydip edt
Applied Cryptography and Network Security / edited by Jaydip Sen.
IntechOpen 2012
Rijeka : IntechOpen, 2012.
©2012
1 online resource (xii, 392 pages) : illustrations
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on: online resource; title from PDF information screen (InTech, viewed October 17, 2022).
Includes bibliographical references.
Open access Unrestricted online access star
Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks. The book contains sixteen chapters which deal with security and privacy issues in computing and communication networks, quantum cryptography and the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography. It will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.
English
Cryptography.
Computer networking & communications
953-51-0218-4
Sen, Jaydip, editor.
language English
format eBook
author2 Sen, Jaydip,
author_facet Sen, Jaydip,
author2_variant j s js
j s js
author2_role TeilnehmendeR
title Applied Cryptography and Network Security /
spellingShingle Applied Cryptography and Network Security /
title_full Applied Cryptography and Network Security / edited by Jaydip Sen.
title_fullStr Applied Cryptography and Network Security / edited by Jaydip Sen.
title_full_unstemmed Applied Cryptography and Network Security / edited by Jaydip Sen.
title_auth Applied Cryptography and Network Security /
title_new Applied Cryptography and Network Security /
title_sort applied cryptography and network security /
publisher IntechOpen
IntechOpen,
publishDate 2012
physical 1 online resource (xii, 392 pages) : illustrations
isbn 953-51-5682-9
953-51-0218-4
callnumber-first T - Technology
callnumber-subject TP - Chemical Technology
callnumber-label TP309
callnumber-sort TP 3309 A675 42012
illustrated Illustrated
dewey-hundreds 600 - Technology
dewey-tens 620 - Engineering
dewey-ones 628 - Sanitary & municipal engineering
dewey-full 628.922
dewey-sort 3628.922
dewey-raw 628.922
dewey-search 628.922
work_keys_str_mv AT senjaydip appliedcryptographyandnetworksecurity
status_str n
ids_txt_mv (CKB)4970000000097821
(NjHacI)994970000000097821
(oapen)https://directory.doabooks.org/handle/20.500.12854/65770
(EXLCZ)994970000000097821
carrierType_str_mv cr
is_hierarchy_title Applied Cryptography and Network Security /
author2_original_writing_str_mv noLinkedField
_version_ 1789925533600972800
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02219nam a2200409 i 4500</leader><controlfield tag="001">993545888804498</controlfield><controlfield tag="005">20240202141825.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr#|||||||||||</controlfield><controlfield tag="008">221017s2012 ci a ob 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">953-51-5682-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4970000000097821</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994970000000097821</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/65770</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994970000000097821</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TP309</subfield><subfield code="b">.A675 2012</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">628.922</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sen, Jaydip</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Applied Cryptography and Network Security /</subfield><subfield code="c">edited by Jaydip Sen.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">IntechOpen</subfield><subfield code="c">2012</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rijeka :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 392 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on: online resource; title from PDF information screen (InTech, viewed October 17, 2022).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Open access</subfield><subfield code="f">Unrestricted online access</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks. The book contains sixteen chapters which deal with security and privacy issues in computing and communication networks, quantum cryptography and the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography. It will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer networking &amp; communications</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">953-51-0218-4</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sen, Jaydip,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-02-03 21:31:45 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-04-13 22:04:18 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338039130004498&amp;Force_direct=true</subfield><subfield code="Z">5338039130004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338039130004498</subfield></datafield></record></collection>