Lightweight Cryptographic Techniques and Cybersecurity Approaches / / edited by Srinivasan Ramakrishnan.

In the modern era of digitization, cryptographic techniques are becoming increasingly important. This book provides a comprehensive overview of lightweight cryptographic techniques for software-defined networks in the Internet of Things (IoT), cryptosystems, and the Internet of Multimedia Things (Io...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:London : : IntechOpen,, 2022.
Year of Publication:2022
Language:English
Physical Description:1 online resource (146 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993581449604498
ctrlnum (CKB)5700000000338667
(NjHacI)995700000000338667
(EXLCZ)995700000000338667
collection bib_alma
record_format marc
spelling Lightweight Cryptographic Techniques and Cybersecurity Approaches / edited by Srinivasan Ramakrishnan.
London : IntechOpen, 2022.
1 online resource (146 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on online resource; title from PDF title page (IntechOpen, viewed March 27, 2023).
In the modern era of digitization, cryptographic techniques are becoming increasingly important. This book provides a comprehensive overview of lightweight cryptographic techniques for software-defined networks in the Internet of Things (IoT), cryptosystems, and the Internet of Multimedia Things (IoMT). It includes seven chapters that address such topics as image and video encryption, cybersecurity threat management, distinguishing encrypted from non-encrypted data, and more.
1. Lightweight Cryptographic Techniques in 5G Software-Defined Internet of Things Networking -- 2. A Survey of Lightweight Image Encryption for IoT -- 3. Perspective Chapter: The Importance of Pipeline in Modern Cryptosystem -- 4. Hardware Implementation of an Improved Hybrid Cryptosystem for Numerical Image Encryption and Authenticity -- 5. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems -- 6. Advance in Keyless Cryptography -- 7. Perspective Chapter: Distinguishing Encrypted from Non-Encrypted Data.
Computer security.
1-80355-732-X
Ramakrishnan, Srinivasan, editor.
language English
format eBook
author2 Ramakrishnan, Srinivasan,
author_facet Ramakrishnan, Srinivasan,
author2_variant s r sr
author2_role TeilnehmendeR
title Lightweight Cryptographic Techniques and Cybersecurity Approaches /
spellingShingle Lightweight Cryptographic Techniques and Cybersecurity Approaches /
1. Lightweight Cryptographic Techniques in 5G Software-Defined Internet of Things Networking -- 2. A Survey of Lightweight Image Encryption for IoT -- 3. Perspective Chapter: The Importance of Pipeline in Modern Cryptosystem -- 4. Hardware Implementation of an Improved Hybrid Cryptosystem for Numerical Image Encryption and Authenticity -- 5. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems -- 6. Advance in Keyless Cryptography -- 7. Perspective Chapter: Distinguishing Encrypted from Non-Encrypted Data.
title_full Lightweight Cryptographic Techniques and Cybersecurity Approaches / edited by Srinivasan Ramakrishnan.
title_fullStr Lightweight Cryptographic Techniques and Cybersecurity Approaches / edited by Srinivasan Ramakrishnan.
title_full_unstemmed Lightweight Cryptographic Techniques and Cybersecurity Approaches / edited by Srinivasan Ramakrishnan.
title_auth Lightweight Cryptographic Techniques and Cybersecurity Approaches /
title_new Lightweight Cryptographic Techniques and Cybersecurity Approaches /
title_sort lightweight cryptographic techniques and cybersecurity approaches /
publisher IntechOpen,
publishDate 2022
physical 1 online resource (146 pages)
contents 1. Lightweight Cryptographic Techniques in 5G Software-Defined Internet of Things Networking -- 2. A Survey of Lightweight Image Encryption for IoT -- 3. Perspective Chapter: The Importance of Pipeline in Modern Cryptosystem -- 4. Hardware Implementation of an Improved Hybrid Cryptosystem for Numerical Image Encryption and Authenticity -- 5. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems -- 6. Advance in Keyless Cryptography -- 7. Perspective Chapter: Distinguishing Encrypted from Non-Encrypted Data.
isbn 1-80355-733-8
1-80355-732-X
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 L544 42022
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
work_keys_str_mv AT ramakrishnansrinivasan lightweightcryptographictechniquesandcybersecurityapproaches
status_str n
ids_txt_mv (CKB)5700000000338667
(NjHacI)995700000000338667
(EXLCZ)995700000000338667
carrierType_str_mv cr
is_hierarchy_title Lightweight Cryptographic Techniques and Cybersecurity Approaches /
author2_original_writing_str_mv noLinkedField
_version_ 1764995728077225984
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02017nam a2200301 i 4500</leader><controlfield tag="001">993581449604498</controlfield><controlfield tag="005">20230327132305.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230327s2022 enk o 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-80355-733-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5700000000338667</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995700000000338667</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995700000000338667</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.L544 2022</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Lightweight Cryptographic Techniques and Cybersecurity Approaches /</subfield><subfield code="c">edited by Srinivasan Ramakrishnan.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (146 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (IntechOpen, viewed March 27, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the modern era of digitization, cryptographic techniques are becoming increasingly important. This book provides a comprehensive overview of lightweight cryptographic techniques for software-defined networks in the Internet of Things (IoT), cryptosystems, and the Internet of Multimedia Things (IoMT). It includes seven chapters that address such topics as image and video encryption, cybersecurity threat management, distinguishing encrypted from non-encrypted data, and more.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. Lightweight Cryptographic Techniques in 5G Software-Defined Internet of Things Networking -- 2. A Survey of Lightweight Image Encryption for IoT -- 3. Perspective Chapter: The Importance of Pipeline in Modern Cryptosystem -- 4. Hardware Implementation of an Improved Hybrid Cryptosystem for Numerical Image Encryption and Authenticity -- 5. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems -- 6. Advance in Keyless Cryptography -- 7. Perspective Chapter: Distinguishing Encrypted from Non-Encrypted Data.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-80355-732-X</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ramakrishnan, Srinivasan,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-04-15 12:07:32 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-12-05 16:10:45 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5343042970004498&amp;Force_direct=true</subfield><subfield code="Z">5343042970004498</subfield><subfield code="8">5343042970004498</subfield></datafield></record></collection>